Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures., , , , and . HOTPOST@MobiHoc, page 31-36. ACM, (2016)Check before storing: what is the performance price of content integrity verification in LRU caching?, , , and . Comput. Commun. Rev., 43 (3): 59-67 (2013)Towards traffic-oriented spreading factor allocations in LoRaWAN systems., , , , , , , , and . Med-Hoc-Net, page 1-8. IEEE, (2018)Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication., , , , , , , , , and 1 other author(s). CoRR, (2018)A General, Tractable and Accurate Model for a Cascade of Caches., , , and . CoRR, (2013)D-StreaMon: From middlebox to distributed NFV framework for network monitoring., , , , , , and . LANMAN, page 1-2. IEEE, (2017)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , and . ARES, page 715-724. IEEE Computer Society, (2016)A Survey on the Security of Stateful SDN Data Planes., , , , and . IEEE Commun. Surv. Tutorials, 19 (3): 1701-1725 (2017)A General, Tractable and Accurate Model for a Cascade of LRU Caches., , , and . IEEE Commun. Lett., 18 (5): 877-880 (2014)Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication., , , , , , , , , and 2 other author(s). IEEE Trans. Inf. Forensics Secur., (2020)