Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark., , and . LCN, page 124-132. IEEE, (2018)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . CoRR, (2018)Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs., , and . SRIF@SIGCOMM, page 17-24. ACM, (2013)Analyzing TETRA Location Privacy and Network Availability., , , , and . SPSM@CCS, page 117-122. ACM, (2016)Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks., , , and . IEEE/ACM Trans. Netw., 28 (5): 2188-2202 (2020)On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market., , , and . Wirtschaftsinformatik, page 1307-1321. University of Siegen, Germany / AISeL, (2019)Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves., , , , and . CNS, page 335-343. IEEE, (2015)mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training., , , , and . COMSNETS, page 1-8. IEEE, (2017)Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace., , and . INFOCOM Workshops, page 1093-1094. IEEE, (2016)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . GHTC, page 62-70. IEEE, (2016)