Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LSA Portraiture Robot., , , and . ROBOT (2), volume 418 of Advances in Intelligent Systems and Computing, page 341-352. Springer, (2015)Security Management and Visualization in a Blockchain-based Collaborative Defense., , and . IEEE ICBC, page 108-111. IEEE, (2019)Threat Management Dashboard for a Blockchain Collaborative Defense., , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)Cooperative Signaling of DDoS Attacks in a Blockchain-based Network., and . SIGCOMM Posters and Demos, page 39-41. ACM, (2019)Blockchain Signaling System.. University of Zurich, Zürich, Switzerland, (2021)Digital Mobile Onboarding in Switzerland - a Hands-on Experience., , , , and . IM, page 824-829. IEEE, (2021)The Cooperative DDoS Signaling based on a Blockchain-based System., and . IM, page 760-765. IEEE, (2021)Enabling Dynamic SLA Compensation Using Blockchain-based Smart Contracts., , , and . IM, page 53-61. IFIP, (2019)Architecture and Message Protocol Proposal for Robot's Integration in Multi-Agent Surveillance System., , , , , and . RSCTC, volume 8536 of Lecture Notes in Computer Science, page 366-373. Springer, (2014)Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption., , , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 199-215. Springer, (2023)