Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research., , , , and . Comput. Secur., (2018)Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors., , and . Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, (2017)Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 70 (3): 2310-2321 (2021)Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , and . IOTSMS, page 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , and . CHI Extended Abstracts, page 339:1-339:6. ACM, (2024)Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility., , , , and . Telematics Informatics, 34 (4): 339-349 (2017)Adaptive Traffic Fingerprinting for Darknet Threat Intelligence., , , and . CoRR, (2018)Security in Online Games: Current Implementations and Challenges., , , , and . Handbook of Big Data and IoT Security, Springer, (2019)Anonymity networks and the fragile cyber ecosystem., , and . Netw. Secur., 2016 (3): 10-18 (2016)