Author of the publication

Sustainable Security & Safety: Challenges and Opportunities.

, , , , , , , , and . CERTS, volume 73 of OASIcs, page 4:1-4:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On confidentiality-preserving real-time locking protocols., , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 153-162. IEEE Computer Society, (2013)Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come., , , , and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 232-237. Springer, (2017)On the Use of Underspecified Data-Type Semantics for Type Safety in Low-Level Code, , and . SSV, volume 102 of EPTCS, page 73-87. (2012)Flat but trustworthy: security aspects in flattened hierarchical scheduling., , and . SIGBED Review, 11 (2): 8-12 (2014)Improving Security for Time-Triggered Real-Time Systems with Task Replication., , , and . RTCSA, page 232-233. IEEE Computer Society, (2018)KeYmaera X: An Axiomatic Tactical Theorem Prover for Hybrid Systems., , , , and . CADE, volume 9195 of Lecture Notes in Computer Science, page 527-538. Springer, (2015)Towards Computation with Microchemomechanical Systems., , , , , and . Int. J. Found. Comput. Sci., 25 (4): 507- (2014)Formal Memory Models for the Verification of Low-Level Operating-System Code., , and . J. Autom. Reasoning, 42 (2-4): 189-227 (2009)Query processing on low-energy many-core processors., , , , , , , and . ICDE Workshops, page 155-160. IEEE Computer Society, (2015)Demo abstract: Taming many heterogeneous cores., , , and . RTAS, page 329. IEEE Computer Society, (2015)