Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying a cryptographic metric to post-quantum lattice-based signature algorithms., , , and . ARES, page 87:1-87:8. ACM, (2022)NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence., , , , , , , , , and 21 other author(s). ARES, page 69:1-69:11. ACM, (2024)Vulnerabilities in IoT Devices, Backends, Applications, and Components., , and . ICISSP, page 659-668. SciTePress, (2023)Transparent Security Method for Automating IoT Security Assessments., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 138-153. Springer, (2023)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , and . COINS, page 1-4. IEEE, (2021)Implementing Post-quantum Cryptography for Developers., , and . ICISSP, page 73-83. SCITEPRESS, (2022)Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC., , , and . SECRYPT, page 659-664. SCITEPRESS, (2021)Research Versus Practice in Quantum Software Engineering: Experiences From Credit Scoring Use Case., , , , , and . IEEE Softw., 41 (6): 9-16 (November 2024)Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines., , and . IoTBDS, page 149-156. SCITEPRESS, (2022)A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms., , , , and . HCSE, volume 12481 of Lecture Notes in Computer Science, page 61-83. Springer, (2020)