Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats to 5G Group-based Authentication., and . SECRYPT, page 360-367. SciTePress, (2016)Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System., , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 37-54. Springer, (2014)Trusted Launch of Virtual Machine Instances in Public IaaS Environments., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 309-323. Springer, (2012)Towards Secure Multi-tenant Virtualized Networks., and . TrustCom/BigDataSE/ISPA (1), page 1180-1185. IEEE, (2015)Providing User Security Guarantees in Public Infrastructure Clouds., , and . IEEE Trans. Cloud Computing, 5 (3): 405-419 (2017)Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 279-296. Springer, (2013)Security aspects of e-Health systems migration to the cloud., , and . Healthcom, page 212-218. IEEE, (2014)SMACK: Short message authentication check against battery exhaustion in the Internet of Things., , and . SECON, page 274-282. IEEE, (2015)Prototyping intrusion detection in an industrial cloud-native digital twin., , , and . ICIT, page 749-755. IEEE, (2021)CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things., and . PerCom Workshops, page 1-6. IEEE, (2020)