Author of the publication

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.

, , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 349-365. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Engine for Polymorphic Shellcode Detection., , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 19-31. Springer, (2005)Secure Routing Approach for Unstructured P2P Systems., and . SECURWARE, page 210-216. IEEE Computer Society, (2009)Event Correlation on the Basis of Activation Patterns., , and . PDP, page 631-640. IEEE Computer Society, (2010)Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods., , and . Int. J. Netw. Secur., 9 (2): 164-172 (2009)Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS).. TERENA Networking Conference, TERENA, (2004)General security concept for embedded P2P systems., , and . MobiQuitous, ICST / ACM, (2008)A 155 Mbps Triple-DES Network Encryptor., , , , , and . CHES, volume 1965 of Lecture Notes in Computer Science, page 164-174. Springer, (2000)Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning., , and . ePart, volume 5694 of Lecture Notes in Computer Science, page 139-150. Springer, (2009)Robustness-Agile Encryptor for ATM Networks., , , , , and . SEC, volume 175 of IFIP Conference Proceedings, page 231-240. Kluwer, (2000)Massive Data Mining for Polymorphic Code Detection., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 448-453. Springer, (2005)