Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IP-Telefonie und Firewalls, Probleme und Lösungen., , and . Praxis der Informationsverarbeitung und Kommunikation, 24 (1): 32-40 (2001)Neighborhood watch: On network coding throughput and key sharing., , , , and . GLOBECOM, page 849-854. IEEE, (2013)Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten., , and . Informatik Spektrum, 23 (3): 202-211 (2000)Competition: ContikiMAC with Differentiating Clear Channel Assessment., , and . EWSN, page 301-302. Junction Publishing, Canada / ACM, (2016)µ-MAC: an energy-efficient medium access control for wireless sensor networks., , and . EWSN, page 70-80. IEEE, (2005)Session Introduction: Wireless Sensor Networks.. EUROMICRO, page 494-494. IEEE Computer Society, (2004)Towards Reactive Acoustic Jamming for Personal Voice Assistants., , , and . MPS@CCS, page 12-17. ACM, (2018)Optically Interrogated Unique Object with Simulation Attack Prevention., , , , , and . DATE, page 198-203. IEEE, (2019)Demo abstract: A testbed infrastructure to study the impact of temperature on WSN., , , , and . PerCom Workshops, page 154-156. IEEE Computer Society, (2014)Vehicle-Driver Communication Using Off-the-Shelf Transceivers., , , , and . VTC Fall, page 1-2. IEEE, (2010)