Author of the publication

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems.

, , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 288-304. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Attacks on Virtual Worlds., , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 180-195. Springer, (2014)Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators., , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 151-166. Springer, (2013)Tokenisation Blacklisting Using Linkable Group Signatures., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 182-198. Springer, (2016)Recovering from a lost digital wallet: A smart cards perspective extended abstract., , and . Pervasive Mob. Comput., (2016)A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 102-110. Springer, (2013)Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks., , , , , and . CoRR, (2016)Preventing relay attacks in mobile transactions using infrared light., , , and . SAC, page 1724-1731. ACM, (2017)The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 288-304. Springer, (2013)Philanthropy on the Blockchain., , , , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 25-38. Springer, (2017)One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud., , , and . TrustCom, page 328-336. IEEE, (2020)