Author of the publication

Methodological Security Verification of a Registration Protocol.

, , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 453-462. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodale Bildregistrierung von fpVCT- und OCT-Daten zur Realisierung hochgenauer medizinischer Navigation., , , , , and . CURAC, volume 1475 of CEUR Workshop Proceedings, page 165-168. Der Andere Verlag, Düsseldorf, (2010)Korrektur geometrischer Verzeichnungen zur Kalibrierung von optischen Kohärenztomographiesystemen., , , , , , and . Bildverarbeitung für die Medizin, page 233-238. Springer, (2015)Towards Intra-operative OCT Guidance for Automatic Head Surgery: First Experimental Results., , , , and . MICCAI (3), volume 8151 of Lecture Notes in Computer Science, page 347-354. Springer, (2013)Normal distributions transform in multi-modal image registration of optical coherence tomography and computed tomography datasets., , , and . Medical Imaging: Image Processing, volume 9034 of SPIE Proceedings, page 90343L. SPIE, (2014)Localization accuracy of sphere fiducials in computed tomography images., , , , , and . Medical Imaging: Image-Guided Procedures, volume 9036 of SPIE Proceedings, page 90360Z. SPIE, (2014)A formal methodology for integral security design and verification of network protocols., , and . Journal of Systems and Software, (2014)On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities., , and . CISIS-ICEUTE, volume 369 of Advances in Intelligent Systems and Computing, page 455-462. Springer, (2015)On securing online registration protocols: Formal verification of a new proposal., , and . Knowl.-Based Syst., (2014)Cryptanalysis of a one round chaos-based Substitution Permutation Network., , and . Signal Processing, 93 (5): 1358-1364 (2013)Methodological Security Verification of a Registration Protocol., , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 453-462. Springer, (2014)