Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions., , and . CoRR, (2018)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . IEEE Access, (2022)Keyless car sharing system: A security and privacy analysis., , and . ISC2, page 1-7. IEEE, (2016)Privacy-Enhancing Settlements Protocol in Peer-to-Peer Energy Trading Markets., and . ISGT, page 1-5. IEEE, (2022)Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities., , , , , , , , , and . SecDev, page 52-58. IEEE, (2022)Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification., , and . SIoT, page 1-9. IEEE, (2019)SC2Share: Smart Contract for Secure Car Sharing., , , , and . ICISSP, page 163-171. SciTePress, (2019)Certified Private Inference on Neural Networks via Lipschitz-Guided Abstraction Refinement., , , and . FoMLAS@CAV, volume 16 of Kalpa Publications in Computing, page 35-46. EasyChair, (2023)Effect of Clustering in Federated Learning on Non-IID Electricity Consumption Prediction., , , and . ISGT-Europe, page 1-5. IEEE, (2022)Privacy-Preserving Billing for Local Energy Markets (Long Version)., and . CoRR, (2024)