Mühle, Alexander
91  results:
Search for persons X
?
1

A Taxonomy of Decentralized Identifier Methods for Practiti..:

, In: 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS),
 
?
2

Requirements of a Digital Education Credential System:

, In: 2023 IEEE Global Engineering Education Conference (EDUCON),
 
?
3

Quo Vadis, Web Authentication? – An Empirical Analysis of L..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
 
?
4

Analyzing and comparing the security of self-sovereign iden..:

Grüner, Andreas ; Mühle, Alexander ; Lockenvitz, Niko.
International Journal of Information Security.  22 (2023)  5 - p. 1231-1248 , 2023
 
?
5

Prison Break: From Proprietary Data Sources to SSI Verifiab..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
 
?
6

Gotta Catch'em All! Improving P2P Network Crawling Strategi..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime,
 
?
7

Mitigating Sovereign Data Exchange Challenges: A Mapping to..:

, In: Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science,
 
?
8

Analyzing Interoperability and Portability Concepts for Sel..:

, In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
10

Characterising Proxy Usage in the Bitcoin Peer-to-Peer Netw..:

, In: International Conference on Distributed Computing and Networking 2021,
 
?
11

A Taxonomy of Trust Models for Attribute Assurance in Ident..:

, In: Advances in Intelligent Systems and Computing; Web, Artificial Intelligence and Network Applications,
 
?
 
?
13

Die Zukunftspotenziale der Blockchain-Technologie:

, In: Die Zukunft der Medizin / Erwin Böttinger, Jasper zu Putlitz (Hrsg.) ; mit einem Geleitwort von Hasso Plattner ; mit Beiträgen von M. Aach [und 52 anderen]
Copies:  TB BHV: mmt 22/7
 
?
14

Using Probabilistic Attribute Aggregation for Increasing Tr..:

, In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI),
 
?
15

MalRank : a measure of maliciousness in SIEM-based knowl..:

, In: Proceedings of the 35th Annual Computer Security Applications Conference,
 
1-15