Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a Multi-Layer Intrusion Response System for Connected Vehicles., , and . VTC Fall, page 1-2. IEEE, (2022)SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication., , , , and . DATE, page 529-534. IEEE, (2021)ORIGO: Proving Provenance of Sensitive Data with Constant Communication., , , , and . IACR Cryptol. ePrint Arch., (2024)Anonymous Domain Ownership., , and . ICBC, page 1-3. IEEE, (2023)Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles., , , , and . VTC2023-Spring, page 1-7. IEEE, (2023)Quantitative System-Level Security Verification of the IoV Infrastructure., , , , and . CoRR, (2021)SoK: Data Sovereignty., , , , , , , , and . EuroS&P, page 122-143. IEEE, (2023)SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation., , , , , and . IEEE Internet Things J., 10 (4): 3384-3406 (February 2023)Attack Data Generation Framework for Autonomous Vehicle Sensors., , , , and . DATE, page 128-131. IEEE, (2022)Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3., , , and . IACR Cryptol. ePrint Arch., (2023)