default search action
Günter Schäfer
Person information
- affiliation: Technische Universität Ilmenau, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c83]Jan Stoyke, Michael Rossberg, Guenter Schaefer:
Demo: Strict Architectural Separation Between Operators in Shared RANs. NoF 2024: 145-147 - 2023
- [c82]David Schatz, Michael Rossberg, Guenter Schaefer:
Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls. ARES 2023: 22:1-22:10 - [c81]Friedrich Altheide, Simon Buttgereit, Michael Rossberg, Guenter Schaefer:
Increasing Resilience of SD-WAN by Distributing the Control Plane. NoF 2023: 10-18 - [c80]David Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer:
Virtual Private Networks in the Quantum Era: A Security in Depth Approach. SECRYPT 2023: 486-494 - 2022
- [j18]David Schatz, Michael Rossberg, Guenter Schaefer:
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice Calls. SN Comput. Sci. 3(5): 341 (2022) - 2021
- [c79]David Schatz, Michael Rossberg, Guenter Schaefer:
Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls. ARES 2021: 12:1-12:10 - [c78]Simon Buttgereit, Michael Rossberg, Michael Pfeiffer, Guenter Schaefer:
Demo: Leveraging SDN in Critical Infrastructures. ICIN 2021: 86-88 - [c77]David Schatz, Michael Rossberg, Guenter Schaefer:
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing. ICISSP 2021: 191-203 - [c76]Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Towards a Realistic Maximum Flow Model in Hybrid Multi-Channel Wireless Mesh Networks. WD 2021: 1-8 - 2020
- [c75]Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer:
Vector packet encapsulation: the case for a scalable IPsec encryption protocol. ARES 2020: 11:1-11:10 - [c74]Philip Wendland, Guenter Schaefer:
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X. Networking 2020: 549-553 - [c73]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks. Networking 2020: 637-639 - [c72]Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations. Networking 2020: 675-676 - [c71]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Improving Network-Assisted Roaming for Controller-Less Wi-Fi. PIMRC 2020: 1-7 - [c70]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Robustness and Scalability Improvements for Distance Vector Routing in Large WMNs. WiMob 2020: 1-6 - [c69]Martin Backhaus, Guenter Schaefer:
Towards the Complexity of the Widest Path Problem in Hybrid Multi-Channel WMNs. WiMob 2020: 378-381
2010 – 2019
- 2019
- [j17]Reiner S. Thomä, Carsten Andrich, Giovanni Del Galdo, Michael Döbereiner, Matthias A. Hein, Martin Käske, Günter Schäfer, Steffen Schieler, Christian Schneider, Andreas Schwind, Philip Wendland:
Cooperative Passive Coherent Location: A Promising 5G Service to Support Road Safety. IEEE Commun. Mag. 57(9): 86-92 (2019) - [c68]Michael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer:
Strong Tenant Separation in Cloud Computing Platforms. ARES 2019: 15:1-15:10 - [c67]Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Towards a Security Architecture for Hybrid WMNs. ARES 2019: 107:1-107:10 - [c66]Philip Wendland, Guenter Schaefer, Reiner S. Thomä:
LTE-V2X Mode 4: Increasing Robustness and DCC Compatibility with Reservation Splitting. ICCVE 2019: 1-6 - [c65]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Robust and Scalable Routing in Wireless Mesh Networks Using Interference-Disjoint Backup Paths. WMNC 2019: 103-110 - [c64]Philip Wendland, Guenter Schaefer, Reiner S. Thomä:
An application-oriented evaluation of LTE-V's mode 4 for V2V communication. SAC 2019: 165-173 - 2018
- [c63]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer, David Sukiennik:
A Comprehensive Framework to Evaluate Wireless Networks in Simulation and Real Systems. DS-RT 2018: 29-36 - [c62]Michael Grey, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications. GIIS 2018: 1-5 - [c61]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards a Flexible User-Space Architecture for High-Performance IEEE 802.11 Processing. WiMob 2018: 1-9 - 2017
