Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers., , and . IACR Cryptol. ePrint Arch., (2021)SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges., , , , and . IACR Cryptol. ePrint Arch., (2021)Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices., , , and . STM, volume 13867 of Lecture Notes in Computer Science, page 52-70. Springer, (2022)The Effect of Prominence and Cue Association on Retrieval Processes: A Computational Account., , and . Cogn. Sci., (2019)A Framework for Modeling the Interaction of Syntactic Processing and Eye Movement Control., , , and . Top. Cogn. Sci., 5 (3): 452-474 (2013)A computational investigation of sources of variability in sentence comprehension difficulty in aphasia., , , and . CoRR, (2017)Intellectual Property Protection and Licensing of 3D Print with Blockchain Technology., , , and . TE, volume 7 of Advances in Transdisciplinary Engineering, page 103-112. IOS Press, (2018)A content-delivery protocol, exploiting the privacy benefits of coded caching., and . WiOpt, page 1-6. IEEE, (2017)Coded caching for reducing CSIT-feedback in wireless communications., , and . Allerton, page 1099-1105. IEEE, (2015)Confidential types in transaction systems. University of Ulm, Germany, (2022)base-search.net (ftunivulm:oai:oparu.uni-ulm.de:123456789/42998).