Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spring und Hibernate: Eine praxisbezogene Einführung, , , , and . Hanser, München, (2007)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)Impact of Presentation Format and Self-Reported Risk Aversion on Revealed Skewness Preferences., , and . Decision Analysis, 6 (2): 57-74 (2009)Psychologie und Altersvorsorge, and . Dt. Inst. für Altersvorsorge, Köln, (2007)A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Security of trusted repeater quantum key distribution networks., , , , , and . J. Comput. Secur., 18 (1): 61-87 (2010)GGPONC 2.0 - The German Clinical Guideline Corpus for Oncology: Curation Workflow, Annotation Policy, Baseline NER Taggers., , , , , , , , , and . LREC, page 3650-3660. European Language Resources Association, (2022)Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software., , , , , and . SAFECOMP, volume 3688 of Lecture Notes in Computer Science, page 81-93. Springer, (2005)Quantenkryptographisch gesicherte Netzwerke zur Schlüsselverteilung: Grundlagen, Topologien und das Quantum-Back-Bone des Integrierten Projekts SECOQC., and . Elektrotech. Informationstechnik, 124 (5): 126-130 (2007)Alternative Entscheidungskonzepte in der Banktheorie. Wirtschaftswissenschaftliche Beiträge Physica-Verl., Heidelberg, (1999)