Personensuche
Personensuche
Es wurde 1 Person gefunden.
Anschrift
Lotharstr. 65
47057 Duisburg
47057 Duisburg
Raum
LE 629
Telefon
E-Mail
Funktionen
-
Wissenschaftliche/r Mitarbeiter/in, Institut für Soziologie
Aktuelle Veranstaltungen
Keine aktuellen Veranstaltungen.
Vergangene Veranstaltungen (max. 10)
Keine vergangenen Veranstaltungen.
Die folgenden Publikationen sind in der Online-Universitätsbibliographie der Universität Duisburg-Essen verzeichnet. Weitere Informationen finden Sie gegebenenfalls auch auf den persönlichen Webseiten der Person.
-
On the effectiveness of graph matching attacks against privacy-preserving record linkageIn: PLoS ONE Jg. 17 (2022) Nr. 9,ISSN: 1932-6203Online Volltext: dx.doi.org/ (Open Access)
-
Collective Secrecy over the K -Transmitter Multiple Access ChannelIn: IEEE Transactions on Information Forensics and Security Jg. 13 (2018) Nr. 9, S. 2279 - 2293ISSN: 1556-6013Online Volltext: dx.doi.org/
-
Individual Secrecy for the Broadcast ChannelIn: IEEE Transactions on Information Theory Jg. 63 (2017) Nr. 9, S. 5981 - 5999ISSN: 0018-9448Online Volltext: dx.doi.org/ (Open Access)
-
Individual secrecy for broadcast channels with receiver side informationIn: IEEE Transactions on Information Theory Jg. 63 (2017) Nr. 7, S. 4687 - 4708ISSN: 0018-9448Online Volltext: dx.doi.org/
-
On the Binary Input Gaussian Wiretap Channel with/without Output QuantizationIn: Entropy Jg. 19 (2017) Nr. 2, S. 59ISSN: 1099-4300Online Volltext: dx.doi.org/ Online Volltext (Open Access)
-
A general check digit system based on finite groupsIn: Designs, Codes and Cryptography Jg. 80 (2016) Nr. 1, S. 149 - 163ISSN: 0925-1022; 1573-7586Online Volltext: dx.doi.org/
-
Automatic Modulation Classification Methods for Wireless OFDM Systems in TDD ModeIn: IEEE transactions on communications Jg. 58 (2010) Nr. 9, S. 2480 - 2485ISSN: 1558-0857Online Volltext: dx.doi.org/
-
Joint secrecy over the K-transmitter multiple access channelIn: 2017 IEEE Information Theory Workshop (ITW) / IEEE Information Theory Workshop, 6-10 November 2017 in Kaohsiung, Taiwan 2018, S. 394 - 398ISBN: 978-1-5090-3098-9; 978-1-5090-3097-2Online Volltext: dx.doi.org/ (Open Access)
-
Combining forward error correction and network coding in bufferless networks : A case study for optical packet switchingIn: IEEE International Conference on High Performance Switching and Routing, HPSR / IEEE International Conference on High Performance Switching and Routing 2016.06.14-17 Yokohama 2016, S. 61 - 68ISBN: 978-1-4799-8950-8; 978-1-4799-8951-5Online Volltext: dx.doi.org/ Online Volltext (Open Access)
-
Individual secrecy for the broadcast channelIn: Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA2016) / International Symposium on Information Theory and Its Applications (ISITA2016) : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30-November 2, 2016 2016, S. 611 - 615ISBN: 9784885523090; 978-1-5090-1917-5
-
On secure communication over the multiple access channelIn: Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA2016) / International Symposium on Information Theory and Its Applications (ISITA2016) : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30-November 2, 2016 2016, S. 350 - 354ISBN: 9784885523090; 978-1-5090-1917-5
-
One-sided secrecy over the two-way wiretap channelIn: Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA2016) / International Symposium on Information Theory and Its Applications (ISITA2016) : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30-November 2, 2016 2016, S. 626 - 630ISBN: 9784885523090; 978-1-5090-1917-5
-
Secrecy coding for the binary multiplying wiretap channelIn: Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA2016) / International Symposium on Information Theory and Its Applications (ISITA2016) : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30-November 2, 2016 2016, S. 621 - 625ISBN: 9784885523090; 978-1-5090-1917-5
-
A check digit system over a group of arbitrary orderIn: 8th International ICST Conference on Communications and Networking in China (CHINACOM), 2013: Proceedings / 8th International ICST Conference on Communications and Networking in China (CHINACOM), 2013 : 14 - 16 Aug. 2013, Guilin, China 2013, S. 897 - 902ISBN: 9781479914067; 978-1-4799-1405-0Online Volltext: dx.doi.org/
-
Map-based automatic modulation classification with reduced complexity for TDD-based adaptive OFDM systemsIn: Proceedings of the 16th International OFDM-Workshop (InOWo) / 16th International OFDM-Workshop (InOWo), Hamburg, Germany, Sept. 2011 2011, S. 6 - 11
-
Utilizing Side Information in Modulation Classification for Wireless OFDM Systems with Adaptive ModulationIn: IEEE Vehicular Technology Conference (VTC Fall): Proceedings / IEEE Vehicular Technology Conference (VTC Fall), 2011 : 5 - 8 Sept. 2011, San Francisco, California, Fourth IEEE International Symposium on Wireless Vehicular Communications (IEEE WiVeC 2011) 2011, S. 1 - 5ISBN: 9781424483273; 9781424483280Online Volltext: dx.doi.org/
-
Efficient Modulation Classification for Adaptive Wireless OFDM Systems in TDD ModeIn: EEE Wireless Communications and Networking Conference (WCNC) / IEEE Wireless Communications and Networking Conference (WCNC), 2010 : Sydney, Australia, 18 - 21 April 2010 / Institute of Electrical and Electronics Engineers (Hrsg.) 2010, S. 1 - 6ISBN: 9781424463961; 9781424463985Online Volltext: dx.doi.org/
-
Likelihood function-based automatic modulation classification in mobile radio OFDM systemsIn: Proceedings of the 15th International OFDM-Workshop (InOWo) / 15th International OFDM-Workshop (InOWo), Hamburg, Germany, Sept. 2010 2010, S. 165 - 169
-
Wiretap channel with side informationDuisburg, Essen (2007) III, 157 S. : graph. Darst.