Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source location privacy against laptop-class attacks in sensor networks., , , , and . SecureComm, page 5. ACM, (2008)A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model., , , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 280-291. Springer, (2004)On-demand security service., , , , and . PETRA, page 7. ACM, (2012)Event-based experiments in an assistive environment using wireless sensor networks and voice recognition., , , , and . PETRA, ACM, (2009)Local data protection for in-network processing in sensor networks., , , and . ICPS, page 69-78. IEEE Computer Society, (2005)Entrapping Adversaries for Source Protection in Sensor Networks., , , , and . WOWMOM, page 23-34. IEEE Computer Society, (2006)EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments., , , and . Security and Communication Networks, 4 (11): 1243-1256 (2011)Acoustical implicit communication in human-robot interaction., , , and . PETRA, ACM, (2010)Dynamic mix zone: location data sanitizing in assisted environments., , , and . Universal Access in the Information Society, 10 (2): 195-205 (2011)Preventing Unofficial Information Propagation., , , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 113-125. Springer, (2007)