Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation-Based Urban Traffic Scene Understanding., , , and . BMVC, page 1-11. British Machine Vision Association, (2009)Towards inter-organizational Enterprise Architecture Management - Applicability of TOGAF 9.1 for Network Organizations., , , , and . AMCIS, Association for Information Systems, (2013)Precise Client-side Protection against DOM-based Cross-Site Scripting., , , , and . USENIX Security Symposium, page 655-670. USENIX Association, (2014)Sichere und datenschutzgerechte Umsetzung medizinischer Register., , , , and . Datenschutz und Datensicherheit, 43 (8): 507-512 (2019)Accelerating QUIC's Connection Establishment on High-Latency Access Networks., , , and . CoRR, (2019)Automatically Proving Purpose Limitation in Software Architectures., , , , , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 345-358. Springer, (2019)AppPETs: a framework for privacy-preserving apps., , , and . SAC, page 1179-1182. ACM, (2018)Using Context and Provenance to defend against USB-borne attacks., , and . ARES, page 1:1-1:9. ACM, (2019)State of the Sandbox: Investigating macOS Application Security., , , , and . WPES@CCS, page 150-161. ACM, (2019)Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames., , , , and . CoRR, (2019)