Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural processing of targets in visible, multispectral IR and SAR imagery., , , , , , , and . Neural Networks, 8 (7-8): 1029-1051 (1995)Detecting and displaying novel computer attacks with Macroscope., , and . IEEE Trans. Syst. Man Cybern. Part A, 31 (4): 275-281 (2001)Why Measuring Security Is Hard., and . IEEE Secur. Priv., 8 (4): 46-54 (2010)SoK: Blockchain Technology and Its Potential Use Cases., , , , and . CoRR, (2019)The Real Cost of Software Errors., and . IEEE Secur. Priv., 7 (2): 87-90 (2009)Building on the Success of Building Security In., , , , , and . IEEE Secur. Priv., 15 (4): 85-87 (2017)Blockchain technology: what is it good for?, , , , and . Commun. ACM, 63 (1): 46-53 (2020)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , and . CSF, page 412-427. IEEE, (2022)Robust keys from physical unclonable functions., , , and . HOST, page 88-92. IEEE Computer Society, (2014)Computing on Masked Data: a High Performance Method for Improving Big Data Veracity., , , , , , and . CoRR, (2014)