Author of the publication

Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.

, , , and . IEEE Trans. Vehicular Technology, 67 (6): 5287-5301 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators., , and . SEC, volume 278 of IFIP, page 47-61. Springer, (2008)Tracing Stateful Pirate Decoders., , and . ICC, page 1-5. IEEE, (2009)Progressive protection of jpeg2000 codestreams., , and . ICIP, page 3447-3450. IEEE, (2004)A Trust Answer to Distance Query., , and . WCNC, page 2703-2708. IEEE, (2007)Position Manipulation Attacks to Balise-Based Train Automatic Stop Control., , , and . IEEE Trans. Vehicular Technology, 67 (6): 5287-5301 (2018)Efficient block-based transparent encryption for H.264/SVC bitstreams., , , and . Multimedia Syst., 20 (2): 165-178 (2014)Counterfeiting Attack on a Lossless Authentication Watermarking Scheme., , and . VIP, volume 22 of CRPIT, page 109-112. Australian Computer Society, (2002)Zero-Distortion Authentication Watermarking.. ISC, volume 2851 of Lecture Notes in Computer Science, page 325-337. Springer, (2003)IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)., , , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 638-647. Springer, (2017)A Trust-based Pollution Attack Prevention Scheme in Peer-to-Peer Streaming Networks., and . CoRR, (2014)