Author of the publication

SμV - the security microvisor: a virtualisation-based security middleware for the internet of things.

, , , , , and . Middleware Industry, page 36-42. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms., , , , and . First Monday, (2014)SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (5): 885-901 (2019)μPnP-Mesh: The plug-and-play mesh network for the Internet of Things., , , , , , and . WF-IoT, page 311-315. IEEE Computer Society, (2015)Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications., , , , and . CBSE, page 27-36. ACM, (2015)SPEED: Secure Provable Erasure for Class-1 IoT Devices., , , and . CODASPY, page 111-118. ACM, (2018)SμV - the security microvisor: a virtualisation-based security middleware for the internet of things., , , , , and . Middleware Industry, page 36-42. ACM, (2017)Safe Reparametrization of Component-Based WSNs., , , and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 524-536. Springer, (2013)Composition-Safe re-parametrization in Distributed Component-based WSN Applications., , , , , and . NCA, page 153-156. IEEE Computer Society, (2013)Automated allocation and configuration of dual stack IP networks., , , and . IM, page 1148-1153. IEEE, (2013)Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks., , , , , , and . CBSE, page 43-48. ACM, (2015)