Author of the publication

Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices.

, , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable transmission of avatar video streams in virtual environments., , , and . ICME, page 631-634. IEEE Computer Society, (2004)An overlay network providing application-aware multimedia services., , , and . AAA-IDEA, page 7. ACM, (2006)Dynamic Interactions in Physically Realistic Collaborative Virtual Environments., , and . IEEE Trans. Vis. Comput. Graph., 11 (6): 649-660 (2005)TweetPos: A Tool to Study the Geographic Evolution of Twitter Topics., , , and . WEBIST (1), page 257-266. SciTePress, (2014)ALVIC-NG: state management and immersive communication for massively multiplayer online games and communities., , , , and . Multim. Tools Appl., 45 (1-3): 109-131 (2009)Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices., , , and . Secur. Commun. Networks, (2017)Improving CEMA using Correlation Optimization., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 1-24 (2019)The Privacy API: Facilitating Insights in How One's Own User Data is Shared., , and . EuroS&P Workshops, page 72-75. IEEE, (2017)Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles., , , and . WISEC, page 189-194. ACM, (2014)PHY-layer security is no alternative to cryptography., , and . WISEC, page 160-162. ACM, (2017)