Author of the publication

Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management.

, , and . ISSE, page 334-342. Vieweg+Teubner, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Trustworthy Mobile Social Networking Services for Disaster Response, , and . CoRR, (2012)Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks, , , and . CoRR, (2012)Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications., , , and . GIIS, page 1-5. IEEE, (2018)Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks., , , and . ICC, page 1-7. IEEE, (2017)Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks., , , and . ICC, page 2016-2021. IEEE, (2013)Towards a Flexible User-Space Architecture for High-Performance IEEE 802.11 Processing., , , and . WiMob, page 1-9. IEEE, (2018)Demo: Leveraging SDN in Critical Infrastructures., , , and . ICIN, page 86-88. IEEE, (2021)On distributed geolocation by employing spring-mass systems., , , and . GIIS, page 1-7. IEEE, (2013)Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks., , and . ICUMT, page 779-785. IEEE, (2012)Dominating an s-t-Cut in a Network., , and . SOFSEM, volume 8939 of Lecture Notes in Computer Science, page 401-411. Springer, (2015)