Author of the publication

Some Methods for Privacy in RFID Communication.

, , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 42-53. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Throughput with Carrier Sensing Adaptation for IEEE 802.11 Mesh Networks Based on Loss Differentiation., , and . ICC, page 4967-4972. IEEE, (2007)Open and Association MCTAs Access and Allocation Scheme by Staggering Algorithm in IEEE 802.15.3., , , , and . ICOIN, volume 3961 of Lecture Notes in Computer Science, page 493-501. Springer, (2006)Slow-Time Waveform Randomization Performance under Incoherent FMCW Radar Interference., , and . VTC Fall, page 1-7. IEEE, (2021)Stochastic modeling of a single TCP/IP session over a random loss channel., , and . Mobile Networks and Computing, volume 52 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 1-18. DIMACS/AMS, (1999)Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes., , and . MSWiM, page 135-142. ACM, (2013)PHY/MAC adaptation approaches for dense wireless LAN MESH., , and . COMSWARE, page 204-207. IEEE, (2008)Blind channel identification for multirate CDMA systems., and . ICASSP, page 2509-2512. IEEE, (2000)FIR channel identification in multirate communication systems with a subspace method., and . ICASSP, page 2097-2100. IEEE, (2001)A Two-Stage Sensing Technique for Dynamic Spectrum Access., and . ICC, page 4181-4185. IEEE, (2008)Efficient Inter-Vehicle Data Dissemination., , and . VTC Fall, page 1-5. IEEE, (2011)