Author of the publication

Multi-node coordinated jamming for location privacy protection.

, and . MILCOM, page 1243-1249. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Hardware Architecture for Operations in GF(2m)., , and . IEEE Trans. Computers, 51 (1): 90-92 (2002)Phantom: Physical layer cooperation for location privacy protection., , , and . INFOCOM, page 3061-3065. IEEE, (2012)Exploiting vertical diversity in vehicular channel environments., , and . PIMRC, page 958-962. IEEE, (2009)Effect of Antenna Placement and Diversity on Vehicular Network Communications., , , , , , and . SECON, page 112-121. IEEE, (2007)Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study., , , , , , , , and . USENIX Security Symposium, page 323-338. USENIX Association, (2010)Location-Based Flooding Techniques for Vehicular Emergency Messaging., , and . MobiQuitous, page 1-9. IEEE Computer Society, (2006)A simplified homology-model builder toward highly protein-like structures: An inspection of restraining potentials., , , , , and . Journal of Computational Chemistry, 33 (24): 1927-1935 (2012)VnD: a structure-centric database of disease-related SNPs and drugs., , , , , , and . Nucleic Acids Research, 39 (Database-Issue): 939-944 (2011)An Improved Method of Multiplication on Certain Elliptic Curves., , , , and . Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 310-322. Springer, (2002)Joint Power Control and Scheduling Algorithm for Wi-Fi Ad-hoc Networks., , , and . WICON, page 1-9. ICST / IEEE, (2010)