Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification of Security and Dependability Properties., and . Security and Dependability for Ambient Intelligence, volume 45 of Advances in Information Security, Springer, (2009)Parameter-Confidentiality., , and . GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), volume P-36 of LNI, page 383-394. GI, (2003)Einfache Verklebung von Begriffsverbänden. FB4--Preprint, 1263. TH Darmstadt, (1989)A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles., and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 53-68. Springer, (2018)Editorial., , , , and . J. Syst. Archit., 57 (3): 229-230 (2011)Security patterns modeling and formalization for pattern-based development of secure software systems., , and . Innov. Syst. Softw. Eng., 12 (2): 109-140 (2016)Advanced Security Service cERTificate for SOA: Certified Services go Digital., , , , , , , , , and 1 other author(s). ISSE, page 151-160. Vieweg+Teubner, (2010)ASSERT4SOA: Toward Security Certification of Service-Oriented Applications., , , , , , , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 38-40. Springer, (2010)Efficient Detection of Failure Modes in Electronic Commerce Protocols., , and . DEXA Workshop, page 850-857. IEEE Computer Society, (1999)Analysis of e-commerce protocols: Adapting a traditional technique., , and . Int. J. Inf. Sec., 2 (1): 21-36 (2003)