Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations., , , and . SIN, page 434. ACM, (2014)Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases., and . EJC, volume 67 of Frontiers in Artificial Intelligence and Applications, page 271-274. IOS Press, (2000)Echoes of the Past: Recovering Blockchain Metrics From Merged Mining., , , , , and . IACR Cryptology ePrint Archive, (2018)Lightweight Address Hopping for Defending the IPv6 IoT., , , , and . ARES, page 20:1-20:10. ACM, (2017)Database Security and Statistical Database Security.. Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content?, , , and . iiWAS, volume 170 of books@ocg.at, Austrian Computer Society, (2003)Security aspects in Semantic Web Services Filtering., , , , , , and . iiWAS, volume 229 of books@ocg.at, page 21-31. Austrian Computer Society, (2007)Security in E-Learning. Advances in Information Security Springer, (2005)On the Usability of Authenticity Checks for Hardware Security Tokens., , , , , , , and . USENIX Security Symposium, page 37-54. USENIX Association, (2021)A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)