Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach., , , and . WICON, volume 146 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-112. Springer, (2014)Some Initial Results and Observations from a Series of Trials within the Ofcom TV White Spaces Pilot., , , , , , , , , and 29 other author(s). VTC Spring, page 1-7. IEEE, (2015)Testbed for combination of local sensing with geolocation database in real environments., , , , , , and . IEEE Wirel. Commun., 19 (4): 59-66 (2012)An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices., , , , , and . Mob. Networks Appl., 25 (1): 164-172 (2020)The increase of the experiences of the self through the practice of multiple virtual identities.. PsychNology Journal, 7 (3): 291-302 (2009)Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals., , , , , , , , and . IM, page 1034-1039. IEEE, (2017)Super-regenerative receiver at 433 MHz., , , and . Microelectron. J., 42 (5): 681-687 (2011)Cross-platform demonstrator combining spectrum sensing and a geo-location database., , , , and . Future Network & Mobile Summit, page 1-9. IEEE, (2012)HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android., , , , and . IEEE Access, (2020)An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain., , , , , , , and . IEEE Access, (2019)