Author of the publication

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities.

, , , , , , , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 238-239. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case study on multiple fault dependability and security evaluations., , , , , , , and . Microprocessors and Microsystems - Embedded Hardware Design, 37 (2): 218-227 (2013)Using field strength scaling to save energy in mobile HF-band RFID-systems., , , , , and . EURASIP J. Emb. Sys., (2013)System side-channel leakage emulation for HW/SW security coverification of MPSoCs., , , , , and . DDECS, page 139-144. IEEE, (2012)Bring your own key for the industrial Internet of Things., , , , , and . ICIT, page 1430-1435. IEEE, (2017)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , and . VikingPLoP, page 5:1-5:13. ACM, (2014)A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems., , , , , , and . DSD, page 372-378. IEEE Computer Society, (2014)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , and . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)Modular Fault Injector for Multiple Fault Dependability and Security Evaluations., , , , , and . DSD, page 550-557. IEEE Computer Society, (2011)Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems., , , , , , , and . DSD, page 337-344. IEEE Computer Society, (2013)PtNBridge - A Power-Aware and Trustworthy Near Field Communication Bridge to Embedded Systems., , , , , , and . DSD, page 907-914. IEEE Computer Society, (2013)