Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Enhancing Settlements Protocol in Peer-to-Peer Energy Trading Markets., and . ISGT, page 1-5. IEEE, (2022)Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities., , , , , , , , , and . SecDev, page 52-58. IEEE, (2022)Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification., , and . SIoT, page 1-9. IEEE, (2019)Effect of Clustering in Federated Learning on Non-IID Electricity Consumption Prediction., , , and . ISGT-Europe, page 1-5. IEEE, (2022)Keyless car sharing system: A security and privacy analysis., , and . ISC2, page 1-7. IEEE, (2016)SC2Share: Smart Contract for Secure Car Sharing., , , , and . ICISSP, page 163-171. SciTePress, (2019)Privacy-Preserving Billing for Local Energy Markets (Long Version)., and . CoRR, (2024)Certified Private Inference on Neural Networks via Lipschitz-Guided Abstraction Refinement., , , and . FoMLAS@CAV, volume 16 of Kalpa Publications in Computing, page 35-46. EasyChair, (2023)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . IEEE Access, (2022)Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions., , and . CoRR, (2018)