Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

X-by-C: Non-functional Security Challenges., and . ISoLA (1), volume 11244 of Lecture Notes in Computer Science, page 486-501. Springer, (2018)On the Expressiveness of Joining., and . ICE, volume 189 of EPTCS, page 99-113. (2015)Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software., , , and . SSS, volume 12514 of Lecture Notes in Computer Science, page 317-322. Springer, (2020)An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT., , , and . TrustCom/BigDataSE/ICESS, page 293-300. IEEE Computer Society, (2017)The SERUMS tool-chain: Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems., , , , , , , , , and 6 other author(s). IEEE BigData, page 2726-2735. IEEE, (2019)Building User Trust of Critical Digital Technologies., , and . ICIT, page 1199-1204. IEEE, (2020)On the Expressiveness of Intensional Communication.. EXPRESS/SOS, volume 160 of EPTCS, page 30-46. (2014)A combinatory account of internal structure., and . J. Symb. Log., 76 (3): 807-826 (2011)Introduction to the special issue for SPIN 2019., , and . Int. J. Softw. Tools Technol. Transf., 22 (5): 563-564 (2020)An automated and scalable formal process for detecting fault injection vulnerabilities in binaries., , , and . Concurr. Comput. Pract. Exp., (2019)