Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aspect-oriented Modeling of Attacks in Automotive Cyber-Physical Systems., , and . DAC, page 21:1-21:6. ACM, (2014)Secure channels in an integrated MPSoC architecture., and . IECON, page 4488-4493. IEEE, (2013)Virtual CAN Lines in an Integrated MPSoC Architecture., , , , and . ISORC, page 158-165. IEEE Computer Society, (2014)Enhancing security in CAN systems using a star coupling router., , and . SIES, page 237-246. IEEE, (2012)Towards Secure Time-Triggered Systems., , , , , , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 365-372. Springer, (2012)A System-on-a-Chip Platform for Mixed-Criticality Applications., , and . ISORC, page 210-216. IEEE Computer Society, (2010)A Vision of Swarmlets., , , , , and . IEEE Internet Comput., 19 (2): 20-28 (2015)Actors Revisited for Time-Critical Systems., , , , , , and . DAC, page 152. ACM, (2019)Authentication in Time-Triggered Systems Using Time-Delayed Release of Keys., , and . ISORC, page 31-39. IEEE Computer Society, (2011)Copy protection for automotive electronic control units using authenticity heartbeat signals.. INDIN, page 821-826. IEEE, (2012)