Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seamless and Secure Bluetooth LE Connection Migration., , , and . CODASPY, page 147-149. ACM, (2017)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks., , and . J. Netw. Syst. Manag., 19 (3): 394-426 (2011)Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , and . CoRR, (2022)Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways., , and . DCOSS, page 66-73. IEEE, (2019)Building a Privacy-Preserving Smart Camera System., , , , , , , and . CoRR, (2022)Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications., , , , , , , , , and 1 other author(s). CoRR, (2023)ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations., , and . ICDCS, page 773-785. IEEE, (2021)