Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microservices: Migration of a Mission Critical System., , , and . CoRR, (2017)Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer., , and . CoRR, (2017)High-level algorithms and data structures requirements for security-by-contract on Java cards., , , and . IJCCBS, 3 (4): 284-304 (2012)When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices., , , , and . SEDA, volume 925 of Advances in Intelligent Systems and Computing, page 55-75. Springer, (2018)A Peer-to-Peer Knowledge Level Open Service Architecture., , and . Wissensmanagement, page 195-201. DFKI, Kaiserslautern, (2005)Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks.. PRIMA, volume 5925 of Lecture Notes in Computer Science, page 508-515. Springer, (2009)Performative Patterns for Designing Verifiable ACLs., and . CIA, volume 4149 of Lecture Notes in Computer Science, page 375-387. Springer, (2006)Sustainable medium access control: Implementation and evaluation of ODMAC., , and . ICC Workshops, page 407-412. IEEE, (2013)A Fault Tolerant Agent Communication Language for Supporting Web Agent Interaction., , and . AC, volume 3859 of Lecture Notes in Computer Science, page 273-288. Springer, (2006)Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs., , , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 1-16. Springer, (2013)