Author of the publication

Practical limits of the secret key-capacity for IoT physical layer security.

, , , , , and . WF-IoT, page 311-316. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG steganography detection with Benford's Law., , and . Digital Investigation, 9 (3-4): 246-257 (2013)Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution., and . ERCIM News, (2014)A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 10 (2): 1461-1468 (2014)Exploring Potential 6LoWPAN Traffic Side Channels., , and . IACR Cryptol. ePrint Arch., (2017)Migrating To The Cloud: Lessons And Limitations Of 'Traditional' IS Success Models., , and . CSER, volume 16 of Procedia Computer Science, page 737-746. Elsevier, (2013)An urban sensing architecture as essential infrastructure for future cities., , and . UCC Companion, page 37:1-37:3. ACM, (2021)Physical layer secret-key generation with discreet cosine transform for the Internet of Things., , , , , and . ICC, page 1-6. IEEE, (2017)On the Development of Automated Forensic Analysis Methods for Mobile Devices., , , , , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 212-213. Springer, (2014)A viable systems approach towards cyber situational awareness., , and . SMC, page 1405-1411. IEEE, (2014)