Author of the publication

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards.

, , , , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 82-97. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patterns for hardware-independent development for embedded systems., , , , , , and . EuroPLoP, page 11:1-11:14. ACM, (2014)On the dictionary compression for Java card environment., , , , and . M-SCOPES, page 68-76. ACM, (2013)A High Performance Java Card Virtual Machine Interpreter Based on an Application Specific Instruction-Set Processor., , , , and . DSD, page 270-278. IEEE Computer Society, (2014)Test-Driven Migration Towards a Hardware-Abstracted Platform., , , , , and . PECCS, page 261-267. SciTePress, (2015)Instruction Folding Compression for Java Card Runtime Environment., , , , and . DSD, page 228-235. IEEE Computer Society, (2014)A Light-weight Compression Method for Java Card Technology., , , , and . EWiLi, volume 1291 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)Evaluation paradigm selection according to Common Criteria for an incremental product development., , , and . MILS@HiPEAC, Zenodo, (2015)Embedding research in the industrial field: a case of a transition to a software product line., , , , , and . WISE@ASE, page 3-8. ACM, (2014)Patterns of Software Modeling., , , , , and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 428-437. Springer, (2014)A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards., , , , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 82-97. Springer, (2013)