Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Impact of Presentation Format and Self-Reported Risk Aversion on Revealed Skewness Preferences., , and . Decision Analysis, 6 (2): 57-74 (2009)Security of trusted repeater quantum key distribution networks., , , , , and . J. Comput. Secur., 18 (1): 61-87 (2010)Spring und Hibernate: Eine praxisbezogene Einführung, , , , and . Hanser, München, (2007)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)Psychologie und Altersvorsorge, and . Dt. Inst. für Altersvorsorge, Köln, (2007)GGPONC 2.0 - The German Clinical Guideline Corpus for Oncology: Curation Workflow, Annotation Policy, Baseline NER Taggers., , , , , , , , , and . LREC, page 3650-3660. European Language Resources Association, (2022)Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software., , , , , and . SAFECOMP, volume 3688 of Lecture Notes in Computer Science, page 81-93. Springer, (2005)Alternative Entscheidungskonzepte in der Banktheorie. Wirtschaftswissenschaftliche Beiträge Physica-Verl., Heidelberg, (1999)Quantenkryptographisch gesicherte Netzwerke zur Schlüsselverteilung: Grundlagen, Topologien und das Quantum-Back-Bone des Integrierten Projekts SECOQC., and . Elektrotech. Informationstechnik, 124 (5): 126-130 (2007)