Author of the publication

Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures.

, , and . IWCMC, page 594-599. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical outlier screening as a test solution health monitor., , , and . ITC, page 1-10. IEEE, (2016)The Camellia Cipher in OpenPGP.. RFC, (June 2009)Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios., , , and . Secur. Commun. Networks, 8 (3): 403-417 (2015)INCHEM-Py: An open source Python box model for indoor air chemistry., and . J. Open Source Softw., 6 (63): 3224 (2021)Playing Brains: The Ethical Challenges Posed by Silicon Sentience and Hybrid Intelligence in DishBrain., , and . Sci. Eng. Ethics, 29 (6): 38 (December 2023)Automated detection of herbicide drift effects on crops., , , and . IGARSS, page 3023-3025. IEEE, (2002)Seamlessly Selecting the Best Copy from Internet-Wide Replicated Web Servers., , and . DISC, volume 1499 of Lecture Notes in Computer Science, page 22-33. Springer, (1998)The regular polygon detector., , and . Pattern Recognit., 43 (3): 592-602 (2010)Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures., , and . IWCMC, page 594-599. IEEE, (2015)Writers Blocked: On the Wrongs of Research Co-authorship and Some Possible Strategies for Improvement., and . Science and Engineering Ethics, 21 (5): 1315-1329 (2015)