Author of the publication

Secure Location Verification with Hidden and Mobile Base Stations.

, , , and . IEEE Trans. Mob. Comput., 7 (4): 470-483 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Usability of Secure Association of Wireless Devices Based on Distance Bounding., , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 443-462. Springer, (2009)BlinkComm: Initialization of IoT Devices Using Visible Light Communication., , and . Wirel. Commun. Mob. Comput., (2018)Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks., , , and . INFOCOM, page 1442-1450. IEEE, (2007)Towards reliable IoT: Testing LoRa communication., , , and . SoftCOM, page 1-3. IEEE, (2018)Towards linking social media profiles with user's WiFi preferred network list., , , and . Ad Hoc Networks, (2020)Secure Location Verification with Hidden and Mobile Base Stations., , , and . IEEE Trans. Mob. Comput., 7 (4): 470-483 (2008)LISA: Visible light based initialization and SMS based authentication of constrained IoT devices., , and . Future Gener. Comput. Syst., (2019)Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks., , , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 228-247. Springer, (2009)Integrity regions: authentication through presence in wireless networks., and . Workshop on Wireless Security, page 1-10. ACM, (2006)Predicting Low-Cost Gas Sensor Readings From Transients Using Long Short-Term Memory Neural Networks., , , and . IEEE Internet Things J., 7 (9): 8451-8461 (2020)