Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tetrys: An On-the-Fly Network Coding Protocol., , , and . RFC, (June 2023)IGUANe: a 3D generalizable CycleGAN for multicenter harmonization of brain MR images., , , , and . CoRR, (2024)PEPPER: Precise Privacy-Preserving Contact Tracing with Cheap, BLE/UWB Capable Tokens., , , , , , and . WoWMoM, page 290-299. IEEE, (2023)Privacy-Preserving Pseudonyms for LoRaWAN., , , , , and . WISEC, page 14-19. ACM, (2024)Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive., , , , , , and . CoRR, (2024)A survey of proposals for an alternative group communication service., , and . IEEE Netw., 17 (1): 46-51 (2003)Forward Error Correction (FEC) Framework Extension to Sliding Window Codes., and . RFC, (January 2020)Device Re-identification in LoRaWAN through Messages Linkage., , , and . WISEC, page 98-103. ACM, (2022)TinyMT32 Pseudorandom Number Generator (PRNG)., , , and . RFC, (January 2020)Google Tag Manager: Hidden Data Leaks and its Potential Violations under EU Data Protection Law., , , , and . CoRR, (2023)