Author of the publication

When and How to Aggregate Message Authentication Codes on Lossy Channels?

, , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 241-264. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending MUD to Smartphones., , and . LCN, page 353-356. IEEE, (2020)PowerDuck: A GOOSE Data Set of Cyberattacks in Substations., , , , , and . CSET @ USENIX Security Symposium, page 49-53. ACM, (2022)Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)On the benefits of cooperation for dependable wireless communications.. RWTH Aachen University, Germany, (2021)DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps., , and . LCN, page 463-470. IEEE, (2021)Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks., , , and . IEEE Trans. Veh. Technol., 67 (7): 5778-5792 (2018)QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation., , , and . Networking, page 386-394. IEEE, (2020)BP-MAC: Fast Authentication for Short Messages., , , and . WISEC, page 201-206. ACM, (2022)An Interdisciplinary Survey on Information Flows in Supply Chains., , , , , , , , , and 5 other author(s). CoRR, (2024)Communication and Networking for the Industrial Internet of Things, , , , and . Industrial Internet of Things, Springer, Cham, (2017)