Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommendation of secure group communication schemes using multi-objective optimization., , , , and . Int. J. Inf. Sec., 22 (5): 1291-1332 (October 2023)Addressing Shortcomings of Existing DDoS Protection Software Using Software-Defined Networking., , , , and . Softwaretechnik-Trends, 39 (3): 37-39 (2019)Attack-aware Security Function Chain Reordering., , , , , and . CoRR, (2020)Towards a Cryptography Encyclopedia: A Survey on Attribute-Based Encryption, , , , , , , and . Journal of Surveillance, Security and Safety, (2023)Der Grader PABS, and . Automatische Bewertung in der Programmierausbildung, volume 6 of Digitale Medien in der Hochschullehre, chapter 15, ELAN e.V. and Waxmann Verlag, (2017)Performance Evaluation of a Post-Quantum Public-Key Cryptosystem, , , , , , and . 2021 IEEE 40th International Performance Computing and Communications Conference (IPCCC), IEEE, (2021)Measuring the Performance Impact of Branching Instructions., , , , and . SSP, volume 3043 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Physical Attacks on the Railway System., , , , , , and . CoRR, (2023)Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with Focus on IoT., , , , , , and . ICPE, page 233-240. ACM, (2021)Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes., , , , , , and . CIoT, page 158-165. IEEE, (2022)