Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faux disk encryption: realities of secure storage on mobile devices., and . MOBILESoft, page 283-284. ACM, (2016)Experimentelle und numerische Untersuchungen zum Wandwärmeübergang in Dieselmotoren. Universität Stuttgart, Wiesbaden, Dissertation, (2023)PbindFx: an interface for sequencing effect graphs in the SuperCollider audio programming language.. Audio Mostly Conference, page 287-291. ACM, (2019)Hover Pad: interacting with autonomous and self-actuated displays in space., , , , , , , , and . UIST, page 139-147. ACM, (2014)Generalized Clausius inequalities in a nonequilibrium cold-atom system, , and . Communications Physics, 6 (1): 61 (2023)A Simple Model of Query Scheduling in Distributed Data Base Systems., and . Inf. Process. Lett., 10 (3): 137-147 (1980)Nonequilibrium thermodynamics and optimal cooling of a dilute atomic gas, , , , , , , and . Physical review research, 2 (2): 023245 (2020)idb: a tool for blackbox iOS security assessments.. MOBILESoft, page 281-282. ACM, (2016)Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model., and . AsiaCCS, page 46-47. ACM, (2012)A secure two-party bartering protocol using privacy-preserving interval operations., , , , and . PST, page 57-66. IEEE, (2014)