Author of the publication

Ethical and Secure Data Sharing across Borders.

, , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 136-140. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An isolated virtual cluster for SCADA network security research., , and . ICS-CSR, BCS, (2013)A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks., , , and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 177-196. Springer, (2018)Talking Agents: A distributed architecture for interactive artistic installations., and . Integr. Comput. Aided Eng., 17 (3): 243-259 (2010)Optimal Algorithmic Cooling of Spins., , , and . UC, volume 4618 of Lecture Notes in Computer Science, page 2-26. Springer, (2007)The never ending war in the stack and the reincarnation of ROP attacks., , and . CoRR, (2020)Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input., , , and . CCECE, page 1-6. IEEE, (2020)Optimising sybil attacks against P2P-based botnets., , and . MALWARE, page 78-87. IEEE Computer Society, (2009)Providing SCADA Network Data Sets for Intrusion Detection Research., and . CSET @ USENIX Security Symposium, USENIX Association, (2016)Shoulder Arthroscopy Training System with Force Feedback., , , and . MediVis, page 71-76. IEEE Computer Society, (2006)Scalable Security Verification of Software at Compile Time., , , , and . SCAM, page 115-124. IEEE Computer Society, (2014)