Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Tracking Based on Behavioral Fingerprints., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 76-95. Springer, (2010)iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments., , , and . SECRYPT, page 170-182. SciTePress, (2013)RDF Data Analysis with Activation Patterns, and . 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria, page 18 - 18. (2010)Android - On-device detection of SMS catchers and sniffers., , , , and . PRISMS, page 1-8. IEEE, (2014)MoCrySIL - Carry Your Cryptographic Keys in Your Pocket., , , and . SECRYPT, page 285-292. SciTePress, (2015)Extracting Semantic Knowledge from Twitter., and . ePart, volume 6847 of Lecture Notes in Computer Science, page 48-59. Springer, (2011)From NLP (Natural Language Processing) to MLP (Machine Language Processing)., , and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 256-269. Springer, (2010)Identifying Cryptographic Functionality in Android Applications., , and . SECRYPT, page 151-162. SciTePress, (2014)Do you think your passwords are secure?, , , , and . PRISMS, page 1-8. IEEE, (2014)Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte., , and . Datenschutz und Datensicherheit, 35 (11): 768-773 (2011)