Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobility helps peer-to-peer security, , and . IEEE Transactions on Mobile Computing, 5 (1): 43-51 (January 2006)Towards provable security for ad hoc routing protocols., and . SASN, page 94-105. ACM, (2004)Modelling adversaries and security objectives for routing protocols in wireless sensor networks., , and . SASN, page 49-58. ACM, (2006)Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality., , and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 152-170. Springer, (2012)Rational Exchange - A Formal Model Based on Game Theory., and . WELCOM, volume 2232 of Lecture Notes in Computer Science, page 114-126. Springer, (2001)There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation., , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 133-149. Springer, (2019)Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks., , , and . Comput. Commun., 33 (8): 907-922 (2010)Clustering IoT Malware based on Binary Similarity., , , and . NOMS, page 1-6. IEEE, (2020)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Commun., 48 (3): 373-376 (2000)Rootkit Detection on Embedded IoT Devices., , , and . Acta Cybern., 25 (2): 369-400 (2021)