Author of the publication

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.

, , , , and . IEEE Trans. Inf. Forensics Secur., 9 (12): 2193-2204 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the coverage range of ultrasound-based localization systems., , and . WCNC, page 605-610. IEEE, (2011)Greening Router Line-Cards via Dynamic Management of Packet Memory., , , and . IEEE J. Sel. Areas Commun., 34 (12): 3843-3853 (2016)Securing data provenance in body area networks using lightweight wireless link fingerprints., , , and . TrustED@CCS, page 65-72. ACM, (2013)A key loss recovery scheme for secure broadcasts in wireless sensor networks., , , and . PIMRC, page 1-5. IEEE, (2008)An empirical study of SMS one-time password authentication in Android apps., , , , , , , , , and . ACSAC, page 339-354. ACM, (2019)A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks., , , and . Comput. Secur., (2013)Zero reconciliation secret key generation for body-worn health monitoring devices., , and . WISEC, page 39-50. ACM, (2012)Packet Pacing in Short Buffer Optical Packet Switched Networks., , , and . INFOCOM, IEEE, (2006)A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks., , , and . WISEC, page 245-252. ACM, (2009)Authentication of lossy data in body-sensor networks for healthcare monitoring., , and . SECON, page 470-478. IEEE, (2012)