Author of the publication

Web MIXes: A System for Anonymous and Unobservable Internet Access.

, , and . Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, page 115-129. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Oliver Röhrle University of Stuttgart

Data for: Rheological Analysis and Evaluation of Measurement Techniques for the Curing Polymethylmethacrylate Bone Cement in Vertebroplasty, , , , , , , , and . Dataset, (2024)Related to: Trivedi, Z., Wychowaniec, J. K., Gehweiler, D., Sprecher, C. M., Boger, A., Gueorguiev, B., D’Este, M., Ricken, T., & Röhrle, O. (2023). Rheological Analysis and Evaluation of Measurement Techniques for the Curing Polymethylmethacrylate Bone Cement in Vertebroplasty. arXiv: arXiv:2312.11426.
 

Other publications of authors with the same name

Efficiency Improvements of the Private Message Service., , , and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 112-125. Springer, (2001)Privacy-Techniken im Überblick., and . Datenbank-Spektrum, (2006)Identity Management Based on P3P., and . Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, page 141-160. Springer, (2000)The Disadvantages of Free MIX Routes and how to Overcome Them., , and . Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, page 30-45. Springer, (2000)CookieCooker - Cookies tauschen - Profile vermischen., and . Datenschutz und Datensicherheit, (2003)RFID: Verbraucherängste und verbraucherschutz., , and . Wirtschaftsinformatik, 47 (6): 422-430 (2005)Privacy., and . Datenbank-Spektrum, 11 (11): 41-44 (2004)Dummy Traffic against Long Term Intersection Attacks., and . Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, page 110-128. Springer, (2002)Datenschutz und soziale Netzwerke.. LOG IN, 30 (165): 18-25 (2010)Effizienter unbeobachtbarer Datenbankzugriff.. Wirtschaftsinformatik, page 1267-1286. Physica-Verlag, (2005)