Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environmental Authentication in Malware., , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)Human-Robot Collaborative Workflows for Reconfigurable Fabrication Systems in Timber Prefabrication using Augmented Reality., , and . M2VIP, page 576-581. IEEE, (2021)Planning of Curvature-Optimal Smooth Paths for Industrial Robots Using Neural Networks., and . AI4I, page 10-15. IEEE, (2021)A Formal Framework for Environmentally Sensitive Malware., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 211-229. Springer, (2016)Computing on Masked Data to improve the Security of Big Data., , , , , , and . CoRR, (2015)Camera based path planning for low quantity - high variant manufacturing with industrial robots., , , , and . M2VIP, page 1-6. IEEE, (2018)Co-Design of Structural Timber Components Through Automated Model Generation for Manufacturing Simulation of Reconfigurable Manufacturing Systems., and . M2VIP, page 1-6. IEEE, (2023)SoK: Blockchain Technology and Its Potential Use Cases., , , , and . CoRR, (2019)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , and . CSF, page 412-427. IEEE, (2022)Prioritised Unit Propagation by Partitioning the Watch Lists., , and . POS@SAT, volume 3545 of CEUR Workshop Proceedings, page 14-34. CEUR-WS.org, (2023)