Johannes Loinig
According to our database1,
Johannes Loinig
authored at least 22 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Impact of Image Sensor Output Data on Power Consumption of the Image Processing System.
Proceedings of the Intelligent Systems and Applications, 2022
2015
Hardware/software co-design for a high-performance Java Card interpreter in low-end embedded systems.
Microprocess. Microsystems, 2015
Int. J. Secur. Softw. Eng., 2015
An Application Specific Processor for Enhancing Dictionary Compression in Java Card Environment.
Proceedings of the PECCS 2015, 2015
Proceedings of the PECCS 2015, 2015
2014
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014
Embedding research in the industrial field: a case of a transition to a software product line.
Proceedings of the WISE'14, 2014
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
A High Performance Java Card Virtual Machine Interpreter Based on an Application Specific Instruction-Set Processor.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
2013
Proceedings of the International Workshop on Software and Compilers for Embedded Systems, 2013
2012
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Idea: Simulation Based Security Requirement Verification for Transaction Level Models.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
2010
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Towards formal system-level verification of security requirements during hardware/software codesign.
Proceedings of the Annual IEEE International SoC Conference, SoCC 2010, 2010
Proceedings of the 15th European Test Symposium, 2010
2009
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009