Author of the publication

SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards.

, , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 32-48. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining AntibIoTic with Fog Computing: AntibIoTic 2.0., and . ICFEC, page 1-6. IEEE, (2019)Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks., , , and . VTC Spring, page 1-5. IEEE, (2015)Receiver-initiated medium access control protocols for wireless sensor networks., , , and . Comput. Networks, (2015)Adaptive media access control for energy harvesting - Wireless sensor networks., and . INSS, page 1-4. IEEE, (2012)Privacy and Cryptocurrencies - A Systematic Literature Review., , and . IEEE Access, (2020)Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog., , and . IEEE Access, (2019)A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities., , , and . IEEE Commun. Surv. Tutorials, 22 (4): 2489-2520 (2020)A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective., , and . Int. J. Distributed Sens. Networks, (2015)Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" Computers & Security Volume 137, February 2024, 103602., , , and . Comput. Secur., (March 2024)Evaluation of Professional Cloud Password Management Tools., , and . ICWE Workshops, volume 9881 of Lecture Notes in Computer Science, page 16-28. (2016)