Author of the publication

Practical limits of the secret key-capacity for IoT physical layer security.

, , , , , and . WF-IoT, page 311-316. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TREC 14 Enterprise Track at CSIRO and ANU., , and . TREC, volume 500-266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2005)Overview of the TREC 2008 Enterprise Track., , , , , and . TREC, volume 500-277 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2008)EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks., , , , , , , , , and 1 other author(s). J. Netw. Syst. Manag., 30 (4): 74 (2022)Focused and aggregated search: a perspective from natural language generation., , and . Inf. Retr., 13 (5): 434-459 (2010)Investigating Searchers' Mental Models to Inform Search Explanations., , , and . ACM Trans. Inf. Syst., 38 (1): 10:1-10:25 (2020)Granular IoT Device Identification Using TF-IDF and Cosine Similarity., , , , and . CPSIOTSEC@CCS, page 91-99. ACM, (2023)Natural search user interfaces for complex biomedical search: An eye tracking study, , , , and . Journal of the Australian Library and Information Association, 66 (4): 364--381 (2017)Report on the future conversations workshop at CHIIR 2021., , , , , , , , , and 10 other author(s). SIGIR Forum, 55 (1): 6:1-6:22 (2021)Globales Management von Wertschöpfungsfunktionen. mir-Edition Gabler, Wiesbaden, (1998)Evaluating Interfaces for Government Metasearch, , and . Proceedings Information Interaction in Context (IIiX), (2010)