Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists., , and . IACR Cryptology ePrint Archive, (2013)Forward Security with Crash Recovery for Secure Logs., and . ACM Trans. Priv. Secur., 27 (1): 3:1-3:28 (2024)Interleaving Jamming in Wi-Fi Networks., , and . WISEC, page 31-42. ACM, (2016)An autonomic and permissionless Android covert channel., , and . WISEC, page 184-194. ACM, (2017)WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access., , and . INFOCOM, page 1593-1601. IEEE, (2011)Transmission power control for ad hoc wireless networks: throughput, energy and fairness., , , and . WCNC, page 619-625. IEEE, (2005)Wireless Transfer of Energy Alongside Information in Wireless Sensor Networks., and . Mission-Oriented Sensor Networks and Systems (2), 164, Springer, (2019)Signature-based method for run-time fault detection in communication protocols., , and . Comput. Commun., 21 (5): 405-421 (1998)Static and Dynamic Polling Mechanisms for Fieldbus Networks., and . ACM SIGOPS Oper. Syst. Rev., 27 (3): 34-45 (1993)Efficient Multicast Trees with Local Knowledge on Wireless Ad Hoc Networks., , , and . WWIC, volume 3510 of Lecture Notes in Computer Science, page 246-257. Springer, (2005)