Author of the publication

Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.

, , , , and . WISEC, page 111-121. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . CoRR, (2018)Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark., , and . LCN, page 124-132. IEEE, (2018)Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs., , and . SRIF@SIGCOMM, page 17-24. ACM, (2013)On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market., , , and . Wirtschaftsinformatik, page 1307-1321. University of Siegen, Germany / AISeL, (2019)Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves., , , , and . CNS, page 335-343. IEEE, (2015)Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace., , and . INFOCOM Workshops, page 1093-1094. IEEE, (2016)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . GHTC, page 62-70. IEEE, (2016)Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks., , , , and . mmNets@MobiCom, page 3-8. ACM, (2018)mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training., , , , and . COMSNETS, page 1-8. IEEE, (2017)ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices., , , , , , , and . CoRR, (2020)