Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I have a DRIHM: A Case Study in Lifting Computational Science Services Up to the Scientific Mainstream., , and . ICCS, volume 51 of Procedia Computer Science, page 2663-2667. Elsevier, (2015)I have a DRIHM: A case study in lifting computational science services up to the scientific mainstream., , and . J. Comput. Sci., (2016)Towards Interconnected Quantum Networks: A Requirements Analysis., and . WISTP, volume 14625 of Lecture Notes in Computer Science, page 49-63. Springer, (2024)Das Datenschutzkonzept für das föderierte Frühwarnsystem im D-Grid und seine technische Umsetzung., , , , , and . DFN-Forum Kommunikationstechnologien, volume P-203 of LNI, page 53-62. GI, (2012)Secure group key distribution in constrained environments with IKEv2., , , and . DSC, page 384-391. IEEE, (2017)Authentication in dynamic groups using identity-based signatures., , and . WiMob, page 1-6. IEEE, (2018)Setting Up an Hydro-Meteo Experiment in Minutes: The DRIHM e-Infrastructure for HM Research., , , , , , , , , and 10 other author(s). eScience, page 47-54. IEEE Computer Society, (2014)Eine vollautomatisierte e-Leaming Plattform am Beispiel eines Universitätspraktikums., and . DFN-Forum Kommunikationstechnologien, volume P-271 of LNI, page 135-144. GI, (2017)Einsatz der graphbasierten Meldungsstrukturanalyse in domänenübergreifenden Meta-IDS.. GI Jahrestagung (2), volume P-68 of LNI, page 653-657. GI, (2005)Weighted Load Balancing in Distributed Hash Tables., , and . iiWAS, page 473-482. ACM, (2019)