Author of the publication

Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing.

, , , and . ARES, page 102:1-102:8. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures., , , and . IACR Cryptol. ePrint Arch., (2020)Analysis of lightweight and efficient symmetric-key primitives.. Royal Holloway, University of London, Egham, UK, (2018)British Library, EThOS.Related-Key Impossible-Differential Attack on Reduced-Round SKINNY., , , , , , and . IACR Cryptology ePrint Archive, (2016)Software Benchmarking of the 2nd round CAESAR Candidates., and . IACR Cryptology ePrint Archive, (2016)The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol., and . CoRR, (2024)Differential Cryptanalysis of Round-Reduced Sparx-64/128., and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 459-475. Springer, (2018)State-Recovery Analysis of Spritz., , and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 204-221. Springer, (2015)Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis., and . SAC, volume 11349 of Lecture Notes in Computer Science, page 163-190. Springer, (2018)Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (1): 192-235 (2019)Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing., , , and . ARES, page 102:1-102:8. ACM, (2019)