Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing., , , , , and . TGC, volume 4912 of Lecture Notes in Computer Science, page 156-168. Springer, (2007)Privacy and Security in Video Surveillance., and . Intelligent Multimedia Surveillance, Springer, (2013)InfoGrid: Acceptance and Usability of Augmented Reality for Mobiles in Real Museum Contexts., , , and . Mensch & Computer Workshopband, Gesellschaft für Informatik e.V., (2018)Modell für eine Lehrerevaluation zum Einsatz eines körper- und raum-bezogenen Miteinander-Lernspiels., , and . Mensch & Computer Workshopband, Gesellschaft für Informatik e.V., (2018)SpelLit Tangible Cross-Device-Interaction beim Erlernen von Lesen und Schreiben., , and . Mensch & Computer Workshopband, page 179-184. Oldenbourg Verlag, (2013)Be-greifbare digitale Lernobjekte., , , , , and . Mensch & Computer Workshopband, page 353-356. Logos Verlag, (2009)Secure embedded visual sensing in end-user applications with TrustEYE.M4., and . ISSNIP, page 1-6. IEEE, (2015)TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing., and . AVSS, page 593-600. IEEE Computer Society, (2010)Managing Hybrid IT-Products., , , and . MKWI, page 2097-2108. Universitätsverlag Göttingen, (2010)Simulation-based performance assessment of an implant scheduler in semiconductor manufacturing., and . WSC, page 3704-3713. IEEE, (2017)