Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security for pervasive medical sensor networks., , , and . MobiQuitous, page 1-10. ICST / IEEE, (2009)Direkte Ende-zu-Mitte Authentifizierung in kooperativen Netzen.. Ausgezeichnete Informatikdissertationen, volume D-12 of LNI, GI, (2011)On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios., , , , and . GI Jahrestagung (2), volume P-51 of LNI, page 239-244. GI, (2004)Cooperative security in distributed sensor networks., , , and . CollaborateCom, page 96-105. IEEE Computer Society / ICST, (2007)Leichtgewichtige Sicherheitsmechanismen für das Host Identity Protocol.. Prax. Inf.verarb. Kommun., 32 (1): 48-52 (2009)Impact of Packet Filtering on Time-Sensitive Networking Traffic., , , and . WFCS, page 59-66. IEEE, (2021)Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks., , and . PODC, page 326-327. ACM, (2009)Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks., , , , , , and . CoNEXT, page 91-109. ACM, (2022)Secure Resolution of End-Host Identifiers for Mobile Clients., , , and . GLOBECOM, page 1-6. IEEE, (2011)Einsatz Verteilter Hash-Tabellen in mobilen Netzen.. Informatiktage, volume S-2 of LNI, page 73-76. GI, (2005)