Author of the publication

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.

, , , , and . IEEE Trans. Inf. Forensics Secur., 9 (12): 2193-2204 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing impulsive network traffic using truncated α-stable processes., , , , and . IEEE Communications Letters, 13 (12): 980-982 (2009)A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks., , , and . WISEC, page 245-252. ACM, (2009)Packet Pacing in Short Buffer Optical Packet Switched Networks., , , and . INFOCOM, IEEE, (2006)Authentication of lossy data in body-sensor networks for healthcare monitoring., , and . SECON, page 470-478. IEEE, (2012)Safety assurance and rescue communication systems in high-stress environments: A mining case study., , , and . IEEE Commun. Mag., 48 (4): 66-73 (2010)Zero reconciliation secret key generation for body-worn health monitoring devices., , and . WISEC, page 39-50. ACM, (2012)A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks., , , and . Comput. Secur., (2013)Securing data provenance in body area networks using lightweight wireless link fingerprints., , , and . TrustED@CCS, page 65-72. ACM, (2013)Improving the coverage range of ultrasound-based localization systems., , and . WCNC, page 605-610. IEEE, (2011)Greening Router Line-Cards via Dynamic Management of Packet Memory., , , and . IEEE J. Sel. Areas Commun., 34 (12): 3843-3853 (2016)