Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Key Management for Smart Power Grids - Approaches and Issues, , , , , , and . CoRR, (2012)PEAR: a hardware based protocol authentication system., , and . SPRINGL, page 18-25. ACM, (2010)Privacy-preserving management of transactions' receipts for mobile environments., , , , , and . IDtrust, page 73-84. ACM, (2009)Marlin: making it harder to fish for gadgets., , , and . CCS, page 1016-1018. ACM, (2012)VeryIDX - A Digital Identity Management System for Pervasive Computing Environments., , , , , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 268-279. Springer, (2008)Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions., , , and . SmartGridComm, page 324-329. IEEE, (2012)Enforcing physically restricted access control for remote data., and . CODASPY, page 203-212. ACM, (2011)PUF ROKs: a hardware approach to read-once keys., , and . AsiaCCS, page 155-164. ACM, (2011)PUF ROKs: generating read-once keys from physically unclonable functions., , and . CSIIRW, page 19. ACM, (2010)Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 293-306. Springer, (2013)