Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SEMPER Framework for Secure Electronic Commerce., , and . Wirtschaftsinformatik, page 11. Physica-Verlag, (1999)Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data., , and . Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, page 69-84. Springer, (2002)A Toolkit for Managing Enterprise Privacy Policies., , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 162-180. Springer, (2003)Towards automated provisioning of secure virtualized networks., , , and . ACM Conference on Computer and Communications Security, page 235-245. ACM, (2007)E-P3P privacy policies and privacy authorization., , , and . WPES, page 103-109. ACM, (2002)Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks., , , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 76-93. Springer, (2014)Reactively Simulatable Certified Mail., , and . IACR Cryptology ePrint Archive, (2006)Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep., , and . POLICY, page 135-146. IEEE Computer Society, (2003)Service-oriented Assurance - Comprehensive Security by Explicit Assurances., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Contract Signing.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)