CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
Presentation of the project's HCI Research results including final HCI guidelines.
Advanced architecture for distributed storage in dynamic environmentsDesign of a storage layer with increased dynamicity and additional user privacy for intra-cloud deployment.
Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processingReport describing the usage and limitations of malleable sign. to build cryptographic checks that detect non-conformance of processing and allows to honour compliant processor by keeping the authenticity verifiable on the result of the processing.
Improved guidelines and architecture for secure service compositionImproved and revised final version of report.
Security and privacy by design guidelines for PRISMACLOUDDissemination and exploitation report 1
Summary of diss. and exploitation activities for the reporting period.
User advisory board communication summary 1Summary of UAB establishment, first interactions, workshops.
User advisory board communication summary 2Summary of communication activities and feedback from UAB.
Domain independent generic security modelsPresents a security model indepenent for domain specific use cases.
Secure cloud usage for end userFinal report- in form of a handbook or book.
Risk and threat analysis with security requirementsSummarizes the threat and risk analysis as well as derived security requirements.
Final report on privacy and anonymisation techniquesFinal report on privacy and anonymisation techn.
Analysis of the State of the Art of FPE, OPE and Tokenization schemesA review of current solutions for FPE, OPE and Tokenization schemes.
Report on Privacy-enhancing cryptographyFinal report on the advancements of privacy-enhancing cryptography.
Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutionsProposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3.
Overview of functional and malleable signature schemesOverview of state of the art malleable and functional signature schemes and their properties, such as, efficiency, privacy, and unforgeability.
Legal, social and HCI requirementsPresents and discusses the requirements that are elicited by task 1.1.
Overview of verifiable computing techniques providing private and public verificationOverview of state of the art privately and publicly verifiable computing techniques and an analysis of their properties, e.g., privacy, efficiency, and applicability.
Holistic security model for secure service compositionPublicly verifiable computing techniques providing long-term privacy
Proposal for a publicly verifiable computing technique that provides long-term privacy.
Publications
Author(s):
Gallego-Nicasio Crespo, Beatriz; Prieto, Elsa; Rios, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Published in:
Fraunhofer FOKUS, Issue 8, 2016
Publisher:
DPSP Cluster
DOI:
10.13140/RG.2.2.22406.37444
Author(s):
Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Published in:
2016
Publisher:
DPSP Cluster
Author(s):
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Published in:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1825-1842, ISBN 9781-450349468
Publisher:
ACM Press
DOI:
10.1145/3133956.3133997
Author(s):
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
Published in:
2018, Page(s) 219-250
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-76578-5_8
Author(s):
David Derler, Sebastian Ramacher, Daniel Slamanig
Published in:
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 273-287, ISBN 978-1-5386-4228-3
Publisher:
IEEE
DOI:
10.1109/EuroSP.2018.00027
Author(s):
Lucas Schabhüser, Johannes Buchmann, Patrick Struck
Published in:
2017, Page(s) 261-279
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-71045-7_14
Author(s):
David Derler, Sebastian Ramacher, Daniel Slamanig
Published in:
2018, Page(s) 419-440
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-79063-3_20
Author(s):
Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in:
2018, Page(s) 141-161
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-89339-6_9
Author(s):
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in:
2018, Page(s) 11-32
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-89339-6_2
Author(s):
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Published in:
2018
Publisher:
Springer LNCS
Author(s):
David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Published in:
2018, Page(s) 425-455
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-78372-7_14
Author(s):
Ioannis Sfyrakis, Thomas Gross
Published in:
2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 99-105, ISBN 978-1-5386-5008-0
