Author of the publication

Ubiquitous computing asks for ubiquitous line of defense.

, and . GI-Jahrestagung, volume P-192 of LNI, page 109. GI, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology., , and . MECO, page 1-4. IEEE, (2020)Automated Simple Analysis Attack., , and . MECO, page 1-4. IEEE, (2020)Demonstration of WISDOM - a Wireless in Field Measurement and Debugging Platform for Wireless Sensor Networks and Devices., and . WiPiEC Journal, (2020)On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack., , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)Using machine learning techniques for hardware performance counter classification and ROP attack detection., , , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns., , , and . CoRR, (2021)Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks., , , , , , and . CoRR, (2021)Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture., , , and . CoRR, (2022)Determining Distributions of Security Means for Wireless Sensor Networks based on the Model of a Neighbourhood Watch., , and . CoRR, (2022)Optical Fault Injection Attacks against Radiation-Hard Shift Registers., , , , and . DSD, page 371-375. IEEE, (2021)