Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Future generation computer systems, 2019-08, Vol.97, p.236-246
2019
Link zum Volltext


IEEE/ACM transactions on networking, 2015-02, Vol.23 (1), p.28-41
2015

IEEE/ACM transactions on networking, 2017-10, Vol.25 (5), p.2601-2614
2017



IEEE/ACM transactions on networking, 2012-08, Vol.20 (4), p.985-998
2012



IEEE/ACM transactions on networking, 2010-12, Vol.18 (6), p.1855-1868
2010

2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2023, p.91-98
2023



2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 2016, p.590-595
2016

The EuroPKI Experience
Lecture notes in computer science, 2004, p.14-27
2004
Link zum Volltext

Computer Network Security, Vol.1, p.242-247
Link zum Volltext

Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016, p.101-104
2016
Link zum Volltext

2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2017, p.374-385
2017
Link zum Volltext

IEEE P2P 2013 Proceedings, 2013, p.1-2
2013

Communications and Multimedia Security, 2005, p.180-190
2005
Link zum Volltext

Communications and Multimedia Security, 2005, p.289-290
2005
Link zum Volltext

2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2015, p.587-594
2015

3rd International Conference on Human System Interaction, 2010, p.459-466
2010

2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2013, p.534-541
2013

Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications, 2002, p.484-489
2002