Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Onboarding of IIoT Devices using OPC UA., , and . ETFA, page 1-4. IEEE, (2022)NICER911: Ad-hoc Communication and Emergency Services Using Networking Smartphones and Wireless Home Routers, , , , , and . Proceedings of the 18th International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc 2017), Madras, Chennai, India, (2017)Enabling a Privacy-Preserving Synthesis of Representative Driving Cycles from Fleet Data using Data Aggregation., , , , and . ITSC, page 1384-1389. IEEE, (2018)SCAPI: a scalable attestation protocol to detect software and physical attacks., , , and . WISEC, page 75-86. ACM, (2017)Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge, , , , , , , and . International Conference on Computer Communications and Networks (ICCCN'17): Posters, IEEE, (July 2017)Secure bootstrapping for next-gen industrial automation systems., , , and . Autom., 71 (9): 748-758 (September 2023)Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices., and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 320-338. Springer, (2016)Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles., , and . IEEE Symposium on Security and Privacy Workshops, page 126-131. IEEE, (2019)RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1722-1734 (2022)On the Feasibility and Performance of Secure OPC UA Communication with IIoT Devices., , , and . SAFECOMP, volume 13414 of Lecture Notes in Computer Science, page 189-203. Springer, (2022)