Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in industrial IoT - quo vadis?, , , , and . Elektrotech. Informationstechnik, 133 (7): 324-329 (2016)Hardware-security technologies for industrial IoT: TrustZone and security controller., , and . IECON, page 2589-2595. IEEE, (2015)A secure hardware module and system concept for local and remote industrial embedded system identification., , , , and . ETFA, page 1-7. IEEE, (2014)Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT., , , and . INDIN, page 706-713. IEEE, (2016)SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration., , , , , and . RFID, page 41-46. IEEE, (2017)ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online., , , , and . ICITST, page 171-177. IEEE, (2014)Security vulnerabilities and risks in industrial usage of wireless communication., , , , , and . ETFA, page 1-8. IEEE, (2014)Enabling smart maintenance services: Broker-based equipment status data acquisition and backend workflows., , and . INDIN, page 699-705. IEEE, (2016)Trusted Location Based Services., , , and . ICITST, page 185-192. IEEE, (2012)Securing smart maintenance services: Hardware-security and TLS for MQTT., , , , , , , , and . INDIN, page 1243-1250. IEEE, (2015)