Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Information Infrastructure for EV Charging., , and . WISATS, volume 154 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 61-74. Springer, (2015)Deductive Verification of Cryptographic Software., , , and . NASA Formal Methods, volume NASA/CP-2009-215407 of NASA Conference Proceedings, page 146-155. (2009)Formal verification of cryptographic software implementations. University of Minho, Portugal, (2012)A Deductive Verification Platform for Cryptographic Software., , , and . ECEASST, (2010)A Framework for Combining and Ranking Static Analysis Tool Findings Based on Tool Performance Statistics., , , and . QRS Companion, page 595-596. IEEE, (2017)A security protocol for information-centric networking in smart grids., and . SEGS@CCS, page 1-10. ACM, (2013)Supporting smart electric vehicle charging with information-centric networking., , , and . QSHINE, page 174-179. IEEE, (2014)Verifying Cryptographic Software Correctness with Respect to Reference Implementations., , , and . FMICS, volume 5825 of Lecture Notes in Computer Science, page 37-52. Springer, (2009)