From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Nachfrageelastizitäten im Eisenbahnverkehr. Forschungsarbeiten aus dem Verkehrswesen Bundesministerium für Wissenschaft, Verkehr und Kunst, Wien, (1996)Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions., , , и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 316-323. Springer, (2010)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , и . PECCS, стр. 70-75. SciTePress, (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , и . EMSOFT, стр. 214-217. ACM, (2005)Software Configuration Based on Order Processes., , , , , и . BMSD, том 275 из Lecture Notes in Business Information Processing, стр. 200-220. (2016)Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors., , , , , , и . J. Inf. Secur. Appl., 18 (2-3): 138-147 (2013)Horizontal and vertical HW/SW co-design flows for power aware smart card designs., , , , и . Int. J. Embed. Syst., 3 (1/2): 93-106 (2007)Case study on multiple fault dependability and security evaluations., , , , , , , и . Microprocess. Microsystems, 37 (2): 218-227 (2013)A Novel Automated Interoperability Test and Debug System for Near-Field Communication., , , и . Int. J. RF Technol. Res. Appl., 11 (1): 59-80 (2020)Set of Power-Management Patterns for Mobile Embedded Systems., , , , , и . VikingPLoP, стр. 5:1-5:13. ACM, (2014)