Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocation games in ephemeral networks., , , and . ACM Conference on Computer and Communications Security, page 199-210. ACM, (2008)Self-organized Anonymous Authentication in Mobile Ad Hoc Networks., , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 350-372. Springer, (2009)Optimal revocations in ephemeral networks: A game-theoretic framework., , , and . WiOpt, page 21-30. IEEE, (2010)The security of VANETs., and . Vehicular Ad Hoc Networks, page 93-94. ACM, (2005)DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots., , and . MobiSys, ACM / USENIX, (2004)The security of vehicular ad hoc networks., and . SASN, page 11-21. ACM, (2005)Secure Vehicular Communication Systems: Design and Architecture, , , , , , , , , and . CoRR, (2009)DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots., , , and . IEEE Trans. Mob. Comput., 5 (12): 1691-1705 (2006)On the tradeoff between trust and privacy in wireless ad hoc networks., , and . WISEC, page 75-80. ACM, (2010)Fast Exclusion of Errant Devices from Vehicular Networks., , , , , and . SECON, page 135-143. IEEE, (2008)