Search for persons
X
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
2
Acoustic integrity codes : secure device pairing using s..:
, In:
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
3
ChirpOTLE : a framework for practical LoRaWAN security e..:
, In:
?
2019 IEEE Global Humanitarian Technology Conference (GHTC) ,
4
Bluemergency: Mediating Post-disaster Communication Systems..:
, In:
?
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop ,
5
Toxic Friends in Your Network : Breaking the Bluetooth M..:
, In:
?
2019 IEEE 44th Conference on Local Computer Networks (LCN) ,
6
The King is Dead Long Live the King! Towards Systematic Per..:
, In:
?
DuD-Fachbeiträge; Die Fortentwicklung des Datenschutzes ,
7
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rech..:
, In:
?
Proceedings of the 13th Workshop on Challenged Networks ,
8