Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An OpenFlow extension for the OMNeT++ INET framework., and . SimuTools, page 322-329. ICST/ACM, (2013)Video quality monitoring based on precomputed frame distortions., , and . IM, page 1306-1311. IEEE, (2013)Turing Completeness of Finite, Epistemic Programs., and . CoRR, (2017)Dissecting the CHES 2018 AES Challenge., , and . IACR Cryptology ePrint Archive, (2019)User-Centric Network-Application Interaction for Live HD Video Streaming., , and . MONAMI, volume 58 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 71-83. Springer, (2012)The Complexity of Reachability in Randomized Sabotage Games., , and . FSEN, volume 5961 of Lecture Notes in Computer Science, page 162-177. Springer, (2009)Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack., and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 51-67. Springer, (2018)Integration of LISP and LISP-MN into INET., , , and . SimuTools, page 299-306. ICST/ACM, (2012)Modeling and evaluation of address resolution scalability in VPLS., , , , and . ICC, page 2741-2746. IEEE, (2012)Global Locator, Local Locator, and Identifier Split (GLI-Split)., , and . Future Internet, 5 (1): 67-94 (2013)