Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and timely jamming detection in wireless sensor networks., , and . MASS, page 335-343. IEEE Computer Society, (2012)Multilevel µTESLA: Broadcast authentication for distributed sensor networks., and . ACM Trans. Embedded Comput. Syst., 3 (4): 800-836 (2004)Detecting Misused Keys in Wireless Sensor Networks., and . IPCCC, page 272-280. IEEE Computer Society, (2007)Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks., , , , and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 309-324. Springer, (2012)Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.Location-based pairwise key establishments for static sensor networks., and . SASN, page 72-82. ACM, (2003)Privacy Preserving Query Answering in Peer Data Management Systems., , and . ICDCS Workshops, page 64-69. IEEE Computer Society, (2013)Hardening Embedded Networking Devices Against Side-Channel Attacks., and . Ad Hoc & Sensor Wireless Networks, 12 (1-2): 103-124 (2011)Efficient and distributed access control for sensor networks.. Wireless Networks, 16 (8): 2151-2167 (2010)Reusing Existing Test Cases for Security Testing., , , , and . ISSRE, page 323-324. IEEE Computer Society, (2008)