Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Christian Rohde University of Stuttgart

Moving-Mesh Finite-Volume Methods for Hyperbolic Interface Dynamics. volume 1 : Elliptic and Parabolic Problems of Springer Proceedings in Mathematics & Statistics, page 111-127. Springer, Cham, (2023)

Univ. -Prof. Dr. -Ing. Hans-Christian Reuß University of Stuttgart

Manufacture of a Production-Optimised Liner for Direct Winding Cooling of an Electric Machine, , and . 23. Internationales Stuttgarter Symposium : Automobil- und Motorentechnik, page 204-218. Springer Vieweg, (2023)
Manufacture of a Production-Optimised Liner for Direct Winding Cooling of an Electric Machine, , and . 23. Internationales Stuttgarter Symposium : Automobil- und Motorentechnik, page 204-218. Springer Vieweg, (2023)Deep Learning and Geo-Fencing Based Free Parking Spot Detection Using a Camera Mounted on a Truck, , , and . 23. Internationales Stuttgarter Symposium : Automobil- und Motorentechnik, Springer Vieweg, (2023)Wireless Power Transmission for Powering a Sensor Placed at an Electrical Traction Machine with External Rotor, , and . 23. Internationales Stuttgarter Symposium : Automobil- und Motorentechnik, page 187-203. Wiesbaden, Springer Vieweg, (2023)
 

Other publications of authors with the same name

Towards Multilateral-Secure DRM Platforms., and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 326-337. Springer, (2005)TCG inside?: a note on TPM specification compliance., , , , and . STC, page 47-56. ACM, (2006)Enhancing Security of Computing Platforms with TC-Technology., , , and . ISSE, page 346-361. Vieweg+Teubner, (2004)Secure Data Management in Trusted Computing., , , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 324-338. Springer, (2005)Secure object identification: or: solving the Chess Grandmaster Problem., , and . NSPW, page 77-85. ACM, (2003)Towards multilaterally secure computing platforms - with open source and trusted computing., and . Inf. Sec. Techn. Report, 10 (2): 83-95 (2005)Sicherheitskern(e) für Smartphones: Ansätze und Lösungen - Vom Mikrokern bis zu Capabilities - Verschiedene Lösungsansätze für die App-Trennung und -Kontrolle., , and . Datenschutz und Datensicherheit, 36 (3): 175-179 (2012)Trusted virtual domains: Color your network., , , , , and . Datenschutz und Datensicherheit, 34 (5): 289-294 (2010)Property-based attestation for computing platforms: caring about properties, not mechanisms., and . NSPW, page 67-77. ACM, (2004)Taming "Trusted Platforms" by Operating System Design., and . WISA, volume 2908 of Lecture Notes in Computer Science, page 286-302. Springer, (2003)