From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prozeßschritte zur Testfallauswahl bei der Testfallgenerierung aus UML-Modellen., и . GI Jahrestagung (2), том P-110 из LNI, стр. 405-409. GI, (2007)Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography., , , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 74-81. Springer, (2011)Aspekte einer Theorie zyklischer Kapitalakkumulation. Europäische Hochschulschriften Lang, Frankfurt a.M. u.a., (1982)Smart Elliptic Curve Cryptography for Smart Dust., , , , и . QSHINE, том 74 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 623-634. Springer, (2010)Performance Evaluation of the TLS Handshake in the Context of Embedded Devices., , и . DCNET/OPTICS, стр. 35-44. SciTePress, (2010)Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper., , , , и . DCNET/OPTICS, стр. 125-128. SciTePress, (2010)Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper., , , , и . DCNET/OPTICS, стр. 75-78. SciTePress, (2011)Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems., , , , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 63-79. Springer, (2009)Hash Algorithms for 8051-based Sensornodes., , и . DCNET/ICE-B/OPTICS, стр. 65-68. SciTePress, (2012)Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks., , , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 349-365. Springer, (2008)