Author of the publication

Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks.

, , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying Electronic Democracy for Public Corporations., , and . EGOV, volume 2739 of Lecture Notes in Computer Science, page 234-239. Springer, (2003)Poster: Establishing Dynamic Secure Sessions for Intra-Vehicle Communication Using Implicit Certificates., , and . EWSN, page 196-197. Junction Publishing / ACM, (2022)Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks., , , and . CoRR, (2023)SimulaTE: simulating complex landscapes of transposable elements of populations.. Bioinform., 34 (8): 1419-1420 (2018)Security Assets in E-Voting., , , and . Electronic Voting in Europe, volume P-47 of LNI, page 171-180. GI, (2004)Secure Data Acquisition for Battery Management Systems., , , and . DSD, page 553-560. IEEE, (2023)Implementing an Internet-Based Voting System for Public Elections - A Project Experience., , and . ICEIS (4), page 28-33. (2003)The Role of Digital Signature Cards in Electronic Voting., , , and . HICSS, IEEE Computer Society, (2004)Electronic Voting: Algorithmic and Implementation Issues., , and . HICSS, page 142. IEEE Computer Society, (2003)Embedded Platform Patterns for Distributed and Secure Logging., , and . EuroPLoP, page 27:1-27:9. ACM, (2021)