Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In AI We Trust: Ethics, Artificial Intelligence, and Reliability.. Sci. Eng. Ethics, 26 (5): 2749-2767 (2020)The Future of Transportation: Ethical, Legal, Social and Economic Impacts of Self-driving Vehicles in the Year 2025.. Sci. Eng. Ethics, 26 (3): 1185-1208 (2020)Belief Revision and Verisimilitude., and . Notre Dame J. Formal Log., 36 (1): 15-29 (1995)Untraceability in the applied pi-calculus., , , and . ICITST, page 1-6. IEEE, (2009)Artificial intelligence ethics guidelines for developers and users: clarifying their content and normative implications., and . J. Inf. Commun. Ethics Soc., 19 (1): 61-86 (2021)A Trusted Infrastructure for P2P-based Marketplaces., , and . Peer-to-Peer Computing, page 151-154. IEEE, (2009)Towards a Verified Reference Implementation of a Trusted Platform Module., , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)Software Package Requirements and Procurement., , and . IWSSD, page 141-145. IEEE Computer Society, (1996)Approximating ATL* in ATL., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 289-301. Springer, (2002)Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 89-108. Springer, (2012)