Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared., , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 73-86. Springer, (2009)AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale., , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 291-307. Springer, (2012)Tardiness Bounds and Overload in Soft Real-Time Systems.. University of North Carolina, Chapel Hill, USA, (2014)base-search.net (ftcarolinadr:cdr.lib.unc.edu:s7526d62k).CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts., , , , and . VNC, page 1-8. IEEE, (2018)Fireaxe: the DHS secure design competition pilot., , , , , , , , , and 3 other author(s). CSIIRW, page 21. ACM, (2013)No One In The Middle: Enabling Network Access Control Via Transparent Attribution., , , , , and . AsiaCCS, page 651-658. ACM, (2018)Response Time Bounds for G-EDF without Intra-Task Precedence Constraints., and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 128-142. Springer, (2011)Soft Real-Time Scheduling in Google Earth., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 141-150. IEEE Computer Society, (2012)Reducing Tardiness under Global Scheduling by Splitting Jobs., and . ECRTS, page 14-24. IEEE Computer Society, (2013)Mixed-Criticality Real-Time Scheduling for Multicore Systems., , , , and . CIT, page 1864-1871. IEEE Computer Society, (2010)