Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locating TINA User Agents: Strategies for a Broker Federation and Their Comparison.. IS&N, volume 1597 of Lecture Notes in Computer Science, page 416-428. Springer, (1999)JAE - A Multi-Agent System with Internet Services Access., , and . IS&N, volume 1238 of Lecture Notes in Computer Science, page 155-164. Springer, (1997)Interactive Design of Geofences for Proactive Location-Based Services in Smart Cities., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1184-1187. IEEE, (2019)Trust Mining: Analyzing Trust in Collaborative Business Processes., , , , , and . IEEE Access, (2021)Innovative Architektur f ür sicheres Cloud Computing: Beispiel eines Cloud-Ecosystems im Gesundheitswesen., , , , , , and . GI-Jahrestagung, volume P-208 of LNI, page 1075-1082. GI, (2012)Uncovering Canvas Fingerprinting in Real-Time and Analyzing ist Usage for Web-Tracking., and . GI-Jahrestagung (Workshops), volume P-285 of LNI, page 97-108. GI, (2018)A Tutorial on the Interoperability of Self-sovereign Identities., , , , and . CoRR, (2022)Beyond Certificates: 6G-ready Access Control for the Service-Based Architecture with Decentralized Identifiers and Verifiable Credentials., , , , , and . CoRR, (2023)Quality of contex: What it is and why we need it, , and . 10th Workshop of the HP OpenView University Association (HPOVUA03)., (2003)Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications., , and . TrustCom, page 676-682. IEEE, (2020)