Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , and . IEEE Trans. Dependable Sec. Comput., 5 (4): 208-223 (2008)On Secure and Precise IR-UWB Ranging., , , , and . IEEE Trans. Wireless Communications, 11 (3): 1087-1099 (2012)Privacy Threats and Practical Solutions for Genetic Risk Tests., , , , and . IEEE Symposium on Security and Privacy Workshops, page 27-31. IEEE Computer Society, (2015)Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 5 (5): 463-476 (2006)Self-Organized Public-Key Management for Mobile Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 2 (1): 52-64 (2003)Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices., , , , , and . IEEE Trans. Information Forensics and Security, 9 (7): 1141-1156 (2014)Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures., , , , and . IEEE Trans. Wireless Communications, 10 (4): 1334-1344 (2011)Efficient MAC in cognitive radio systems: A game-theoretic approach., , and . IEEE Trans. Wireless Communications, 8 (4): 1984-1995 (2009)A new flexible and modular QoS mapping framework based on psychophysics., , and . MMNS, volume 112 of IFIP Conference Proceedings, page 67-80. Chapman & Hall, (1997)Modeling and testing object-oriented distributed systems with linear-time temporal logic., , and . Concurrency and Computation: Practice and Experience, 13 (5): 385-420 (2001)