Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , and . CoRR, (2020)Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units., , , , , and . CoRR, (2018)FAKEY: Fake Hashed Key Attack on Payment Channel Networks., , and . CNS, page 1-9. IEEE, (2023)Metrics for Automated Network Security Design., and . NDSS, The Internet Society, (2013)Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption., , , , and . IOTSMS, page 141-148. IEEE, (2023)Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network., , , and . COMPSAC (1), page 548-556. IEEE Computer Society, (2017)Message from STPSA 2016 Workshop Organizers., , , and . COMPSAC Workshops, page 381. IEEE Computer Society, (2016)978-1-4673-8845-0.A formal model for verifying stealthy attacks on state estimation in power grids., , and . SmartGridComm, page 414-419. IEEE, (2013)Formal synthesis of dependable configurations for advanced metering infrastructures., and . SmartGridComm, page 289-294. IEEE, (2015)A formal model for sustainable vehicle-to-grid management., , and . SEGS@CCS, page 81-92. ACM, (2013)