Author of the publication

Towards Continuous Sensor Operation: Modelling a Secured Smart Sensor in a Sparse Network Operated by Energy Harvesting.

, , , and . PECCS, page 57-64. ScitePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration., , , , , and . RFID, page 41-46. IEEE, (2017)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , and . PECCS, page 70-75. SciTePress, (2016)Software Configuration Based on Order Processes., , , , , and . BMSD, volume 275 of Lecture Notes in Business Information Processing, page 200-220. (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , and . EMSOFT, page 214-217. ACM, (2005)A Generic Timing Mechanism for Using the APPLES Gate-Level Simulator in a Mixed-Level Simulation Environment., , and . PATMOS, volume 3254 of Lecture Notes in Computer Science, page 799-808. Springer, (2004)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , and . VikingPLoP, page 5:1-5:13. ACM, (2014)Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 316-323. Springer, (2010)Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data., , and . RoboCup, volume 11175 of Lecture Notes in Computer Science, page 143-155. Springer, (2017)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , and . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)A secured offline authentication approach for industrial mobile robots., , , , and . CASE, page 308-313. IEEE, (2017)