Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks., and . MONET, 10 (6): 879-896 (2005)Privacy versus scalability in radio frequency identification systems., and . Computer Communications, 33 (18): 2155-2163 (2010)Modeling adaptive node capture attacks in multi-hop wireless networks., and . Ad Hoc Networks, 5 (6): 801-814 (2007)A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems., , , and . IEEE Trans. Automat. Contr., 59 (12): 3224-3237 (2014)Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport., and . Proceedings of the IEEE, 101 (8): 1834-1855 (2013)Special Issue on Cyber-Physical Systems Scanning the Issue., , , , , , and . Proceedings of the IEEE, 100 (1): 6-12 (2012)Cross-layer design for energy-efficient secure multicast communications in ad hoc networks., and . ICC, page 3633-3639. IEEE, (2004)Spatial-Temporal Access Control for E-health Services., , , and . NAS, page 269-276. IEEE Computer Society, (2010)Passivity framework for composition and mitigation of multi-virus propagation in networked systems., , , and . ACC, page 2453-2460. IEEE, (2015)On the Authentication of RFID Systems with Bitwise Operations., and . NTMS, page 1-6. IEEE, (2008)