Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCARR: A Novel Scalable Runtime Remote Attestation., , , , and . CoRR, (2018)Towards Semantic Sensitive Feature Profiling of IoT Devices., , and . IEEE Internet Things J., 6 (5): 8056-8064 (2019)Non-Intrusive Protection for Legacy SCADA Systems., and . IEEE Commun. Mag., 61 (6): 36-42 (June 2023)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 9 (1): 212-225 (2021)Post-Quantum Adversarial Modeling: A User's Perspective., , , and . Computer, 56 (8): 58-67 (August 2023)VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research., , , and . Veh. Commun., (October 2023)File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation., , , and . Int. J. Inf. Sec., 18 (6): 701-713 (2019)Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext., and . Int. J. Inf. Sec., 20 (2): 141-159 (2021)Reinshard: An optimally sharded dual-blockchain for concurrency resolution., , , , and . CoRR, (2021)Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting., , , , and . CoRR, (2021)