Author of the publication

The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure.

, , , and . ICSE Companion, page 111-112. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software engineering for secure systems., , and . ICSE, page 1007-1008. ACM, (2006)On Race Vulnerabilities in Web Applications., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 126-142. Springer, (2008)FluXOR: Detecting and Monitoring Fast-Flux Service Networks., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 186-206. Springer, (2008)Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues., and . Mob. Networks Appl., 7 (6): 503-511 (2002)Software engineering for secure systems., , and . ICSE, page 681. ACM, (2005)How to unwittingly sign non-repudiable documents with Java applications., , , and . ACSAC, page 192-196. IEEE Computer Society, (2003)A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators., , , and . WOOT, page 1-7. USENIX Association, (2009)The Complexity of Computing Maximal Word Functions., and . FCT, volume 529 of Lecture Notes in Computer Science, page 157-167. Springer, (1991)The Complexity of Computing Maximal Word Functions., , and . Comput. Complex., (1993)A Tool for Pro-active Defense Against the Buffer Overrun Attack., , and . ESORICS, volume 1485 of Lecture Notes in Computer Science, page 17-31. Springer, (1998)