Matthias Hollick

Orcid: 0000-0002-9163-5989

Affiliations:
  • TU Darmstadt, Department of Computer Science, Germany


According to our database1, Matthias Hollick authored at least 311 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Radio Resource Management Design for RSMA: Optimization of Beamforming, User Admission, and Discrete/Continuous Rates With Imperfect SIC.
IEEE Trans. Mob. Comput., December, 2024

Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection.
Proc. Priv. Enhancing Technol., 2024

Sounds Good? Fast and Secure Contact Exchange in Groups.
Proc. ACM Hum. Comput. Interact., 2024

Resilience-by-Design Concepts for 6G Communication Networks.
CoRR, 2024

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts.
IEEE Access, 2024

Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base Station.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

SoK: On the Effectiveness of Control-Flow Integrity in Practice.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Always On Air: Adaptive Physical Layer Switching For Uninterrupted UAV Air-to-Ground Communication.
Proceedings of the 10th Workshop on Micro Aerial Vehicle Networks, 2024

Poster: Leveraging Apple's Find My Network for Large-Scale Distributed Sensing.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
Proceedings of the Computer Security - ESORICS 2024, 2024

PairSonic: Helping Groups Securely Exchange Contact Information.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Energy-Efficient Decentralized Broadcasting in Wireless Multi-Hop Networks.
Sensors, September, 2023

How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
Proc. Priv. Enhancing Technol., April, 2023

Lab Study Dataset: FIDO2 Platform and Roaming Authentication on Smartphones.
Dataset, January, 2023

RadiOrchestra: Proactive Management of Millimeter-Wave Self-Backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control.
IEEE Trans. Wirel. Commun., 2023

Maintaining App Services in Disrupted Cities: A Crisis and Resilience Evaluation Tool.
CoRR, 2023

Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging.
CoRR, 2023

Network Message Field Type Classification and Recognition for Unknown Binary Protocols.
CoRR, 2023

Rolling the D11: An Emulation Game for the Whole BCM43 Family.
Proceedings of the 17th ACM Workshop on Wireless Network Testbeds, 2023

Introducing FreeSpeaker - A Modular Smart Home Hub Prototyping Platform.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Hardening and Speeding Up Zero-interaction Pairing and Authentication.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Detection of Anomalies in Electric Vehicle Charging Sessions.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
ACM Trans. Sens. Networks, November, 2022

Next2You: Robust Copresence Detection Based on Channel State Information.
ACM Trans. Internet Things, 2022

RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things.
CoRR, 2022

AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Proceedings of the 31st USENIX Security Symposium, 2022

AirTag of the Clones: Shenanigans with Liberated Item Finders.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions.
Proceedings of the IEEE International Conference on Communications, 2022

Dynamic network (re-)configuration across time, scope, and structure.
Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit, 2022

Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Myo Keylogging Dataset.
Dataset, November, 2021

Evaluation results from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, October, 2021

Raw data from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, October, 2021

Index of Supplementary Files from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, July, 2021

Raw data from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, June, 2021

Evaluation results from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, June, 2021

Supplementary Material for "Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet".
Dataset, May, 2021

Index of supplementary files from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, May, 2021

Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware.
IEEE Trans. Mob. Comput., 2021

ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices.
Art Sci. Eng. Program., 2021

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System.
Proc. Priv. Enhancing Technol., 2021

My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

Best Practices for Notification Studies for Security and Privacy Issues on the Internet.
CoRR, 2021

OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Happy MitM: fun and toys in every bluetooth device.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

BEAMWAVE: Cross-Layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks.
Proceedings of the 19th International Symposium on Modeling and Optimization in Mobile, 2021

Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
Proceedings of the 30th USENIX Security Symposium, 2021

Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support.
Proceedings of the 30th USENIX Security Symposium, 2021

Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

FastZIP: faster and more secure zero-interaction pairing.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

ARIstoteles - Dissecting Apple's Baseband Interface.
Proceedings of the Computer Security - ESORICS 2021, 2021

Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
Proceedings of the Companion Publication of the 2021 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2021

Very Pwnable Network: Cisco AnyConnect Security Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Supplementary Material for "Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support".
Dataset, November, 2020

Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks.
IEEE/ACM Trans. Netw., 2020

Low-cost Security for Next-generation IoT Networks.
ACM Trans. Internet Techn., 2020

Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
Proc. ACM Meas. Anal. Comput. Syst., 2020

LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
IEEE Internet Things J., 2020

DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
CoRR, 2020

DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework.
CoRR, 2020

DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips.
CoRR, 2020

Empirical Insights for Designing Information and Communication Technology for International Disaster Response.
CoRR, 2020

HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication.
CoRR, 2020

Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communications.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Firmware Insider: Bluetooth Randomness is Mostly Random.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

ToothPicker: Apple Picking in the iOS Bluetooth Stack.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.
Proceedings of the 29th USENIX Security Symposium, 2020

Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio.
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020

Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

NEAT-TCP: Generation of TCP Congestion Control through Neuroevolution of Augmenting Topologies.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

SWAN: Swarm-Based Low-Complexity Scheme for PAPR Reduction.
Proceedings of the IEEE Global Communications Conference, 2020

Improving the Reliability of Bluetooth Low Energy Connections.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

Demo: Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

Concurrent Wireless Cut-Through Forwarding: Ultra-Low Latency Multi-Hop Communication for the Internet of Things.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

2019
Index of supplementary files from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Raw data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Raw data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Raw data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Processed data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Processed data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Processed data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Results for scheme by Karapanos et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Results for scheme by Schürmann and Sigg from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Results for scheme by Miettinen et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Results for scheme by Truong et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

Results for scheme by Shrestha et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019

A systematic approach to constructing families of incremental topology control algorithms using graph transformation.
Softw. Syst. Model., 2019

Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
GetMobile Mob. Comput. Commun., 2019

Zero-Interaction Security-Towards Sound Experimental Validation.
GetMobile Mob. Comput. Commun., 2019

Transitions: A Protocol-Independent View of the Future Internet.
Proc. IEEE, 2019

SCAROS: A Scalable and Robust Self-Backhauling Solution for Highly Dynamic Millimeter-Wave Networks.
IEEE J. Sel. Areas Commun., 2019

CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems.
IEEE J. Sel. Areas Commun., 2019

Perils of Zero-Interaction Security in the Internet of Things.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Proceedings of the 28th USENIX Security Symposium, 2019

Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
Proceedings of the 13th International Workshop on Wireless Network Testbeds, 2019

The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Riding the Waves: Decoding Asynchronous Multi-User MISO via Time-Variant Zero-Forcing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Hybrid Precoding for Multi-Group Multicasting in mmWave Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2019

JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi Interference.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Practical VLC to WiFi Handover Mechanisms.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Towards Transparency in Email Tracking.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications.
IEEE/ACM Trans. Netw., 2018

Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
CoRR, 2018

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
CoRR, 2018

Survey and Systematization of Secure Device Pairing.
IEEE Commun. Surv. Tutorials, 2018

The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices.
Comput. Commun., 2018

Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

One Billion Apples' Secret Sauce: Recipe for the <i>Apple Wireless Direct Link</i> Ad hoc Protocol.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

TPy: A Lightweight Framework for Agile Distributed Network Experiments.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018

Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.
Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, 2018

Demo: Channel Estimation and Custom Beamforming on the 60 GHz TP-Link Talon AD7200 Router.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018

Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response.
Proceedings of the 13th Workshop on Challenged Networks, 2018

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A systematic approach to constructing incremental topology control algorithms using graph transformation.
J. Vis. Lang. Comput., 2017

Instrumenting Wireless Sensor Networks - A survey on the metrics that matter.
Pervasive Mob. Comput., 2017

Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Comput. Commun. Rev., 2017

Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Demonstrating reactive smartphone-based jamming: demo.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Reverse Engineering Human Mobility in Large-scale Natural Disasters.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems, 2017

Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Demo: Nexmon in Action: Advanced Applications Powered by the Nexmon Firmware Patching Framework.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Unsupervised Traffic Flow Classification Using a Neural Autoencoder.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Dynamic role assignment in Software-Defined Wireless Networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Architecture for responsive emergency communications networks.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

A practical and secure social media facility for internet-deprived populations.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

Emergency communication in challenged environments via unmanned ground and aerial vehicles.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Opp-relay: Managing directionality and mobility issues of millimeter-wave via D2D communication.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

2016
On the Privacy and Performance of Mobile Anonymous Microblogging.
IEEE Trans. Inf. Forensics Secur., 2016

NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode.
CoRR, 2016

Xcastor: Secure and scalable group communication in ad hoc networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Using NexMon, the C-based WiFi firmware modification framework.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

