Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems., , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 151-170. Springer, (2021)Papers, Please... - X.509 Certificate Revocation in Practice., and . DCNET, page 36-40. SciTePress, (2014)Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks., , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 349-365. Springer, (2008)Secure Key Management in Embedded Systems: A First Proposal., , and . IoTBDS, page 81-91. SCITEPRESS, (2021)What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility., , , , , and . ICETE (Selected Papers), volume 585 of Communications in Computer and Information Science, page 58-78. Springer, (2015)The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA., , and . ICETE (Selected Papers), volume 222 of Communications in Computer and Information Science, page 71-83. Springer, (2010)Token-based Authentication for Smartphones., , , and . DCNET/ICE-B/OPTICS, page 51-56. SciTePress, (2013)Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller., , , , , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 430-444. Springer, (2006)Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions., , and . DCNET/ICE-B/OPTICS, page 64-68. SciTePress, (2013)Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography., , , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 74-81. Springer, (2011)