Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Amplified Distributed Denial of Service Attack in Software Defined Networking., , , and . NTMS, page 1-4. IEEE, (2016)On the Feasibility of Attribute-Based Encryption on Smartphone Devices., , and . IoT-Sys@MobiSys, page 49-54. ACM, (2015)Smartphone and Laptop Frameworks for vehicular networking experimentation., , , , and . Wireless Days, page 1-6. IEEE, (2013)Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters., , , , and . CNS, page 163-171. IEEE, (2016)Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems., , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 1:1-1:2 (2021)A roaming-based denial of service attack on LTE networks: poster., , , and . WISEC, page 283-284. ACM, (2017)Verifiable and privacy-preserving fine-grained data-collection for smart metering., , , , and . CNS, page 655-658. IEEE, (2015)Design of a Misbehavior Detection System for Objects Based Shared Perception V2X Applications., , , , and . ITSC, page 1165-1172. IEEE, (2019)Toward secure and efficient attestation for highly dynamic swarms: poster., , , , and . WISEC, page 281-282. ACM, (2017)LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking., , , and . IEEE/ACM Trans. Netw., 25 (2): 1206-1219 (2017)