Author of the publication

Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning.

, , and . TrustCom/BigDataSE/ICESS, page 210-217. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways., , , , , and . IEEE Trans. Vehicular Technology, 67 (8): 7437-7449 (2018)On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks., , , and . RTAS, page 103-116. IEEE, (2019)Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles., , , , , and . DSN, page 499-510. IEEE Computer Society, (2017)Towards physical layer identification of cognitive radio devices., , and . CNS, page 1-9. IEEE, (2017)Physical-Layer Identification of Wired Ethernet Devices., , , and . IEEE Trans. Information Forensics and Security, 7 (4): 1339-1353 (2012)A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning., , and . SCAV@CPSWeek, page 35-41. ACM, (2017)Optimized trusted execution for hard real-time applications on COTS processors., , , , and . RTNS, page 50-60. ACM, (2019)JCN October special issue on IoT security and privacy., , , and . Journal of Communications and Networks, 21 (5): 441-443 (2019)Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach., , , and . NDSS, The Internet Society, (2006)Attempts at gauge determination in superconducting transmission lines., and . EIT, page 112-116. IEEE, (2008)