Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Information Protocol in HOL/SPIN., , and . TPHOLs, volume 1869 of Lecture Notes in Computer Science, page 53-72. Springer, (2000)Reducing Risk by Managing Software Related Failures in Networked Control Systems., , , and . CDC, page 2866-2871. IEEE, (2006)DOVE: A Data-Oblivious Virtual Environment., , , and . NDSS, The Internet Society, (2021)Free for All! Assessing User Data Exposure to Advertising Libraries on Android., , , , and . NDSS, The Internet Society, (2016)DoS Protection for Reliably Authenticated Broadcast., , , and . NDSS, The Internet Society, (2004)Fair coalitions for power-aware routing in wireless networks., , and . CDC, page 3271-3276. IEEE, (2004)Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs., , , , and . HealthTech, USENIX Association, (2013)Forms of Semantic Specification.. Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)Predictable programs in barcodes., , , and . CASES, page 298-303. ACM, (2002)Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets., , , , , , , , and . ACM Conference on Computer and Communications Security, page 883-894. ACM, (2016)