Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized proof of location in vehicular Ad Hoc networks., , and . Comput. Commun., (2019)Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol., and . CSF, page 305-318. IEEE, (2022)Authentic Communication and Trustworthy Location in Mobile Networks.. Linköping University, Sweden, (2023)base-search.net (ftlinkoepinguniv:oai:DiVA.org:liu-196460).Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters., , and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 120-138. Springer, (2022)UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks., , , , , , and . IEEE Access, (2021)On the impact of sybil attacks in cooperative driving scenarios., , , , and . Networking, page 1-2. IEEE Computer Society, (2017)Remote Attestation Assurance Arguments for Trusted Execution Environments., , , , and . SAT-CPS@CODASPY, page 33-42. ACM, (2023)Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol., and . CoRR, (2021)No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios., , and . WISEC, page 280-281. ACM, (2022)Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning., , , , and . VNC, page 53-60. IEEE, (2017)