From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 316-323. Springer, (2010)Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality., , , и . SSIRI, стр. 342-347. IEEE Computer Society, (2009)Patterns of Software Modeling., , , , , и . OTM Workshops, том 8842 из Lecture Notes in Computer Science, стр. 428-437. Springer, (2014)Supporting evolving security models for an agile security evaluation., , , , , и . ESPRE, стр. 31-36. IEEE Computer Society, (2014)An Application Specific Processor for Enhancing Dictionary Compression in Java Card Environment., , , , и . PECCS, стр. 305-311. SciTePress, (2015)Where does all this waste come from?, , , , , и . Journal of Software: Evolution and Process, 27 (8): 584-590 (2015)Memory-efficient on-card byte code verification for Java cards., , , , и . CS2@HiPEAC, стр. 37-40. ACM, (2014)Idea: Simulation Based Security Requirement Verification for Transaction Level Models., , , и . ESSoS, том 6542 из Lecture Notes in Computer Science, стр. 264-271. Springer, (2011)Fast simulation based testing of anti-tearing mechanisms for small embedded systems., , , и . European Test Symposium, стр. 242. IEEE Computer Society, (2010)Impact of Image Sensor Output Data on Power Consumption of the Image Processing System., , и . IntelliSys (1), том 542 из Lecture Notes in Networks and Systems, стр. 618-636. Springer, (2022)