Author of the publication

Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks.

, , , and . WCNC, page 1667-1672. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps., and . IEEE Secur. Priv., 18 (3): 6-7 (2020)Multi-channel Protocols., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 112-127. Springer, (2005)Security Issues in Ubiquitous Computing.. Handbook of Ambient Intelligence and Smart Environments, Springer, (2010)Relay-Proof Channels Using UWB Lasers., , , and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 45-46. Springer, (2010)Python in Education: Raising a Generation of Native Speakers. Proceedings of 8$^th$ International Python Conference, (January 2000)http://www.python.org/workshops/2000-01/proceedings/ papers/stajano/stajano.html http://www.uk.research.att.com/~fms/ http://www.uk.research.att.com/ papers/tr.1999.10.html.User Authentication for the Internet of Things., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 209-213. Springer, (2018)Red Button and Yellow Button: Usable Security for Lost Security Tokens., , , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 165-171. Springer, (2016)Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper)., , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 263-272. Springer, (2006)It's the Anthropology, Stupid!, and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 127-130. Springer, (2010)Multichannel Security Protocols., and . IEEE Pervasive Computing, 6 (4): 31-39 (2007)