Author of the publication

Authenticating a mobile device's location using voice signatures.

, , , , and . WiMob, page 458-465. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic Signature-Based Mobile Device Location Authentication., , and . IEEE Trans. Mob. Comput., 13 (9): 2156-2169 (2014)Tracing the Source of a Shredded Document.. Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 387-399. Springer, (2002)Networking Technologies in the Developing World., , , , and . C5, page 187-192. IEEE Computer Society, (2008)Authenticating a mobile device's location using voice signatures., , , , and . WiMob, page 458-465. IEEE Computer Society, (2012)Enhancing Internet Streaming Media with Cueing Protocols., and . INFOCOM, page 95-103. IEEE Comptuer Society, (2001)Verifying the Location of a Mobile Device User., and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 57-68. Springer, (2012)Performance Isolation in Network and Computing Systems with Multiple Inputs.. J. Commun., 7 (1): 39-51 (2012)Analyzing Flow Isolation in Shared Resource Systems.. ICCCN, page 1-7. IEEE, (2011)SEPTEMBER - secure electronic publishing trial., , , , , , and . IEEE Commun. Mag., 34 (5): 48-55 (1996)Investigating Integrated Access and Backhaul on the Aether 5G Testbed.. 5GWF, page 281-286. IEEE, (2021)