Author of the publication

This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.

, , , , and . WOOT, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications., , , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 445-467. Springer, (2017)Dynamix: anonymity on dynamic social structures., and . AsiaCCS, page 167-172. ACM, (2013)Privacy Protection in PKIs: A Separation-of-Authority Approach., , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 297-311. Springer, (2006)Admission Control in Peer Groups., , and . NCA, page 131-139. IEEE Computer Society, (2003)Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack., , , , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 124-135. (2016)Measuring bias in the mixing time of social graphs due to graph sampling., , , , and . MILCOM, page 1-6. IEEE, (2012)Designs to account for trust in social network-based sybil defenses., , and . CCS, page 714-716. ACM, (2010)Recruiting new tor relays with BRAIDS., , and . CCS, page 319-328. ACM, (2010)Combating Double-Spending Using Cooperative P2P Systems., , , and . ICDCS, page 41. IEEE Computer Society, (2007)