Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of EM Probes Using SEMA of an ECC Design., , and . NTMS, page 1-5. IEEE, (2016)Inherent Resistance of Efficient ECC Designs against SCA Attacks., , , and . NTMS, page 1-5. IEEE, (2016)Wireless network security., , , , , and . Wireless Communications and Mobile Computing, (2006)Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices., , , and . Computer Communications, 30 (7): 1487-1497 (2007)Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks., , and . The Journal of Supercomputing, 20 (2): 161-173 (2001)Enhancing reliability of sensor networks by fine tuning their event observation behavior., and . WOWMOM, page 1-6. IEEE Computer Society, (2008)Design of a tailor-made memory protection unit for low power microcontrollers., , and . SIES, page 225-231. IEEE, (2013)Multi-channel support for preamble sampling MAC protocols in sensor networks., and . SoftCOM, page 149-153. IEEE, (2014)Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering., and . Praxis der Informationsverarbeitung und Kommunikation, 22 (4): 197-203 (1999)Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks., and . Wireless Networks and Security, Springer, (2013)