Author of the publication

A Novel Approach to Data Revocation on the Internet.

, , and . DPM/QASA@ESORICS, volume 9481 of Lecture Notes in Computer Science, page 134-149. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming, , , , , and . CCGRID '07: Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, page 773--782. Washington, DC, USA, IEEE Computer Society, (2007)Deciphering ADFGVX Messages from World War I Eastern Front, , , and . Cryptologia, (August 2016)A Concept for Intelligent Collaborative Network Intrusion Detection, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)A novel method for securing critical infrastructures by detecting hidden flows of data., , , and . CNS, page 648-654. IEEE, (2015)Informatik mit Recht., , , , and . GI-Jahrestagung, volume P-294 of LNI, page 293-294. GI, (2019)Comparing Nudges and Deceptive Patterns at a Technical Level., , and . DDPCHI@CHI, volume 3720 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing, , and . International Journal of Mobile Network Design and Innovation, 7 (1): 56--67 (2017)The Future of Socio-Technical Design for Ubiquitous Computing Systems, , and . Socio-technical Design of Ubiquitous Computing Systems, Springer, Berlin, (2014)Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages, , and . Cryptologia, (2015)Self-stabilizing embedded systems., and . OC@ICAC, page 59-66. ACM, (2011)