Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 163-180. Springer, (2012)A privacy-aware continuous authentication scheme for proximity-based access control., , and . Comput. Secur., (2013)IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations., , and . Sensors, 18 (2): 492 (2018)Preserving Receiver-Location Privacy in Wireless Sensor Networks., , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 15-27. Springer, (2014)HIDE_DHCP: Covert Communications through Network Configuration Messages., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 162-173. Springer, (2012)Privacy-Aware Trust Negotiation., , and . STM, volume 9871 of Lecture Notes in Computer Science, page 98-105. Springer, (2016)Edge-Assisted Vehicular Networks Security., , , and . IEEE Internet of Things Journal, 6 (5): 8038-8045 (2019)Personal IoT Privacy Control at the Edge., , , and . IEEE Secur. Priv., 20 (1): 23-32 (2022)A survey on the (in)security of trusted execution environments., , , and . Comput. Secur., (June 2023)Probabilistic receiver-location privacy protection in wireless sensor networks., , and . Inf. Sci., (2015)