Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 289-301. Springer, (2012)The Cyber-Physical Attacker.. SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 347-356. Springer, (2012)A calculus for attribute-based communication., , , , and . SAC, page 1840-1845. ACM, (2015)Security Games for Cyber-Physical Systems., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)Availability by Design:A Complementary Approach to Denial-of-Service.. Technical University of Denmark, (2015)Expressive Power of Definite Clauses for Verifying Authenticity., and . CSF, page 251-265. IEEE Computer Society, (2009)