Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Driven Development of Self-Organizing Control Applications. Chapter 2.1, in Organic Computing - A Paradigm Shift for Complex Systems, , , , , , , , , and . Birkäuser Verlag, (Jun 14, 2011)Consistency Management for Peer-to-Peer-based Massively Multiuser Virtual Environments, , , , and . Proceedings of the The 1st International Workshop on Massively Multiuser Virtual Environments, MMVE08, organized at the IEEE Virtual Reality 2008, IEEE VR2008, Reno, Nevada, USA, (March 2008)A New Approach for Establishing Pairwise Keys for Securing Wireless Sensor Networks (© 2005 ACM 1-59593-054-X/05/001), , , and . 3rd ACM Conference on Embedded Networked Sensor Systems, SenSys 2005, San Diego, California, USA, (2-4 11 2005)IT-Sicherheit, and . Wirtschaftsinformatik: Eine Einführung (Pearson Studium - Economic BWL), Wirtschaftsinformatik, chapter 15, Hallbergmoos, Germany: Pearson Deutschland GmbH, 3 edition, (Oktober 2015)CrypTool 2.0. Open-Source Kryptologie für Jedermann, , , and . Datenschutz und Datensicherheit (DuD), (October 2014)The Future of Socio-Technical Design for Ubiquitous Computing Systems, , and . Socio-technical Design of Ubiquitous Computing Systems, Springer, Berlin, (2014)Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages, , and . Cryptologia, (2015)Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing, , and . International Journal of Mobile Network Design and Innovation, 7 (1): 56--67 (2017)"Löschen" im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen, , and . Datenschutz und Datensicherheit (DuD), 39 (1/2015): 31-36 (January 2015)Recht auf Vergessen im Internet - Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit?, , and . Datenschutz und Datensicherheit (DuD), 37 (4): 235-241 (April 2013)