Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Set of Power-Management Patterns for Mobile Embedded Systems., , , , , and . VikingPLoP, page 5:1-5:13. ACM, (2014)ACTIVE - Autonomous Car to Infrastructure Communication Mastering Adverse Environments., , , , , , , , , and 3 other author(s). SDF, page 1-6. IEEE, (2019)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , and . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)Horizontal and vertical HW/SW co-design flows for power aware smart card designs., , , , and . Int. J. Embed. Syst., 3 (1/2): 93-106 (2007)Using field strength scaling to save energy in mobile HF-band RFID-systems., , , , , and . EURASIP J. Embed. Syst., (2013)Case study on multiple fault dependability and security evaluations., , , , , , , and . Microprocess. Microsystems, 37 (2): 218-227 (2013)Software Configuration Based on Order Processes., , , , , and . BMSD, volume 275 of Lecture Notes in Business Information Processing, page 200-220. (2016)SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration., , , , , and . RFID, page 41-46. IEEE, (2017)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , and . PECCS, page 70-75. SciTePress, (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , and . EMSOFT, page 214-217. ACM, (2005)