Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 316-323. Springer, (2010)Patterns of Software Modeling., , , , , and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 428-437. Springer, (2014)Supporting evolving security models for an agile security evaluation., , , , , and . ESPRE, page 31-36. IEEE Computer Society, (2014)Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality., , , and . SSIRI, page 342-347. IEEE Computer Society, (2009)An Application Specific Processor for Enhancing Dictionary Compression in Java Card Environment., , , , and . PECCS, page 305-311. SciTePress, (2015)Fast simulation based testing of anti-tearing mechanisms for small embedded systems., , , and . European Test Symposium, page 242. IEEE Computer Society, (2010)Where does all this waste come from?, , , , , and . Journal of Software: Evolution and Process, 27 (8): 584-590 (2015)Memory-efficient on-card byte code verification for Java cards., , , , and . CS2@HiPEAC, page 37-40. ACM, (2014)Idea: Simulation Based Security Requirement Verification for Transaction Level Models., , , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 264-271. Springer, (2011)Impact of Image Sensor Output Data on Power Consumption of the Image Processing System., , and . IntelliSys (1), volume 542 of Lecture Notes in Networks and Systems, page 618-636. Springer, (2022)