Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET., , and . BROADNETS, IEEE, (2006)Active adversaries from an information-theoretic perspective: Data modification attacks., and . ISIT, page 791-795. IEEE, (2014)Secure Estimation and Zero-Error Secrecy Capacity., , , , , and . IEEE Trans. Automat. Contr., 64 (3): 1047-1062 (2019)Efficient and Robust Secure Aggregation for Sensor Networks, , , , and . CoRR, (2008)Certificate revocation list distribution in vehicular communication systems., , and . Vehicular Ad Hoc Networks, page 86-87. ACM, (2008)Towards Battery-free Radio Tomographic Imaging., , , , , and . WISEC, page 293-295. ACM, (2018)VeSPA: Vehicular Security and Privacy-preserving Architecture., , , , and . CoRR, (2020)WPES '23: 22nd Workshop on Privacy in the Electronic Society., and . CCS, page 3645-3647. ACM, (2023)Securing Optimized Code Against Power Side Channels., , , and . CoRR, (2022)Thwarting code-reuse and side-channel attacks in embedded systems., , and . Comput. Secur., (October 2023)