Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection Profiles and Generic Security Targets for Smart Cards as Secure Signature Creation Devices - Existing Solutions for the Payment Sector., and . E-smart, volume 2140 of Lecture Notes in Computer Science, page 179-187. Springer, (2001)Abgekabelt. Bild der Wissenschaft,   (4): 92-95 (2010)Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination., , , and . CSR, page 44-49. IEEE, (2022)Lange Nasen für die Chinesen : Seltene Erden: Auswege aus der Abhängigkeit. Bild der Wissenschaft,   (11): 92-97 (2012)mit Lit.-Hinweis und Internetadressen.Kosmische Bombe auf Sibirien : Juni 1908: Explosion über der Taiga. Bild der Wissenschaft, (6): 82-85 (2008)– mit Webadressen.Vernetzte Genialität : die „Erfindung“ des Internets. Kultur & Technik, 37 (1): 6-11 (2013)Essential Workers: A Multiplayer Game for Enacting Patterns of Social Interdependency in a Pandemic., , , , , , and . CHI PLAY (Companion), page 173-177. ACM, (2020)Unwetterwarnung aus dem All : Sonnenstürme können auf der Erde großen Schaden anrichten. Bild der Wissenschaft, 2008 (2): 50-55 (2008)Mit Lit.-Verz..Translatory and rotatory motion of exchange-bias capped Janus particles controlled by dynamic magnetic field landscapes, , , , , , , , and . Scientific Reports, 11 (1): 21794 (2021)An SDN-based Approach to Protect Communication Between Virtual Machines., , , and . LCN, page 262-265. IEEE, (2019)