Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards More Realistic Network Simulations: Leveraging the System-Call Barrier., , and . ADHOCNETS, volume 184 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 180-191. Springer, (2016)Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks., , and . VTC Spring, page 1-5. IEEE, (2015)Dependable and secure geocast in vehicular networks., , , and . Vehicular Ad Hoc Networks, page 61-68. ACM, (2010)WiSec 2011 demo: PRECIOSA PeRA - practical enforcement of privacy policies in intelligent transportation systems., , , , and . Mobile Computing and Communications Review, 15 (3): 37-38 (2011)Prioritize efficiently: Layer selection in network coding., , , and . Computer Communications, (2019)Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems., , , and . IEEE Communications Surveys and Tutorials, 21 (1): 779-811 (2019)Anonymous Datagrams over DNS Records., , , and . LCN, page 536-544. IEEE, (2018)Short paper: Towards data-similarity-based clustering for inter-vehicle communication., , and . VNC, page 238-241. IEEE, (2013)Privacy context model for dynamic privacy adaptation in ubiquitous computing., , , , and . UbiComp, page 752-757. ACM, (2012)A flexible, subjective logic-based framework for misbehavior detection in V2V networks., , , and . WoWMoM, page 1-6. IEEE Computer Society, (2014)