Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

S-search: finding RFID tags using scalable and secure search protocol., , and . SAC, page 439-443. ACM, (2010)Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments., , , , and . J. Syst. Softw., 83 (2): 253-270 (2010)aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach., , , , and . RAID, page 225-240. USENIX Association, (2020)Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime., , , and . WISEC, page 73-84. ACM, (2023)ERAP: ECC Based RFID Authentication Protocol., , and . FTDCS, page 219-225. IEEE Computer Society, (2008)AnonPri: An efficient anonymous private authentication protocol., , and . PerCom, page 102-110. IEEE, (2011)Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , and . SERE (Companion), page 84-93. IEEE, (2013)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , and . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations., , , , and . ICDCS, page 660-669. IEEE Computer Society, (2014)A formal security analysis of ZigBee (1.0 and 3.0)., , and . HotSoS, page 12:1-12:11. ACM, (2020)