Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NTMpy: An open source package for solving coupled parabolic differential equations in the framework of the three-temperature model., , , , and . Comput. Phys. Commun., (2021)A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions., , , , , , and . DG.O, page 536-543. ACM, (2023)YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC., and . ARES, page 137:1-137:8. ACM, (2022)Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World., , , and . Open Identity Summit, volume P-312 of LNI, page 107-118. Gesellschaft für Informatik e.V., (2021)What is a (Digital) Identity Wallet? A Systematic Literature Review., , and . COMPSAC, page 809-818. IEEE, (2022)Policy-based Access Control for the IoT and Smart Cities., , , , and . Open Identity Summit, volume P-293 of LNI, page 157-163. GI, (2019)Towards Cross-Domain eID by Using Agile Mobile Authentication., and . TrustCom/BigDataSE/ICESS, page 570-577. IEEE Computer Society, (2017)Short-Lived Forward-Secure Delegation for TLS., , and . CCSW, page 119-132. ACM, (2020)Extending Expressive Access Policies with Privacy Features., , , and . TrustCom, page 574-581. IEEE, (2022)TPL: A Trust Policy Language., , , , and . IFIPTM, volume 563 of IFIP Advances in Information and Communication Technology, page 209-223. Springer, (2019)