Author of the publication

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.

, , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 316-323. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , and . EMSOFT, page 214-217. ACM, (2005)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , and . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , and . VikingPLoP, page 5:1-5:13. ACM, (2014)Fault insertion testing of a novel CPLD-based fail-safe system., , , and . DATE, page 214-219. IEEE, (2009)State-of-charge measurement error simulation for power-aware wireless sensor networks., , , and . WCNC, page 2209-2214. IEEE, (2012)Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 316-323. Springer, (2010)Using field strength scaling to save energy in mobile HF-band RFID-systems., , , , , and . EURASIP J. Embed. Syst., (2013)Case study on multiple fault dependability and security evaluations., , , , , , , and . Microprocess. Microsystems, 37 (2): 218-227 (2013)Accelerating Embedded Software Power Profiling Using Run-Time Power Emulation., , , , and . PATMOS, volume 5953 of Lecture Notes in Computer Science, page 186-195. Springer, (2009)A new approach to model communication for mapping and scheduling DSP-applications., , , , and . ICASSP, page 3354-3357. IEEE, (2000)