Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

roomComputers-Bridging Spaces., , , , and . FTDCS, page 75-80. IEEE Computer Society, (1999)Die JavaCard als Programmier- und Ausführungsplattform für verteilte Anwendungen., , and . Java-Informations-Tage, page 100-109. Springer, (1999)Hacker Contest - Sicherheitsprobleme, Lösungen, Beispiele., , and . Xpert.press Springer, (2003)Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten., , and . Informatik Spektrum, 23 (3): 202-211 (2000)Protecting Competitive Negotiation of Mobile Agents., , and . FTDCS, page 145-150. IEEE Computer Society, (1999)Kontextabhängige Zugriffskontrolle für Anwendungen im ubiquitous computing.. Darmstadt University of Technology, Germany, (2002)Scalable Security Mechanisms in Transport Systems for Enhanced Multimedia Services., , , and . ECMAST, volume 1425 of Lecture Notes in Computer Science, page 207-220. Springer, (1998)Enhancing Mobile Agents with Electronic Commerce Capabilities., , and . CIA, volume 1435 of Lecture Notes in Computer Science, page 148-159. Springer, (1998)Sm@rtLibrary - An Infrastructure for Ubiquitous Technologies and Applications., , and . ICDCS Workshops, page 208-213. IEEE Computer Society, (2001)Distributed Transaction Processing as a Reliability Concept for Mobile Agents., , and . FTDCS, page 59-65. IEEE Computer Society, (1997)