Author of the publication

Secure and Trusted Application Execution on Embedded Devices.

, , and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 161-172. Springer, (2010)Can You Call the Software in Your Device be Firmware?, , and . ICEBE, page 188-195. IEEE Computer Society, (2016)Let's Get Mobile: Secure FOTA for Automotive System., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 503-510. Springer, (2015)An Exploratory Analysis of the Security Risks of the Internet of Things in Finance., , , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 164-179. Springer, (2017)Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 214-227. Springer, (2012)Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager., , and . TrustCom, page 448-456. IEEE Computer Society, (2014)A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags., , , , and . TrustCom/BigDataSE/ISPA (1), page 612-620. IEEE, (2015)Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments., , and . ARES, page 7:1-7:10. ACM, (2017)Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper., , and . WISTP, volume 11469 of Lecture Notes in Computer Science, page 129-144. Springer, (2018)Application-Binding Protocol in the User Centric Smart Card Ownership Model., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 208-225. Springer, (2011)