Publisher:
IEEE
DOI:
10.1109/IC2E.2018.00032
Author(s):
Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann
Published in:
2018
Publisher:
Springer
Author(s):
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in:
2018
Publisher:
Springer
Author(s):
Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini
Published in:
2017, Page(s) 153-169
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-92925-5_10
Author(s):
David Derler, Daniel Slamanig
Published in:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Page(s) 551-565, ISBN 9781-450355766
Publisher:
ACM Press
DOI:
10.1145/3196494.3196507
Author(s):
Jakob Stangl, Thomas Lorunser, Sai Manoj Pudukotai Dinakarrao
Published in:
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Page(s) 654-659, ISBN 978-3-9819263-0-9
Publisher:
IEEE
DOI:
10.23919/DATE.2018.8342091
Author(s):
Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
Published in:
2018, Page(s) 662-692
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-96884-1_22
Author(s):
Thomas Loruenser, Henrich C. Pöhls, Leon Sell, Thomas Laenger
Published in:
Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-9, ISBN 9781-450364485
Publisher:
ACM Press
DOI:
10.1145/3230833.3233765
Author(s):
Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer
Published in:
2018, Page(s) 567-586
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-91238-7_44
Author(s):
Denise Demirel, Stephan Krenn, Thomas Lorunser, Giulia Traverso
Published in:
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 88-97, ISBN 978-1-5090-0990-9
Publisher:
IEEE
DOI:
10.1109/ARES.2016.88
Author(s):
Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless
Published in:
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 428-436, ISBN 978-1-5090-0990-9
Publisher:
IEEE
DOI:
10.1109/ARES.2016.73
Author(s):
Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in:
2016, Page(s) 24-43
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-49175-2_2
Author(s):
Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Published in:
2016, Page(s) 391-408
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-44618-9_21
Author(s):
Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann
Published in:
2017, Page(s) 142-160
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-55589-8_10
Author(s):
Lucas Schabhuser, Denise Demirel, Johannes Buchmann
Published in:
2016 IEEE Conference on Communications and Network Security (CNS), 2016, Page(s) 552-560, ISBN 978-1-5090-3065-1
Publisher:
IEEE
DOI:
10.1109/CNS.2016.7860547
Author(s):
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Published in:
2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 528-535, ISBN 978-1-5090-4379-8
Publisher:
IEEE
DOI:
10.1109/PST.2016.7907011
Author(s):
Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch
Published in:
2016, Page(s) 807-840
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53890-6_27
Author(s):
Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
Published in:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 461-468, ISBN 9781-450349444
Publisher:
ACM Press
DOI:
10.1145/3052973.3053043
Author(s):
David Derler, Stephan Krenn, Daniel Slamanig
Published in:
2016, Page(s) 211-227
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-48965-0_13
Author(s):
Arne Bilzhause, Manuel Huber, Henrich C. Pohls, Kai Samelin
Published in:
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 760-767, ISBN 978-1-5090-0990-9
Publisher:
IEEE
DOI:
10.1109/ARES.2016.28
Author(s):
Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig
Published in:
2016, Page(s) 79-96
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-41763-9_6
Author(s):
Andreas Happe, Stephan Krenn, Thomas Lorünser
Published in:
2017, Page(s) 206-214
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-62033-6_23
Author(s):
David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig
Published in:
2016, Page(s) 170-186
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-41763-9_12
Author(s):
Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin
Published in:
2016, Page(s) 21-39
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-45572-3_2
Author(s):
Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin
Published in:
2016, Page(s) 197-213
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-50011-9_16
Author(s):
Jacqueline Brendel, Denise Demirel
Published in:
2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 543-550, ISBN 978-1-5090-4379-8
Publisher:
IEEE
DOI:
10.1109/PST.2016.7907013
Author(s):
Denis Butin, Denise Demirel, Johannes Buchmann
Published in:
