Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Classical Cipher Types with Feature-Learning Approaches., , , , , and . AusDM, volume 1504 of Communications in Computer and Information Science, page 152-164. Springer, (2021)Mobile Software Engineering Master Seminar. (2012)Ciphertext-Only Cryptanalysis of Hagelin M-209 Messages, , and . Cryptologia, (2015)A Novel Approach to Data Revocation on the Internet, , and . 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria, (09 to appear)Ciphertext-Only Cryptanalysis of Hagelin M-209 Pins and Lugs, , and . Cryptologia, (2015)Of Ciphers and Neurons - Detecting the Type of Ciphers Using Artificial Neural Networks.. HistoCrypt, volume 171 of Linköping Electronic Conference Proceedings, page 77-86. Linköping University Electronic Press, (2020)Deciphering ADFGVX Messages from World War I Eastern Front, , , and . Cryptologia, (August 2016)A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering., , , , and . HistoCrypt, volume 183 of Linköping Electronic Conference Proceedings, page 111-120. Linköping University Electronic Press, (2021)Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575., and . HistoCrypt, volume 183 of Linköping Electronic Conference Proceedings, page 80-89. Linköping University Electronic Press, (2021)Interdisziplinäre Sicherheitsanalyse, , and . 10. Berliner Werkstatt Mensch-Maschine-Systeme - Grundlagen und Anwendungen der Mensch-Maschine-Interaktion, Berlin, (Oktober 2013)