Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing the inverse-Compton catastrophe scenario in the intra-day variable blazar <ASTROBJ>S5 0716+71</ASTROBJ>. I. Simultaneous broadband observations during November 2003, , , , , , , , , and 65 other author(s). \aap, (June 2006)Considerations for appointing an external examiner of a PhD in the biomedical sciences in Sweden: a questionnaire-based survey., and . Scientometrics, 98 (3): 2039-2049 (2014)Key management and secure software updates in wireless process control environments., , , and . WISEC, page 100-108. ACM, (2008)Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes., , and . VTC Fall, page 1-5. IEEE, (2008)Auxiliary channel Diffie-Hellman encrypted key-exchange authentication., , and . QSHINE, page 18. ICST, (2008)A longitudinal and cross-sectional study of Swedish biomedical PhD processes 1991-2009 with emphasis on international and gender aspects., and . Scientometrics, 85 (2): 401-414 (2010)Conducting forensic investigations of cyber attacks on automobile in-vehicle networks., and . e-Forensics, page 8. ICST/ACM, (2008)How to Secure Bluetooth-Based Pico Networks., , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 209-223. Springer, (2007)A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure., and . JNW, 4 (7): 552-564 (2009)Combining Physical and Digital Evidence in Vehicle Environments., and . SADFE, page 10-14. IEEE Computer Society, (2008)