Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit., , , and . Datenschutz und Datensicherheit, 31 (5): 338-342 (2007)Mobile Platform Security, , , , , , and . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2013)Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions., , , , and . Towards Hardware-Intrinsic Security, Springer, (2010)Guest Editorial Special Section on Hardware Security and Trust., , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 873-874 (2015)Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization., , , , , and . IEEE Symposium on Security and Privacy, page 574-588. IEEE Computer Society, (2013)A Security Architecture for Accessing Health Records on Mobile Phones., , , , and . HEALTHINF, page 87-96. SciTePress, (2011)Private Auctions with Multiple Rounds and Multiple Items., , and . DEXA Workshops, page 423-427. IEEE Computer Society, (2002)Readactor: Practical Code Randomization Resilient to Memory Disclosure., , , , , , , and . IEEE Symposium on Security and Privacy, page 763-780. IEEE Computer Society, (2015)The Cybersecurity Landscape in Industrial Control Systems., , , , , , and . Proceedings of the IEEE, 104 (5): 1039-1057 (2016)Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure., , and . EUSIPCO, page 1-4. IEEE, (2002)