Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A pilot study on the security of pattern screen-lock methods and soft side channel attacks., , , and . WISEC, page 1-6. ACM, (2013)Digital investigations for IPv6-based Wireless Sensor Networks., , , , and . Digit. Investig., 11 (Supplement 2): S66-S75 (2014)An emulator for the network stack of Integrated Modular Systems., , , and . SoSE, page 1-6. IEEE, (2010)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , and . SoSE, page 266-271. IEEE, (2014)Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks., , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 34-49. Springer, (2013)Microsecond-Accuracy Time Synchronization Using the IEEE 802.15.4 TSCH Protocol., , , , , and . LCN Workshops, page 156-164. IEEE Computer Society, (2016)ADDER: Probabilistic, Application Layer Service Discovery for MANETs and Hybrid Wired-Wireless Networks., , , and . CNSR, page 33-40. IEEE Computer Society, (2011)Experiences from porting the Contiki operating system to a popular hardware platform., and . DCOSS, page 1-6. IEEE Computer Society, (2011)Impact of Guard Time Length on IEEE 802.15.4e TSCH Energy Consumption., , , , , and . SECON, page 1-3. IEEE, (2016)Class Based Overall Priority Scheduling for M2M Communications over LTE Networks., , , , and . VTC Spring, page 1-5. IEEE, (2015)