Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FireFlow - High Performance Hybrid SDN-Firewalls with OpenFlow., , , and . LCN, page 267-270. IEEE, (2018)Efficient Multi-Satellite Downlinks for Earth Observation Data Based on Distributed Arithmetic Coding., , and . LCN, page 372-380. IEEE, (2019)The Sum of Its Parts: Analysis of Federated Byzantine Agreement Systems., , and . CoRR, (2020)Randomly Walking Can Get You Lost: Graph Segmentation with Unknown Edge Weights, , , and . 10th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition (EMMCVPR), (2015)accepted.Decentralized Contact Tracing Using a DHT and Blind Signatures., , and . IACR Cryptology ePrint Archive, (2020)Hierarchical Layer Selection with Low Overhead in Prioritized Network Coding., , , and . Networking, page 415-423. IFIP, (2018)Crawling the IPFS Network., , , and . Networking, page 679-680. IEEE, (2020)LAMA: Location-Assisted Medium Access for Position-Beaconing Applications., and . MSWiM, page 253-260. ACM, (2019)Ovid: Message-based Automatic Contact Tracing., , and . IACR Cryptol. ePrint Arch., (2020)Tech Report: Inerial HSMs Thwart Advanced Physical Attacks., and . IACR Cryptol. ePrint Arch., (2021)