From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration., , , , , и . RFID, стр. 41-46. IEEE, (2017)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , и . PECCS, стр. 70-75. SciTePress, (2016)Software Configuration Based on Order Processes., , , , , и . BMSD, том 275 из Lecture Notes in Business Information Processing, стр. 200-220. (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , и . EMSOFT, стр. 214-217. ACM, (2005)A Generic Timing Mechanism for Using the APPLES Gate-Level Simulator in a Mixed-Level Simulation Environment., , и . PATMOS, том 3254 из Lecture Notes in Computer Science, стр. 799-808. Springer, (2004)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , и . VikingPLoP, стр. 5:1-5:13. ACM, (2014)Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 316-323. Springer, (2010)Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data., , и . RoboCup, том 11175 из Lecture Notes in Computer Science, стр. 143-155. Springer, (2017)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , и . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)A secured offline authentication approach for industrial mobile robots., , , , и . CASE, стр. 308-313. IEEE, (2017)