Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme, , , , , , , , and . Proceedings of the 19th International Conference on Availability, Reliability and Security, page 1-11. ACM, (July 2024)Investigating the Predictability of QoS Metrics in Cellular Networks., , , , , , and . IWQoS, page 1-10. IEEE, (2022)Container Start Times: Empirical Analysis and Predictability (Poster)., and . SSP, volume 3043 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Measuring the Performance Impact of Branching Instructions., , , , and . SSP, volume 3043 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)A case study on the stability of performance tests for serverless applications., , , , , , and . J. Syst. Softw., (2022)Modeling event-driven service-oriented systems using the palladio component model., and . QUASOSS@ESEC/FSE, page 33-38. ACM, (2009)Utility-based Vehicle Routing Integrating User Preferences., , , and . PerCom Workshops, page 263-268. IEEE, (2021)Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes., , , , , , and . CIoT, page 158-165. IEEE, (2022)Towards an Evaluation Framework for Tor Load Balancing, and . Work in Progress Paper at the 36th Annual Computer Security Applications Conference (ACSAC 2020), (2020)A Concept for Crowd-sensed Prediction of Mobile Network Connectivity, , , , and . GI/ITG Workshop on Machine Learning in the Context of Communication Networks 2020, (February 2020)
OSZAR »