Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concordance of knots in S 1 × S 2., , , and . J. Lond. Math. Soc., 98 (1): 59-84 (2018)A Report on Design and Implementation of Protected Searchable Data in IaaS, , and . SICS, (2016)Ein Plattform-Ökosystem für Predictive Maintenance zur Erhöhung der Effizienz und Effektivität der Instandhaltung in kleinen und mittleren Unternehmen (KMU), , , , and . Die hybride Fabrik - menschliche und künstliche Intelligenz im Einklang: Fachtagung Bernetzt planen und produzieren VPP2019, Sonderheft 25, Chemnitz, Germany, (November 2019)Anonymous Point Collection - Improved Models and Security Definitions.. Karlsruhe Institute of Technology, Germany, (2020)Nonlinear information filtering for distributed multisensor data fusion., , , and . ACC, page 4846-4852. IEEE, (2011)P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation., , , , and . IACR Cryptol. ePrint Arch., (2019)Cortical mechanisms of retinal and extraretinal smooth pursuit eye movements to different target velocities., , , , and . NeuroImage, 41 (2): 483-492 (2008)Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules., , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 312-338 (2021)A specious unlinking strategy., , and . Period. Math. Hung., 69 (2): 207-210 (2014)Different extraretinal neuronal mechanisms of smooth pursuit eye movements in schizophrenia: An fMRI study., , , , , , and . NeuroImage, 34 (1): 300-309 (2007)