Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes., , , and . ICL-GNSS, page 1-6. IEEE, (2016)Energy-based anchor node selection for IoT physical layer authentication., , , , and . ICC, page 1-6. IEEE, (2016)Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation., , , , , , , and . TPS-ISA, page 114-123. IEEE, (2022)On the achievable equivalent security of GNSS ranging code encryption., and . PLANS, page 956-966. IEEE, (2018)Exploiting side-information for resilient GNSS positioning in mobile phones., , , , and . PLANS, page 1515-1524. IEEE, (2018)A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data., , , , , and . Sensors, 21 (9): 3012 (2021)Optimization of anchor nodes' usage for location verification systems., , , and . ICL-GNSS, page 1-6. IEEE, (2017)Authentication of Galileo GNSS Signal by Superimposed Signature with Artificial Noise., , , , and . EUSIPCO, page 2573-2577. IEEE, (2018)