Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spring und Hibernate: Eine praxisbezogene Einführung, , , , and . Hanser, München, (2007)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)Security of trusted repeater quantum key distribution networks., , , , , and . J. Comput. Secur., 18 (1): 61-87 (2010)A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Impact of Presentation Format and Self-Reported Risk Aversion on Revealed Skewness Preferences., , and . Decision Analysis, 6 (2): 57-74 (2009)Psychologie und Altersvorsorge, and . Dt. Inst. für Altersvorsorge, Köln, (2007)Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software., , , , , and . SAFECOMP, volume 3688 of Lecture Notes in Computer Science, page 81-93. Springer, (2005)GGPONC 2.0 - The German Clinical Guideline Corpus for Oncology: Curation Workflow, Annotation Policy, Baseline NER Taggers., , , , , , , , , and . LREC, page 3650-3660. European Language Resources Association, (2022)HCI Patterns for Cryptographically Equipped Cloud Services., , , , , and . HCI (1), volume 10901 of Lecture Notes in Computer Science, page 567-586. Springer, (2018)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)