Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Agreement Over Multiple Access Channel., , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 775-790 (2011)Key agreement over multiple access channel using feedback channel., , and . ISIT, page 1970-1974. IEEE, (2011)Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking., , and . ECC, page 883-890. IEEE, (2019)Scalable Security in Interference Channels With Arbitrary Number of Users., , and . ISITA, page 402-406. IEEE, (2020)New attacks on UMTS network access., , and . WTS, page 1-6. IEEE, (2009)Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking., , and . CoRR, (2018)A New Secret key Agreement Scheme in a Four-Terminal Network, , and . CoRR, (2011)Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation., , , and . CNS, page 59-64. IEEE, (2015)An Extended Authentication and Key Agreement Protocol of UMTS., , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 230-244. Springer, (2009)Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access., , and . CASoN, page 158-162. IEEE, (2011)