Author of the publication

Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems.

, , , , , and . IEEE Internet of Things Journal, 4 (6): 1798-1801 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Onion Name System., , and . PoPETs, 2017 (1): 21-41 (2017)Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems., , , , , and . IEEE Internet of Things Journal, 4 (6): 1798-1801 (2017)On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids., , , , , and . IEEE Internet of Things Journal, 6 (4): 5902-5915 (2019)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , and . CoRR, (2019)On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks., , and . NCA, page 215-218. IEEE Computer Society, (2005)HAWK: An unmanned mini helicopter-based aerial wireless kit for localization., , , , and . INFOCOM, page 2219-2227. IEEE, (2012)Protocol-level hidden server discovery., , , and . INFOCOM, page 1043-1051. IEEE, (2013)When Digital Forensic Research Meets Laws., , , , and . ICDCS Workshops, page 542-551. IEEE Computer Society, (2012)Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures., , , and . ICPADS (1), page 57-63. IEEE Computer Society, (2005)POKs Based Low Energy Authentication Scheme for Implantable Medical Devices., , , and . CoRR, (2018)