From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 316-323. Springer, (2010)Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data., , и . RoboCup, том 11175 из Lecture Notes in Computer Science, стр. 143-155. Springer, (2017)Fault insertion testing of a novel CPLD-based fail-safe system., , , и . DATE, стр. 214-219. IEEE, (2009)ACTIVE - Autonomous Car to Infrastructure Communication Mastering Adverse Environments., , , , , , , , , и 3 other автор(ы). SDF, стр. 1-6. IEEE, (2019)A secured offline authentication approach for industrial mobile robots., , , , и . CASE, стр. 308-313. IEEE, (2017)SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration., , , , , и . RFID, стр. 41-46. IEEE, (2017)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , и . PECCS, стр. 70-75. SciTePress, (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , и . EMSOFT, стр. 214-217. ACM, (2005)Software Configuration Based on Order Processes., , , , , и . BMSD, том 275 из Lecture Notes in Business Information Processing, стр. 200-220. (2016)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , и . VikingPLoP, стр. 5:1-5:13. ACM, (2014)