2016, Page(s) 234-253
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-44524-3_14
Author(s):
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Published in:
2017, Page(s) 364-388
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-61273-7_18
Author(s):
Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
Published in:
2016, Page(s) 191-219
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53887-6_7
Author(s):
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in:
2017, Page(s) 152-182
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-54388-7_6
Author(s):
Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti
Published in:
2016, Page(s) 115-132
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-44760-5_8
Author(s):
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in:
2017, Page(s) 437-452
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-60055-0_23
Author(s):
Matthias Geihs, Denise Demirel, Johannes Buchmann
Published in:
2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 449-456, ISBN 978-1-5090-4379-8
Publisher:
IEEE
DOI:
10.1109/PST.2016.7906995
Author(s):
Henrich C. Pohls, Kai Samelin
Published in:
2015 10th International Conference on Availability, Reliability and Security, 2015, Page(s) 60-69, ISBN 978-1-4673-6590-1
Publisher:
IEEE
DOI:
10.1109/ARES.2015.10
Author(s):
Thomas Loruenser, Andreas Happe, Daniel Slamanig
Published in:
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, Page(s) 371-378, ISBN 978-1-4673-9560-1
Publisher:
IEEE
DOI:
10.1109/CloudCom.2015.71
Author(s):
Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim
Published in:
Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Page(s) 51-60, ISBN 9781-450336826
Publisher:
ACM Press
DOI:
10.1145/2818000.2818034
Author(s):
F.W.J. van Geelkerken and H. C. Pöhls and S. Fischer-Hübner
Published in:
"Proceedings of the 3rd International Academic Conference of Young Scientists ""Law & Psychology 2015"" (LPS-2015)", Issue 5th Edition, yearly, November 26–28, 2015, 2015, Page(s) 404-410, ISBN 978-617-607-856-2
Publisher:
Lviv polytechn. publ. house
Author(s):
Christian Weinert, Denise Demirel, Martín Vigil, Matthias Geihs, Johannes Buchmann
Published in:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 436-448, ISBN 9781-450349444
Publisher:
ACM Press
DOI:
10.1145/3052973.3053025
Author(s):
Andreas Happe, Bob Duncan, Alfred Bratterud
Published in:
Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk, 2017, Page(s) 30-41, ISBN 978-989-758-244-8
Publisher:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0006282800300041
Author(s):
Bob Duncan, Andreas Happe, Alfred Bratterud
Published in:
Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16, 2016, Page(s) 292-297, ISBN 9781-450346160
Publisher:
ACM Press
DOI:
10.1145/2996890.3007875
Author(s):
Andreas Happe, Thomas Loruneser
Published in:
2016
Publisher:
IARIA
Author(s):
Andreas Happe, Florian Wohner and Thomas Loruenser
Published in:
2017
Publisher:
ACM
Author(s):
Arne Bilzhause, Henrich C. Pöhls and Kai Samelin
Published in:
2017
Publisher:
ACM
Author(s):
Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Denise Demirel, Reza Azarderakhsh, Sheikh Mahbub Habib, Johannes A.Buchmann
Published in:
2017
Publisher:
IEEE
Author(s):
Stephan Krenn, Thomas Lorünser, Christoph Striecks
Published in:
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 303-311, ISBN 978-989-758-209-7
Publisher:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0006133003030311
Author(s):
David Derler, Sebastian Ramacher, Daniel Slamanig
Published in:
2017
Publisher:
Springer
Author(s):
Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, Max Mühlhäuser
Published in:
2016
Publisher:
IARIA
Author(s):
A. Alaqra, S. Fischer- Hübner, J.S. Pettersson and E. Wästlund
Published in:
2016
Publisher:
Plymouth University
Author(s):
Justina Bieliauskaite, Agi Karyda, Stephan Krenn, Erkuden Rios, George Suciu Jr
Published in:
ERCIM News, Issue No. 114, 2018, Page(s) 37, ISSN 0926-4981
Publisher:
ERCIM EEIG
Author(s):
Daniel Slamanig, Agi Karyda, Thomas Lorünser
Published in:
ERCIM News, Issue Number 104, 2016, Page(s) 46, ISSN 0926-4981
Publisher:
ERCIM EEIG
Author(s):
Thomas Lorünser, Eva Munoz, Marco Decandia Brocca
Published in:
ERCIM News, 2018, ISSN 0926-4981
Publisher:
ERCIM EEIG
Author(s):
Stephan Krenn, Thomas Lorünser and Christoph Striecks
Published in:
ERCIM News, Issue No. 113, 2018, ISSN 0926-4981
Publisher:
ERCIM EEIG
Author(s):
David Derler, Daniel Slamanig
Published in:
Designs, Codes and Cryptography, 2018, ISSN 0925-1022
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s10623-018-0460-y
