Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computing with the MPEG RVC Framework.. University of Konstanz, (2012)An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images, , , and . CoRR, (2010)CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm., , , and . IACR Cryptology ePrint Archive, (2011)hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers., , , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 235-249. Springer, (2011)Secure computing with the MPEG RVC framework., , , and . Sig. Proc.: Image Comm., 28 (10): 1315-1334 (2013)Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models., , , , and . Wireless Personal Communications, 58 (4): 831-849 (2011)Energy efficient video compression for wireless sensor networks., , and . CISS, page 629-634. IEEE, (2009)Shared-variable Synchronization Approaches for Dynamic Data Flow Programs., , , , , and . SiPS, page 263-268. IEEE, (2018)Performance benchmarking of RVC based multimedia specifications., , and . ICIP, page 4569-4573. IEEE, (2013)CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm., , , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 299-313. Springer, (2012)