Author of the publication

Structuring Modular Safety Software Certification by Using Common Criteria Concepts.

, and . EUROMICRO-SEAA, page 47-50. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Client Authentication for Transport Layer Security.. Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 268-280. Springer, (2010)Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.. INTRUST, volume 6163 of Lecture Notes in Computer Science, page 88-103. Springer, (2009)Anonymous Ticketing for NFC-Enabled Mobile Phones., , , and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 66-83. Springer, (2011)Anonymous RFID Authentication Using Trusted Computing Technologies.. RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 91-102. Springer, (2010)A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms., and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 311-324. Springer, (2010)Structuring Modular Safety Software Certification by Using Common Criteria Concepts., and . EUROMICRO-SEAA, page 47-50. IEEE Computer Society, (2012)Secure Boot Revisited., and . ICYCS, page 2360-2365. IEEE Computer Society, (2008)Implementation Aspects of Mobile and Embedded Trusted Computing., and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 29-44. Springer, (2009)Towards customizable, application specific mobile trusted modules., and . STC@CCS, page 31-40. ACM, (2010)An integrated architecture for trusted computing for java enabled embedded devices.. STC, page 2-6. ACM, (2007)