Author of the publication

Introduction to the Issue on Signal and Information Processing for Privacy.

, , , , and . J. Sel. Topics Signal Processing, 9 (7): 1173-1175 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy versus scalability in radio frequency identification systems., and . Computer Communications, 33 (18): 2155-2163 (2010)Modeling adaptive node capture attacks in multi-hop wireless networks., and . Ad Hoc Networks, 5 (6): 801-814 (2007)A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems., , , and . IEEE Trans. Automat. Contr., 59 (12): 3224-3237 (2014)Spatial-Temporal Access Control for E-health Services., , , and . NAS, page 269-276. IEEE Computer Society, (2010)Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks., and . MONET, 10 (6): 879-896 (2005)Maximizing static network lifetime of wireless broadcast ad hoc networks., and . ICC, page 2256-2261. IEEE, (2003)Cross-layer design for energy-efficient secure multicast communications in ad hoc networks., and . ICC, page 3633-3639. IEEE, (2004)Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport., and . Proceedings of the IEEE, 101 (8): 1834-1855 (2013)Special Issue on Cyber-Physical Systems Scanning the Issue., , , , , , and . Proceedings of the IEEE, 100 (1): 6-12 (2012)Passivity framework for composition and mitigation of multi-virus propagation in networked systems., , , and . ACC, page 2453-2460. IEEE, (2015)