default search action
Holger Vogt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Semih Turk, Alexander Schug, Reinhard Viga, Andreas Jupe, Holger Vogt:
Optimization of the dielectric layer for electrowetting on dielectric. Integr. 67: 50-59 (2019) - [j7]Erich Seifert, Stefan Seifert, Holger Vogt, David Drew, Jan van Aardt, Anton Kunneke, Thomas Seifert:
Influence of Drone Altitude, Image Overlap, and Optical Sensor Resolution on Multi-View Reconstruction of Forest Images. Remote. Sens. 11(10): 1252 (2019) - [c19]Finja M. Münchenberger, Stefan Dreiner, Holger Kappert, Holger Vogt:
Post-CMOS 3D-Integration of a Nanopellistor. PRIME 2019: 109-112 - [c18]Marvin Michel, Holger Vogt:
Mechanical Test Structures for the Determination of Normal Stress in Multilayer Freestanding MEMS-Membranes. PRIME 2019: 301-304 - 2018
- [c17]Benjamin Willsch, Marius te Heesen, Julia Hauser, Stefan Dreiner, Holger Kappert, Holger Vogt:
Evaluation of a median threshold based EEPROM-PUF concept implemented in a high temperature SOI CMOS technology. DTIS 2018: 1-6 - [c16]Semih Turk, Erik Verheyen, Reinhard Viga, Sonja Allani, Andreas Jupe, Holger Vogt:
Decreasing the Actuation Voltage in Electrowetting on Dielectric With Thin and Micro-Structured Dielectric. PRIME 2018: 205-208 - [c15]Jan F. Haase, Maik Beer, Jennifer Ruskowski, Holger Vogt:
Multi object detection in direct Time-of-Flight measurements with SPADs. PRIME 2018: 237-239 - 2017
- [c14]Mohamed Makhlouf, Diana Goller, Lutz Gendrisch, Stephan Kolnsberg, Franz Vogt, Alexander Utz, Dirk Weiler, Holger Vogt:
Automating wafer-level test of uncooled infrared detectors using wafer-prober. IOLTS 2017: 13-16 - 2015
- [j6]Michael Elßner, Holger Vogt:
Failure mechanisms of microbolometer thermal imager sensors using chip-scale packaging. Microelectron. Reliab. 55(9-10): 1901-1905 (2015) - [c13]Andrei Schmidt, Stefan Dreiner, Holger Vogt, Uwe Paschen:
Thin-film SOI PIN-diode leakage current dependence on back-gate-potential and HCI traps. ESSDERC 2015: 290-293 - 2013
- [c12]Andreas Süss, Christian Nitta, Andreas Spickermann, Daniel Durini, Gabor Varga, Melanie Jung, Werner Brockherde, Bedrich J. Hosticka, Holger Vogt, Stefan Schwope:
Speed considerations for LDPD based time-of-flight CMOS 3D image sensors. ESSCIRC 2013: 299-302 - 2012
- [j5]Nina J. Cleven, Jutta A. Müntjes, Holger Fassbender, Ute Urban, Michael Görtz, Holger Vogt, Maik Gräfe, Thorsten Göttsche, Tobias Penzkofer, Thomas Schmitz-Rode, Wilfried Mokwa:
A Novel Fully Implantable Wireless Sensor System for Monitoring Hypertension Patients. IEEE Trans. Biomed. Eng. 59(11-2): 3124-3130 (2012) - 2011
- [j4]Alexander Utz, Lutz Gendrisch, Holger Vogt:
Simulating Far-Infrared Scenarios with the Radiance Synthetic Imaging System. Comput. Sci. Eng. 13(4): 98-103 (2011)
2000 – 2009
- 2005
- [j3]Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the security of fair non-repudiation protocols. Int. J. Inf. Sec. 4(4): 253-262 (2005) - 2004
- [c11]Holger Vogt:
A New Method to Determine the Tool Count of a Semiconductor Factory Using FabSim. WSC 2004: 1925-1929 - 2003
- [b1]Holger Vogt:
Fairer Austausch. Darmstadt University of Technology, Germany, 2003, pp. 1-156 - [j2]Henning Pagnia, Holger Vogt, Felix C. Gärtner:
Fair Exchange. Comput. J. 46(1): 55-75 (2003) - [j1]Holger Vogt, Felix C. Gärtner, Henning Pagnia:
Supporting Fair Exchange in Mobile Environments. Mob. Networks Appl. 8(2): 127-136 (2003) - [c10]Holger Vogt:
Asynchronous Optimistic Fair Exchange Based on Revocable Items. Financial Cryptography 2003: 208-222 - [c9]Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the Security of Fair Non-repudiation Protocols. ISC 2003: 193-207 - [c8]Holger Vogt:
Factory capacity and throughput planning: discrete-event simulation using systemc: interactive semiconductor factory modeling with FabSim. WSC 2003: 1383-1387 - 2002
- [c7]Dennis Kügler, Holger Vogt:
Offline Payments with Auditable Tracing. Financial Cryptography 2002: 269-281 - 2001
- [c6]Dennis Kügler, Holger Vogt:
Fair Tracing without Trustees. Financial Cryptography 2001: 127-139 - [c5]Dennis Kügler, Holger Vogt:
Marking: A Privacy Protecting Approach Against Blackmailing. Public Key Cryptography 2001: 137-152 - [c4]Holger Vogt, Henning Pagnia, Felix C. Gärtner:
Using Smart Cards for Fair Exchange. WELCOM 2001: 101-113 - 2000
- [c3]Henning Pagnia, Holger Vogt, Felix C. Gärtner, Uwe G. Wilhelm:
Solving Fair Exchange with Mobile Agents. ASA/MA 2000: 57-72
1990 – 1999
- 1999
- [c2]Holger Vogt, Henning Pagnia, Felix C. Gärtner:
Modular Fair Exchange Protocols for Electronic Commerce. ACSAC 1999: 3-11 - [c1]Felix C. Gärtner, Henning Pagnia, Holger Vogt:
Approaching a Formal Definition of Fairness in Electronic Commerce. SRDS 1999: 354-359
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint