Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks., , , and . IEEE/ACM Trans. Netw., 28 (5): 2188-2202 (2020)Analyzing TETRA Location Privacy and Network Availability., , , , and . SPSM@CCS, page 117-122. ACM, (2016)Next2You: Robust Copresence Detection Based on Channel State Information., , , , , and . ACM Trans. Internet Things, 3 (2): 11:1-11:31 (2022)Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs., , and . SRIF@SIGCOMM, page 17-24. ACM, (2013)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . CoRR, (2018)Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark., , and . LCN, page 124-132. IEEE, (2018)On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market., , , and . Wirtschaftsinformatik, page 1307-1321. University of Siegen, Germany / AISeL, (2019)Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves., , , , and . CNS, page 335-343. IEEE, (2015)ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices., , , , , , , and . CoRR, (2020)Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging., , , and . CoRR, (2023)