Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures., , , , , , , and . CoRR, (2018)iCellular: Define Your Own Cellular Network Access on Commodity Smartphones., , , , , , and . CoRR, (2015)New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks., , , , and . CCS, page 1118-1130. ACM, (2016)SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud., , , and . ICDE, page 662-673. IEEE, (2019)Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure., , , , , , and . MobiCom, page 8:1-8:14. ACM, (2020)How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks., , , and . ICC, page 1-6. IEEE, (2018)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , and . MobiCom, page 513-527. ACM, (2024)Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks., , , , , , and . PerCom, page 57-68. IEEE, (2024)BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network., , , and . CODASPY, page 77-87. ACM, (2021)Uncovering insecure designs of cellular emergency services (911)., , , , , , , , , and 1 other author(s). MobiCom, page 703-715. ACM, (2022)