Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Proofs of Pairing-Based Cryptography., , and . ACM Conference on Computer and Communications Security, page 1156-1168. ACM, (2015)Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds., , , , , and . IET Inf. Secur., 10 (6): 358-371 (2016)Knowledge Processing and Contextualisation by Automatical Metadata Extraction and Semantic Analysis., , , , and . EC-TEL, volume 5192 of Lecture Notes in Computer Science, page 378-383. Springer, (2008)Automatische Extraktion von Metadaten aus verschiedenen Dateiformaten., and . Informatiktage, volume S-6 of LNI, page 181-184. GI, (2008)Practical Aspects for Exploration and Analysis of Manual Interventions in Process Plants., , , , and . INDIN, page 1-6. IEEE, (2021)Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties., , , and . CSF, page 78-94. IEEE Computer Society, (2012)LiCoRMS - Towards a Resource Management System Based on Lifecycle and Content Information., , and . CONTEXT, volume 6967 of Lecture Notes in Computer Science, page 292-295. Springer, (2011)Support for collaborative situation analysis and planning in crisis management teams using interactive tabletops., , , , and . ITS, page 273-282. ACM, (2013)Fitness tracker or digital personal coach: how to personalize training., , , and . UbiComp/ISWC Adjunct, page 1063-1067. ACM, (2015)Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model., , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 822-851. Springer, (2016)