Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Safety and Security Analysis from a Communication Perspective., , and . VALUETOOLS, ICST, (2014)Energy management in microgrids with flexible and interruptible loads., and . ISGT, page 1-6. IEEE, (2016)Outage response in microgrids using demand side management., , and . ISC2, page 1-6. IEEE, (2016)Anomaly Detection in Smart Grids based on Software Defined Networks., , , and . SMARTGREENS, page 157-164. SciTePress, (2019)Smart Grid Reference Architecture, an Approach on a Secure and Model-Driven Implementation., , , , and . ISIE, page 74-79. IEEE, (2018)Transaction pseudonyms in mobile environments., , and . Journal in Computer Virology, 3 (2): 185-194 (2007)A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications., , and . ARES, page 139-146. IEEE Computer Society, (2007)Verschlüsselung mit statistischer Selbstsynchronisation und ihre Anwendung in SDH-Netzen.. University of Siegen, Germany, (2003)Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 344-359. Springer, (2001)A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 100-109. Springer, (2005)