Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Quantum-resistant Virtual Private Networks., , , , , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)Secure Deployment of Quantum Key Distribution in Optical Communication Systems, and . (2017)Application of Code-based KEMs for Secure Optical Network. (2019)Self-Priming in Production: Evidence for a Hybrid Model of Syntactic Priming., , and . Cogn. Sci., (2019)Secure Open Fronthaul Interface for 5G Networks., and . ARES, page 107:1-107:6. ACM, (2021)Machine-learning-based anomaly detection in optical fiber monitoring., , , , , and . JOCN, 14 (5): 365-375 (2022)A 18 µA Rail-to-Rail Class-AB Operational Amplifier with a High-Slew Miller Compensation (HSMC) Technique with 240% Settling Time Reduction in 0.18 µm., , , , , and . ESSCIRC, page 399-402. IEEE, (2021)A 100-MHz 81.2% All-Paths Inductor-Connected Buck-Converter with Balanced Conduction-Losses and Continuous Path-Currents., , , , , and . ESSCIRC, page 323-326. IEEE, (2021)Evaluating Accessibility of Public Information Kiosks., and . ICCHP, volume 3118 of Lecture Notes in Computer Science, page 76-79. Springer, (2004)The Receptor Guided 3D-QSAR Method is a Powerful Tool to Design More Potent IGF-1R Inhibitors., , , , , and . FBIT, page 48-54. IEEE Computer Society, (2007)