Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Information Retrieval From a Cellular Network With Caching at the Edge., , , and . IEEE Trans. Communications, 67 (7): 4900-4912 (2019)Parametric and Probabilistic Model Checking of Confidentiality in Data Dispersal Algorithms (Extended Version)., , , , and . CoRR, (2016)On the security of transmissions over fading wiretap channels in realistic conditions., , and . ICC, page 1-6. IEEE, (2017)Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication., , and . CoRR, (2019)Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels., , and . Entropy, 19 (9): 491 (2017)Parametric and probabilistic model checking of confidentiality in data dispersal algorithms., , , , and . HPCS, page 476-483. IEEE, (2016)Resource Allocation for Secure Gaussian Parallel Relay Channels with Finite-Length Coding and Discrete Constellations., , and . CoRR, (2018)Private Information Retrieval From a Cellular Network With Caching at the Edge., , , and . CoRR, (2018)Achieving semantic security without keys through coding and all-or-nothing transforms over wireless channels., , and . GlobalSIP, page 964-969. IEEE, (2016)A Probabilistic Small Model Theorem to Assess Confidentiality of Dispersed Cloud Storage., , , , , , and . QEST, volume 10503 of Lecture Notes in Computer Science, page 123-139. Springer, (2017)