STEAN: A storage and transformation engine for advanced networking context.
Proceedings of the 2016 IFIP Networking Conference, 2016

Opportunities and pitfalls in securing visible light communication on the physical layer.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016

Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2016

Competition: Sparkle: Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Analyzing TETRA Location Privacy and Network Availability.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wirel. Commun. Lett., 2015

OFDMA for wireless multihop networks: From theory to practice.
Pervasive Mob. Comput., 2015

Lightweight energy consumption-based intrusion detection system for wireless sensor networks.
Int. J. Inf. Sec., 2015

Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102).
Dagstuhl Reports, 2015

Ripple: High-throughput, reliable and energy-efficient network flooding in wireless sensor networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

APP and PHY in harmony: Demonstrating scalable video streaming supported by flexible physical layer control.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lockpicking physical layer key exchange: weak adversary models invite the thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Distributed Reputation System for Certification Authority Trust Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Show me your phone, I will tell you who your friends are: analyzing smartphone data to identify social relationships.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015

Can I Help You Setting Your Privacy? A Survey-based Exploration of Users' Attitudes towards Privacy Suggestions.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015

Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

APP and PHY in Harmony: A framework enabling flexible physical layer processing to address application requirements.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Corridor-based routing: Constructing and maintaining stable support-structures for wireless multihop transmissions.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Practical covert channels for WiFi systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Using Channel State Information for Tamper Detection in the Internet of Things.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Curve-based planar graph routing with guaranteed delivery in multihop wireless networks.
Pervasive Mob. Comput., 2014

Practical Interference alignment in the frequency domain for OFDM-based wireless access networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

How did you get here? PHY-layer path signatures.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Corridor-based routing: Opening doors to PHY-layer advances for Wireless Multihop Networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Analyzing active probing for practical intrusion detection in Wireless Multihop Networks.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014

Usable Privacy for Mobile Sensing Applications.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Short paper: gathering tamper evidence in wi-fi networks based on channel state information.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Demo: WARP drive - accelerating wireless multi-hop cross-layer experimentation on SDRs.
Proceedings of the 2014 ACM workshop on Software radio implementation forum, 2014

Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Patrolling wireless sensor networks: randomized intrusion detection.
Proceedings of the Q2SWinet'14, 2014

Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Building Cross-Layer Corridors in Wireless Multihop Networks.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Measuring the impact of denial-of-service attacks on wireless sensor networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Practical OFDMA for corridor-based routing in Wireless Multihop Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Dynamic curve adaptation for geographic routing in Wireless Multihop Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

BER enhancements for practical interference alignment in the frequency domain.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-Low Latency Communication in Wireless Control Networks.
Proceedings of the Wireless Sensor Networks - 11th European Conference, 2014

2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications.
Pervasive Mob. Comput., 2013

uSafe: A privacy-aware and participative mobile application for citizen safety in urban environments.
Pervasive Mob. Comput., 2013

Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Inf. Secur. Tech. Rep., 2013

Spatial reuse in OFDMA multi-hop networks applying corridor-based routing.
Proceedings of the 17th International ITG Workshop on Smart Antennas, 2013

A blueprint for switching between secure routing protocols in wireless multihop networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Practical OFDMA in wireless networks with multiple transmitter-receiver pairs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Node selection for corridor-based routing in OFDMA multihop networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EVM and RSSI link quality measurements in frequency selective fading channels.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

CSI feedback in OFDMA wireless networks with multiple transmitter-receiver pairs.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs.
Proceedings of the second workshop on Software radio implementation forum, 2013

A rapid prototyping framework for practical OFDMA systems using Software Defined Radios.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Lightweight energy consumption based intrusion detection system for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Let's talk together: Understanding concurrent transmission in wireless sensor networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

On the efficiency of privacy-preserving path hiding for mobile sensing applications.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Face the Enemy: Attack Detection for Planar Graph Routing.
Proceedings of the 2013 Conference on Networked Systems, 2013

Roadmap for Privacy Protection in Mobile Sensing Applications.
Proceedings of the European Data Protection: Coming of Age, 2013

2012
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
Pervasive Mob. Comput., 2012

Two-way relaying for multiple applications in wireless sensor networks.
Proceedings of the International ITG Workshop on Smart Antennas, 2012

Tree-based multi-channel convergecast in Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Corridor-based routing using opportunistic forwarding in OFDMA multihop networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Exploring user preferences for privacy interfaces in mobile sensing applications.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks.
Proceedings of the Q2SWinet'12, 2012

HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A secure monitoring and control system for Wireless Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Protecting IEEE 802.11s wireless mesh networks against insider attacks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

On the accuracy of appliance identification based on distributed load metering data.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2012

On Data-Centric Intrusion Detection in Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012

2011
CORE: centrally optimized routing extensions for efficient bandwidth management and network coding in the IEEE 802.16 MeSH mode.
Wirel. Commun. Mob. Comput., 2011

A security framework for wireless mesh networks.
Wirel. Commun. Mob. Comput., 2011

Bedrohungsanalyse des IEEE 802.11s Standards für drahtlose Mesh-Netze und ausgewählte Sicherheitsmechanismen zur Bedrohungsabwehr.
Prax. Inf.verarb. Kommun., 2011

Neue Herausforderungen in der Netzsicherheit.
Prax. Inf.verarb. Kommun., 2011

A survey on privacy in mobile participatory sensing applications.
J. Syst. Softw., 2011

Energy-efficient fair channel access for IEEE 802.11 WLANs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Curve-Based Planar Graph Routing in Multihop Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Vorstellung "neuer" KUVS-naher Fachgebiete. Fachgebiet Sichere Mobile Netze, Fachbereich Informatik, Technische Universität Darmstadt.
Prax. Inf.verarb. Kommun., 2010

On the trade-off between throughput maximization and energy consumption minimization in IEEE 802.11 WLANs.
J. Commun. Networks, 2010

Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
Future Internet, 2010

The rise and fall of the AODV protocol: A testbed study on practical routing attacks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010

2009
GeoSec: quarantine zones for mobile ad hoc networks.
Secur. Commun. Networks, 2009

Quality of experience of voice communication in large-scale mobile ad hoc networks.
Proceedings of the 2nd IFIP Wireless Days, 2009

Stream-oriented Lossless Packet Compression in Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Throughput and Energy Efficiency in IEEE 802.11 WLANs: Friends or Foes?.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

A Proportionally Fair Centralized Scheduler Supporting Spatial Minislot Reuse for IEEE 802.16 Mesh Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

On the energy efficiency of lossless data compression in wireless sensor networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Distributed bandwidth reservation strategies to support efficient bandwidth utilization and QoS on a per-link basis in IEEE 802.16 Mesh Networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Incorporating spatial reuse into algorithms for bandwidth management and scheduling in IEEE 802.16j relay networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

On the Implications of Adaptive Transmission Power for Assisting MANET Security.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
Proceedings of IEEE International Conference on Communications, 2009

An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modeling of Self-Organizing Systems.
Prax. Inf.verarb. Kommun., 2008

Adapting the User Context in Realtime: Tailoring Online Machine Learning Algorithms to Ambient Computing.
Mob. Networks Appl., 2008

Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Designing a sensor network testbed for smart heterogeneous applications.
Proceedings of the LCN 2008, 2008

CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode.
Proceedings of the LCN 2008, 2008

2007
Der Assistent im Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer.
Prax. Inf.verarb. Kommun., 2007

Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation.
Prax. Inf.verarb. Kommun., 2007

Internet-Telefonie - Voice over IP.
Prax. Inf.verarb. Kommun., 2007

JiST/MobNet: combined simulation, emulation, and real-world testbed for ad hoc networks.
Proceedings of the Second ACM Workshop on Wireless Network Testbeds, 2007

A Case for Joint Routing, Scheduling, and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Modeling static and dynamic behavior of routes in mobile ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006

Research challenges in QoS routing.
Comput. Commun., 2006

Performance Analysis of the Real-time Capabilities of Coordinated Centralized Scheduling in 802.16 Mesh Mode.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

A survey on realworld and emulation testbeds for mobile ad hoc networks.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

2005
Dependable Routing for Cellular and Ad hoc Networks
PhD thesis, 2005

M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

2004
Modeling mobility and workload for wireless metropolitan area networks.
Comput. Commun., 2004

The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

On the effect of node misbehavior in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Comparative Analysis of Quality of Service Routing in Wireless Metropolitan Area Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Per-flow guarantees under class-based priority queueing.
Proceedings of the Global Telecommunications Conference, 2003

2001
Security awareness in service discovery for multimedia collaboration.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Proceedings of the Innovative Anwendungen in Kommunikationsnetzen, 2001

Secure Service Centered Networking for Nomadic Usage.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001


  Loading...