Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . GHTC, page 62-70. IEEE, (2016)Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark., , and . LCN, page 124-132. IEEE, (2018)The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments., , , and . LCN, page 389-397. IEEE, (2019)Survey and Systematization of Secure Device Pairing., , , , and . IEEE Commun. Surv. Tutorials, 20 (1): 517-550 (2018)Secure device-to-device communication for emergency response.. Darmstadt University of Technology, Germany, (2020)ChirpOTLE: a framework for practical LoRaWAN security evaluation., , and . WISEC, page 306-316. ACM, (2020)Survey and Systematization of Secure Device Pairing., , , , and . CoRR, (2017)Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt, , , , and . Die Fortentwicklung des Datenschutzes., Springer, page 77-98. Wiesbaden, Germany, Springer Vieweg, (2018)Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh., , , and . GHTC, page 1-8. IEEE, (2019)Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept., , , and . SSR, page 1-12. ACM, (2019)