Author of the publication

Bußgeldadressaten nach dem BSIG unter besonderer Berücksichtigung des Entwurfs der zweiten Richtlinie zur Netz- und Informationssicherheit

, and . Daten, Plattformen und KI als Dreiklang unserer Zeit. Tagungsband DSRI-Herbstakademie 2022, page 825-843. Edewecht, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bürokommunikation und soziale Veränderungen in Europa. Soziales Europa Amt für Amtliche Veröff. der Europ. Gemeinschaften, Luxemburg, (1992)Raman transitions between hyperfine clock states in a magnetic trap, , , and . Phys. Rev. A, (July 2016)Bußgeldadressaten nach dem BSIG unter besonderer Berücksichtigung des Entwurfs der zweiten Richtlinie zur Netz- und Informationssicherheit, and . Daten, Plattformen und KI als Dreiklang unserer Zeit. Tagungsband DSRI-Herbstakademie 2022, page 825-843. Edewecht, (2022)High-resolution 3D spatial modelling of complex geological structures for an environmental risk assessment of abundant mining and industrial megasites., , , and . Comput. Geosci., 35 (1): 165-182 (2009)Distributed Private Data Analysis: Lower Bounds and Practical Constructions., , , and . ACM Trans. Algorithms, 13 (4): 50:1-50:38 (2017)MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture., , , and . IACR Cryptology ePrint Archive, (2020)Online Submodular Maximization with Free Disposal., , , , and . ACM Trans. Algorithms, 14 (4): 56:1-56:29 (2018)Spectral Properties of Laplacian and Stochastic Diffusion Process for Edge Expansion in Hypergraphs., , and . CoRR, (2015)Large Scale Density-friendly Graph Decomposition via Convex Programming., , and . WWW, page 233-242. ACM, (2017)More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 158-188. Springer, (2018)