Author of the publication

Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework.

, , , , , , and . IPDPS, page 1-8. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified and Division-Free CORDIC Argument Reduction Method with Unlimited Convergence Domain Including Inverse Hyperbolic Functions., , , and . IEEE Trans. Computers, 43 (11): 1339-1344 (1994)Beyond 6LoWPAN: Web Services in Wireless Sensor Networks., , , and . IEEE Trans. Industrial Informatics, 9 (4): 1795-1805 (2013)DPWSec: Devices profile for Web Services Security., and . ISSNIP, page 1-6. IEEE, (2015)Reduzierung des Leckstromverbrauchs mit gemischten Gattern in Deep Submicron Technologien., , and . MBMV, page 275-283. Fraunhofer Institut für Integrierte Schaltungen, (2006)Dethroning Transport Layer Security in the Embedded World., , and . NTMS, page 1-5. IEEE, (2012)Impact of proactive temperature management on performance of Networks-on-Chip., , and . SoC, page 116-121. IEEE, (2011)Area minimization of redundant CORDIC pipeline architectures., , and . ICCD, page 136-141. (1998)Web Services to improve interoperability of home healthcare devices., , , , and . PervasiveHealth, page 1-4. IEEE, (2009)Improved ZDN-arithmetic for Fast Modulo Multiplication., , and . ICCD, page 166-171. IEEE Computer Society, (2001)GAF&Co: Connectivity aware topology management for sensor networks., , , and . PIMRC, page 2260-2264. IEEE, (2009)