Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System., , , and . RV, volume 9333 of Lecture Notes in Computer Science, page 102-117. Springer, (2015)The privacy in the time of the internet: secrecy vs transparency., , , , , and . CODASPY, page 133-140. ACM, (2012)Towards quantification of firewall policy complexity., , , , and . HotSoS, page 18:1-18:2. ACM, (2015)Failure Feedback for User Obligation Systems., , , , and . SocialCom/PASSAT, page 713-720. IEEE Computer Society, (2010)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols., , , , and . ACM Conference on Computer and Communications Security, page 603-615. ACM, (2016)An Empirical Study of Mnemonic Sentence-based Password Generation Strategies., , , , and . ACM Conference on Computer and Communications Security, page 1216-1229. ACM, (2016)Toward practical authorization-dependent user obligation systems., , , , and . AsiaCCS, page 180-191. ACM, (2010)SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations., , , , , , and . IEEE Symposium on Security and Privacy, page 503-520. IEEE Computer Society, (2017)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . CCS, page 669-684. ACM, (2019)