Author(s):
Henrich C. Pöhls, Thomas Länger
Published in:
Zeitschrift für Datenrecht und informationssicherheit, 2017, ISSN 1424-9944
Publisher:
Digma
Author(s):
Thomas Lorünser (AIT Austrian Institute of Technology GmbH), Daniel Slamanig (TU Graz), Thomas Länger (University of Lausanne) and Henrich C. Pöhls (Universiy of Passau)
Published in:
ERCIM News, Issue No. 106 July 2016, 2016, ISSN 0926-4981
Publisher:
ERCIM EEIG
Author(s):
Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger
Published in:
e & i Elektrotechnik und Informationstechnik, 2017, ISSN 0932-383X
Publisher:
Springer Verlag
DOI:
10.1007/s00502-017-0519-x
Author(s):
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Published in:
Journal of Cryptology, 2017, ISSN 0933-2790
Publisher:
Springer Verlag
Author(s):
David Derler
Published in:
2018
Publisher:
Technischen Universitat Graz
Author(s):
Henrich C. Pöhls
Published in:
2018
Publisher:
University of Passau
Author(s):
Ala Alaqra
Published in:
2018
Publisher:
Karlstads Universitet
Author(s):
Christian Hanser, Max Rabkin, Dominique Schröder
Published in:
Computer Security -- ESORICS 2015, 2015, Page(s) 146-164, ISBN 978-3-319-24174-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-24174-6_8
Author(s):
Stephan Krenn, Kai Samelin, Dieter Sommer
Published in:
Data Privacy Management, and Security Assurance, 2016, Page(s) 100-117, ISBN 978-3-319-29883-2
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29883-2_7
Author(s):
David Derler, Daniel Slamanig
Published in:
Provable Security, 2015, Page(s) 455-474, ISBN 978-3-319-26059-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-26059-4_25
Author(s):
Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
Published in:
Cryptology and Network Security, 2015, Page(s) 32-39, ISBN 978-3-319-26823-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-26823-1_3
Author(s):
David Derler, Christian Hanser, Daniel Slamanig
Published in:
Cryptography and Coding, 2015, Page(s) 57-74, ISBN 978-3-319-27239-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-27239-9_4
Author(s):
David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in:
Information Security and Cryptology - ICISC 2015, 2016, Page(s) 3-19, ISBN 978-3-319-30840-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-30840-1_1
Author(s):
Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
Published in:
Topics in Cryptology - CT-RSA 2016, 2016, Page(s) 127-143, ISBN 978-3-319-29485-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29485-8_8
Author(s):
Thomas Lorünser, Thomas Länger, Daniel Slamanig
Published in:
E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015, Page(s) 202-206, ISBN 978-3-319-27164-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-27164-4_16
Author(s):
Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig
Published in:
Cyber Security and Privacy, 2015, Page(s) 14-25, ISBN 978-3-319-25360-2
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-25360-2_2
Author(s):
Thomas Groß
Published in:
Financial Cryptography and Data Security, 2015, Page(s) 293-314, ISBN 978-3-662-47854-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-47854-7_18
Author(s):
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
Published in:
Selected Areas in Cryptography - SAC 2015, 2016, Page(s) 3-24, ISBN 978-3-319-31301-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31301-6_1
Author(s):
Elias Z. Tragos, Henrich C. Pöhls, Ralf C. Staudemeyer, Daniel Slamanig, Adam Kapovits, Santiago Suppan, Alexandros Fragkiadakis, Gianmarco Baldini, Ricardo Neisse, Peter Langendörfer, Zoya Dyka, Christian Wittke
Published in:
Building the Hyperconnected Society, Issue 29/06/2015, 2015, Page(s) 189-219, ISBN 978-87-93237-99-5
Publisher:
River Publishers
Author(s):
Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in:
SpringerBriefs in Computer Science, 2016, ISBN 978-3-319-32115-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-32115-8
Author(s):
Denise Demirel, Lucas Schabhüser, Johannes Buchmann
Published in:
SpringerBriefs in Computer Science, 2017, ISBN 978-3-319-53798-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-53798-6
Intellectual Property Rights
Application/Publication number:
A50710
2016
Date:
2016-08-04
Application/Publication number:
A50710
2016
Date:
2016-08-04
Applicant(s):
AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH
Application/Publication number:
AT
502802017
Date:
2017-04-05
Applicant(s):
AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH
Application/Publication number:
AT
502802017
Date:
2017-04-05
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available