Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigations on the performance of bluetooth enabled mesh networking., , and . IDAACS-SWS, page 56-61. IEEE, (2016)Investigations on passive channel impulse response of ultra wide band signals for monitoring and safety applications., , , and . IDAACS-SWS, page 97-104. IEEE, (2016)Wireless technologies for safe automation - insights in protocol development., and . ETFA, page 1181-1184. IEEE, (2008)Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations., and . IEEE Trans. Dependable Secur. Comput., 17 (2): 278-291 (2020)Research Aspects for Secure Communication in the Industrial Internet of Things., , and . DESSERT, page 284-289. IEEE, (2020)Performance evaluation of IEEE 802.15.4-compliant smart water meters for automating large-scale waterways., , , , , , and . IDAACS, page 746-751. IEEE, (2017)Multi-hop Routing Implementation in Spatially Distributed Wireless Sensor Networks for Large-Scale Environmental Monitoring Applications., , , , , and . IDAACS, page 111-116. IEEE, (2019)A Method for Optimum Placement of Access Points in Indoor Positioning Systems., , and . IDAACS, page 1130-1135. IEEE, (2019)Development of Car2X Communication and Localization PHY and MAC Protocol Following Iterative Spiral Model Using Simulation and Emulation., , , , and . Nets4Cars/Nets4Trains, volume 7865 of Lecture Notes in Computer Science, page 136-145. Springer, (2013)Security Audit of a Blockchain-Based Industrial Application Platform., , , , , and . Algorithms, 14 (4): 121 (2021)