Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the Influence of Communication and Input Devices on Collaboration in Virtual Environments., , , , and . GRAPP, page 341-346. INSTICC Press, (2010)Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices., , , and . Security and Communication Networks, (2017)Improving CEMA using Correlation Optimization., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 1-24 (2019)Scalable transmission of avatar video streams in virtual environments., , , and . ICME, page 631-634. IEEE Computer Society, (2004)PHY-layer security is no alternative to cryptography., , and . WISEC, page 160-162. ACM, (2017)Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles., , , and . WISEC, page 189-194. ACM, (2014)ALVIC-NG: state management and immersive communication for massively multiplayer online games and communities., , , , and . Multimedia Tools Appl., 45 (1-3): 109-131 (2009)A comparative simulation of opportunistic routing protocols using realistic mobility data obtained from mass events., , , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)synchronous MediaSharing: social and communal media consumption for geographically dispersed users., , , and . MMSys, page 107-112. ACM, (2012)TweetPos: A Tool to Study the Geographic Evolution of Twitter Topics., , , and . WEBIST (1), page 257-266. SciTePress, (2014)