Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures., , , , and . HOTPOST@MobiHoc, page 31-36. ACM, (2016)Check before storing: what is the performance price of content integrity verification in LRU caching?, , , and . Computer Communication Review, 43 (3): 59-67 (2013)Towards traffic-oriented spreading factor allocations in LoRaWAN systems., , , , , , , , and . Med-Hoc-Net, page 1-8. IEEE, (2018)Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication., , , , , , , , , and 1 other author(s). CoRR, (2018)EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations., , , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)On the feasibility of attribute-based encryption for WLAN access control., , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)A General, Tractable and Accurate Model for a Cascade of LRU Caches., , , and . IEEE Communications Letters, 18 (5): 877-880 (2014)D-StreaMon: From middlebox to distributed NFV framework for network monitoring., , , , , , and . LANMAN, page 1-2. IEEE, (2017)A General, Tractable and Accurate Model for a Cascade of Caches., , , and . CoRR, (2013)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , and . ARES, page 715-724. IEEE Computer Society, (2016)