Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prospect: peripheral proxying supported embedded code testing., , and . AsiaCCS, page 329-340. ACM, (2014)From old to new: Assessing cybersecurity risks for an evolving smart grid., , , and . Computers & Security, (2016)Communications for AnyPLACE: A smart metering platform with management and control functionalities., , , , , and . ETFA, page 1-8. IEEE, (2016)Open and Secure: Amending the Security of the BSI Smart Metering Infrastructure to Smart Home Applications via the Smart Meter Gateway., , , , , , , and . SmartER Europe, volume 495 of IFIP Advances in Information and Communication Technology, page 136-146. Springer, (2017)Practical Risk Assessment Using a Cumulative Smart Grid Model., , , , and . SMARTGREENS, page 31-42. SciTePress, (2014)Architecture-driven smart grid security management., , , and . IH&MMSec, page 153-158. ACM, (2014)Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering Extended Version., , , , and . CoRR, (2016)Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering., , , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 559-577. Springer, (2016)Security and Privacy Implementations within the AnyPLACE Energy Management Solution., , , and . ETFA, page 861-868. IEEE, (2018)Vanity, cracks and malware: insights into the anti-copy protection ecosystem., , and . ACM Conference on Computer and Communications Security, page 809-820. ACM, (2012)