Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient data aggregation for unattended WSNs., , , and . LCN, page 994-1002. IEEE Computer Society, (2011)C3-Sched - A cache covert channel robust cloud computing scheduler., and . ICITST, page 54-60. IEEE, (2014)Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption., , and . I4CS, page 95-103. (2014)IPonAir - Drahtloses Internet der nächsten Generation., , , , , , , , , and 9 other author(s). Praxis der Informationsverarbeitung und Kommunikation, 26 (4): 190-196 (2003)Ein dezentrales Agentensystem unter Berücksichtigung von mehrseitiger Sicherheit.. University of Hagen, Germany, (2000)Protecting a Mobile Agent's Route against Collusions., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)Code Attestation with Compressed Instruction Code., and . IICS, volume P-186 of LNI, page 170-181. GI, (2011)Methods for Protecting a Mobile Agent's Route., , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 57-71. Springer, (1999)Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles., , , , , , , , , and 2 other author(s). SIGCOMM, page 271-272. ACM, (2012)Security enhanced multi-hop over the air reprogramming with Fountain Codes., , , and . LCN, page 850-857. IEEE Computer Society, (2009)