Autor der Publikation

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

Samaneh Vahid Dastjerdi University of Stuttgart

Data for: Formation of common preferential two-phase displacement pathways in porous media, , und . Dataset, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Formation of common preferential two-phase displacement pathways in porous media. Water Resources Research (Submitted Jan. 2024).
Data for: Formation of common preferential two-phase displacement pathways in porous media, , und . Dataset, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Formation of common preferential two-phase displacement pathways in porous media. Water Resources Research (Submitted Jan. 2024).Image processing code for characterization of multiphase flow in porous media, und . Software, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Experimental evaluation of fluid connectivity in two-phase flow in porous media during drainage. Water Resources Research 58 (2022), e2022WR033451. doi: 10.1029/2022WR033451.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for "How Deep Is Your Gaze? Leveraging Distance in Image-Based Gaze Analysis", , , und . Dataset, (2024)Related to: Maurice Koch, Nelusa Pathmanathan, Daniel Weiskopf, and Kuno Kurzhals.2024. How Deep Is Your Gaze? Leveraging Distance in Image-Based GazeAnalysis. In 2024 Symposium on Eye Tracking Research and Applications(ETRA ’24), June 04–07, 2024, Glasgow, United Kingdom. ACM, New York,NY, USA, 7 pages. doi: 10.1145/3649902.3653349.
 

Weitere Publikationen von Autoren mit dem selben Namen

One-touch Financial Transaction Authentication., , , und . SECRYPT, Seite 5-12. INSTICC Press, (2009)AES-CCM Cipher Suites for Transport Layer Security (TLS)., und . RFC, (Juli 2012)Breaking ECC2K-130., , , , , , , , , und 13 andere Autor(en). IACR Cryptology ePrint Archive, (2009)Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms., und . CRYPTO, Volume 1462 von Lecture Notes in Computer Science, Seite 472-485. Springer, (1998)Statistics on Password Re-use and Adaptive Strength for Financial Accounts., , und . SCN, Volume 8642 von Lecture Notes in Computer Science, Seite 218-235. Springer, (2014)Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware., , , , , und . FPL, Seite 133-138. IEEE Computer Society, (2010)The Certicom Challenges ECC2-X., , , , , , , , , und 8 andere Autor(en). IACR Cryptology ePrint Archive, (2009)Shoehorning Security into the EPC Tag Standard., und . SCN, Volume 4116 von Lecture Notes in Computer Science, Seite 303-320. Springer, (2006)Covert channels in privacy-preserving identification systems., , , und . ACM Conference on Computer and Communications Security, Seite 297-306. ACM, (2007)Vulnerabilities in First-Generation RFID-enabled Credit Cards., , , , und . Financial Cryptography, Volume 4886 von Lecture Notes in Computer Science, Seite 2-14. Springer, (2007)