Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology., , , and . FedCSIS, page 593-602. (2018)Simple Photonic Emission Attack with Reduced Data Complexity., , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 35-51. Springer, (2016)Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT., , , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 111-129. Springer, (2016)Open Source Value Chains for Addressing Security Issues Efficiently., , , , , and . QRS Companion, page 599-606. IEEE, (2018)The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser., , , , , , and . CCSW@CCS, page 11-15. ACM, (2017)Secure cloud computing: Continuous anomaly detection approach in legal metrology., , , and . I2MTC, page 1-6. IEEE, (2018)Blockchain applications for legal metrology., , , and . I2MTC, page 1-6. IEEE, (2018)Dependable multimedia communications: Systems, services, and applications., , , and . J. Network and Computer Applications, 34 (5): 1447-1448 (2011)Invasive PUF Analysis., , , and . FDTC, page 30-38. IEEE Computer Society, (2013)Secrecy Analysis in Protocol Composition Logic., , , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 197-213. Springer, (2006)