Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Program Execution in the Cloud applying Homomorphic Encryption, , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)A JEE-based Architecture for Distributed Multi-Domain Resource Accounting, , and . Proc. of 6th IEEE International Conference on eScience, Brisbane, Australia, DOI:10.1109/eScienceW.2010.15, ISBN:978-0-7695-4295-9/10, pp. 31-38, IEEE, (2010)e-IRG Task Force Report on Legal Issues, , , , , , , , , and . (2013)Betrieb sicherer Netzinfrastrukturen für Grid-Umgebungen., , , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-73 of LNI, page 289-303. GI, (2005)