Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PeQES: a platform for privacy-enhanced quantitative empirical studies., , , and . SAC, page 1226-1234. ACM, (2021)WAIT: protecting the integrity of web applications with binary-equivalent transparency., , and . SAC, page 1950-1953. ACM, (2021)Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns., , , , , , and . SAC, page 1217-1225. ACM, (2021)Identitäten in mobilen Ad hoc Netzwerken., , and . GI Jahrestagung (2), volume P-68 of LNI, page 349-353. GI, (2005)Secure Service Function Chaining in the Context of Zero Trust Security., , , , and . LCN, page 123-131. IEEE, (2022)Privacy of Smart Traffic Lights Systems., , , , , and . VNC, page 17-24. IEEE, (2023)iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service., , , and . VNC, page 1-8. IEEE, (2018)Ride and Hide: A Study on the Privacy of Ride Hailing Services., , and . VNC, page 1-8. IEEE, (2019)Cyclic Data Synchronization through Resusing SyncML, , , and . The Ninth International Conference on Mobile Data Management (mdm 2008), Beijing, China, IEEE, (April 2008)Transparent Migration of Mobile Agents using Java Platform Debugger Architecture, , , and . Mobile Agents (MA'01), volume 2240/2001 of LNCS, Atlanta, USA, Springer, (December 2001)