Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contention-based forwarding for mobile ad hoc networks, , , , and . Ad Hoc Networks, 1 (4): 351--369 (November 2003)On the Estimation of the Number of Unreachable Peers in the Bitcoin P2P Network by Observation of Peer Announcements., , and . CoRR, (2021)Dienstorientiertes Identitätsmanagement für eine Pervasive University., , , , and . GI Jahrestagung (1), volume P-93 of LNI, page 70-74. GI, (2006)TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network., , , and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 177-194. Springer, (2019)How I and others can link my various social network profiles as a basis to reveal my virtual appearance., , and . DFN-Forum Kommunikationstechnologien, volume P-187 of LNI, page 123-132. GI, (2011)A Robust Header Compression Simulator & Visualizer., , and . ARCS, volume 2299 of Lecture Notes in Computer Science, page 274-286. Springer, (2002)KIM-Identitätsmanagement : Projektdokumentation, , , , , and . (2010-05-05)A comparison of single- and multi-hop beaconing in VANETs, , , and . VANET '09: Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking, page 69--78. New York, NY, USA, ACM, (2009)Decentralized Review and Attestation of Software Attribute Claims., , and . IEEE Access, (2022)A Glimpse of the Matrix (Extended Version): Scalability Issues of a New Message-Oriented Data Synchronization Middleware., , and . CoRR, (2019)