Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Privacy-preserving Mobile Location Analytics., and . EDBT/ICDT Workshops, volume 1558 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Das versteckte Internet, , , , , , , , , and . (2015)Towards a Holistic Privacy Engineering Approach for Smart Grid Systems., and . TrustCom, page 234-241. IEEE Computer Society, (2011)Big Data: Opportunities and Privacy Challenges.. CoRR, (2015)Smart-TV und Privatheit, , , , and . Forum Privatheit und selbstbestimmtes Leben in der Digitalen Welt,, Karlsruhe, (2016)Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection., and . Int. J. Inf. Sec., 16 (2): 195-211 (2017)White Paper "Das versteckte Internet. Zu Hause - Im Auto - Am Körper.", , , , , , , , , and . Forum Privatheit und selbstbestimmtes Leben in der Digitalen Welt, (2015)White Paper Das versteckte Internet, , , , , , , , , and 1 other author(s). Forum Privatheit und selbstbestimmtes Leben in der Digitalen Welt, Karlsruhe, (2015)Quotable Signatures using Merkle Trees., , , and . GI-Jahrestagung, volume P-294 of LNI, page 473-477. GI, (2019)