Author of the publication

Data-Centric Security for the IoT.

, , , and . IoT 360 (2), volume 170 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-86. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. rer. nat. Daniel Hernandez University of Stuttgart

An Ontology for the Reuse and Tracking of Prefabricated Building Components, , , , , and . Proceedings of the The 2nd International Workshop on Knowledge Graphs for Sustainability (KG4S 2024) colocated with the 21st Extended Semantic Web Conference (ESWC 2024), 3753, page 53-64. CEUR, (May 2024)
An Ontology for the Reuse and Tracking of Prefabricated Building Components, , , , , and . Proceedings of the The 2nd International Workshop on Knowledge Graphs for Sustainability (KG4S 2024) colocated with the 21st Extended Semantic Web Conference (ESWC 2024), 3753, page 53-64. CEUR, (May 2024)Proceedings of the The 2nd International Workshop on Knowledge Graphs for Sustainability (KG4S 2024) colocated with the 21st Extended Semantic Web Conference (ESWC 2024), , , , , and (Eds.) 3753, CEUR, (May 2024)

Daniel Widmann University of Stuttgart

A SiGe-HBT 2:1 analog multiplexer with more than 67 GHz bandwidth, , , , , , , , , and . 2017 IEEE Bipolar/BiCMOS Circuits and Technology Meeting (BCTM), page 146-149. 978-1-5090-6383-3 and 978-1-5090-6382-6 and 978-1-5090-6384-0, IEEE, (2017)
 

Other publications of authors with the same name

Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis., and . Datenschutz und Datensicherheit, 31 (12): 888-893 (2007)Robustness to Code and Data Deletion in Autocatalytic Quines., , , and . Trans. Computational Systems Biology, (2008)Data-Centric Security for the IoT., , , and . IoT 360 (2), volume 170 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-86. (2015)BIONETS: Self Evolving Services in Opportunistic Networking Environments., , , , , , , , and . BIONETICS, volume 39 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-94. Springer, (2009)A Research Framework for Interaction Computing., and . OPAALS, volume 67 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 224-244. Springer, (2010)Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android., , , and . WISTP, volume 7322 of Lecture Notes in Computer Science, page 208-223. Springer, (2012)BIOMICS Project: Biological and Mathematical Basis of Interaction Computing., , , , , , , and . IJUC, 8 (4): 283-287 (2012)Self-Replicating and Self-Modifying Programs in Fraglets., , and . BIONETICS, page 159-167. ICST / IEEE, (2007)URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security., , , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 50-65. Springer, (2013)Adaptive Security Architectures for Global Sensing Applications., and . ECEASST, (2011)