Author of the publication

Security considerations for IEEE 802.15.4 networks.

, and . Workshop on Wireless Security, page 32-42. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Towards a privacy measurement criterion for voting systems., , , and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 287-288. Digital Government Research Center, (2005)Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)., , and . CQRE, volume 1740 of Lecture Notes in Computer Science, page 192-203. Springer, (1999)Fault Attacks on Dual-Rail Encoded Systems., and . ACSAC, page 483-494. IEEE Computer Society, (2005)From Weak to Strong Watermarking., , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 362-382. Springer, (2007)On the Robustness of Deep K-Nearest Neighbors., and . IEEE Symposium on Security and Privacy Workshops, page 1-7. IEEE, (2019)Tweakable Block Ciphers., , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 31-46. Springer, (2002)A Large-Scale Study of Modern Code Review and Security in Open Source Projects., and . PROMISE, page 83-92. ACM, (2017)You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems., , , and . EVT, USENIX Association, (2008)