Author of the publication

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.

, , , , and . VLCS@MobiCom, page 9-14. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing TETRA Location Privacy and Network Availability., , , , and . SPSM@CCS, page 117-122. ACM, (2016)Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark., , and . LCN, page 124-132. IEEE, (2018)Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs., , and . SRIF@SIGCOMM, page 17-24. ACM, (2013)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . GHTC, page 62-70. IEEE, (2016)Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace., , and . INFOCOM Workshops, page 1093-1094. IEEE, (2016)Vorstellung "neuer" KUVS-naher Fachgebiete. Fachgebiet Sichere Mobile Netze, Fachbereich Informatik, Technische Universität Darmstadt.. Prax. Inf.verarb. Kommun., 33 (3): 239-240 (2010)Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices., , , , , , and . EWSN, page 176-177. ACM, (2020)Dynamic network (re-)configuration across time, scope, and structure., , , , , , , , and . EuCNC, page 547-552. IEEE, (2022)FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones., , , and . CHI, page 68:1-68:16. ACM, (2023)Quality of experience of voice communication in large-scale mobile ad hoc networks., , , , , and . Wireless Days, page 1-6. IEEE, (2009)