Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines., , and . IoTBDS, page 149-156. SCITEPRESS, (2022)A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms., , , , and . HCSE, volume 12481 of Lecture Notes in Computer Science, page 61-83. Springer, (2020)Implementing Post-quantum Cryptography for Developers., , and . ICISSP, page 73-83. SCITEPRESS, (2022)Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC., , , and . SECRYPT, page 659-664. SCITEPRESS, (2021)Implementing Post-quantum Cryptography for Developers., , , and . SN Comput. Sci., 4 (4): 365 (July 2023)Applying a cryptographic metric to post-quantum lattice-based signature algorithms., , , and . ARES, page 87:1-87:8. ACM, (2022)Vulnerabilities in IoT Devices, Backends, Applications, and Components., , and . ICISSP, page 659-668. SciTePress, (2023)Transparent Security Method for Automating IoT Security Assessments., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 138-153. Springer, (2023)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , and . COINS, page 1-4. IEEE, (2021)n-Auth: Mobile Authentication Done Right, , , , , and . (2017)