- [c60]Martin Backhaus, Guenter Schaefer:
Towards construction of efficient and optimally resilient VPN topologies by exactly calculating Maximum Disjoint Paths. ICC 2017: 1-6 - [c59]Martin Byrenheid, Michael Rossberg, Guenter Schaefer, Robert Dorn:
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks. ICC 2017: 1-7 - [c58]David Schatz, Michael Rossberg, Guenter Schaefer:
Reducing call blocking rates for anonymous voice over IP communications. ICUMT 2017: 382-390 - [c57]Martin Backhaus, Günter Schäfer:
Towards optimally resilient topologies against optimal attacks. IM 2017: 1065-1070 - [c56]Martin Backhaus, Guenter Schaefer:
Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut. ISCC 2017: 1332-1337 - [c55]Sebastian Kehr, Eduardo Quiñones, Dominik Langen, Bert Böddeker, Günter Schäfer:
Parcus: Energy-Aware and Robust Parallelization of AUTOSAR Legacy Applications. RTAS 2017: 343-352 - 2016
- [c54]Sebastian Kehr, Milos Panic, Eduardo Quiñones, Bert Böddeker, Jorge Becerril Sandoval, Jaume Abella, Francisco J. Cazorla, Günter Schäfer:
Supertask: Maximizing runnable-level parallelism in AUTOSAR applications. DATE 2016: 25-30 - [c53]Martin Backhaus, Günter Schäfer:
Backup paths for multiple demands in overlay networks. GIIS 2016: 1-8 - [c52]Markus Trapp, Michael Rossberg, Günter Schäfer:
Automatic source code decomposition for privilege separation. SoftCOM 2016: 1-6 - 2015
- [j16]Franz Girlich, Michael Rossberg, Guenter Schaefer:
On the resistance of overlay networks against bandwidth exhaustion attacks. Telecommun. Syst. 60(4): 539-552 (2015) - [c51]Sebastian Kehr, Eduardo Quiñones, Bert Böddeker, Günter Schäfer:
Parallel execution of AUTOSAR legacy applications on multicore ECUs with timed implicit communication. DAC 2015: 42:1-42:6 - [c50]Michael Grey, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards a model for global-scale backbone networks. ICC 2015: 6086-6091 - [c49]Markus Trapp, Michael Rossberg, Guenter Schaefer:
Program partitioning based on static call graph analysis for privilege separation. ISCC 2015: 613-618 - 2014
- [j15]Mathias Fischer, Sascha Grau, Giang T. Nguyen, Guenter Schaefer:
Resilient and underlay-aware P2P live-streaming. Comput. Networks 59: 122-136 (2014) - [c48]Michael Grey, David Schatz, Michael Rossberg, Günter Schäfer:
Towards distributed geolocation by employing a delay-based optimization scheme. ISCC 2014: 1-7 - 2013
- [j14]Michael Rossberg, Michael Grey, Markus Trapp, Franz Girlich, Guenter Schaefer:
Automatic VPN-Configuration with SOLID. Prax. Inf.verarb. Kommun. 36(1): 42 (2013) - [c47]Sander Wozniak, Michael Rossberg, Sascha Grau, Ali Alshawish, Guenter Schaefer:
Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes. CCSW 2013: 89-100 - [c46]Michael Grey, Michael Rossberg, Martin Backhaus, Guenter Schaefer:
On distributed geolocation by employing spring-mass systems. GIIS 2013: 1-7 - [c45]Sander Wozniak, Michael Rossberg, Franz Girlich, Guenter Schaefer:
Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks. ICC 2013: 2016-2021 - [c44]Michael Rossberg, Michael Grey, Markus Trapp, Franz Girlich, Guenter Schaefer:
Distributed monitoring of self-configuring Virtual Private Networks. IM 2013: 1080-1081 - [c43]Rene Golembewski, Steve Goering, Guenter Schaefer:
Capabilities and objectives of distributed image processing on smart camera systems. ISCC 2013: 940-945 - [c42]Markus Trapp, Michael Rossberg, Günter Schäfer:
Scalable Multipath Exploration in Ad-Hoc Networks. NetSys 2013: 9-18 - [c41]Franz Girlich, Michael Rossberg, Guenter Schaefer, Thomas Böhme, Jens Schreyer:
Bounds for the Security of the Vivaldi Network Coordinate System. NetSys 2013: 66-75 - [c40]Sander Wozniak, Michael Rossberg, Guenter Schaefer:
Towards trustworthy mobile social networking services for disaster response. PerCom Workshops 2013: 528-533 - 2012
- [c39]Rene Golembewski, Günter Schäfer, Tobias Gerlach:
Efficient communication for large-scale robust image processing with smart camera devices. CISDA 2012: 1-8 - [c38]Michael Rossberg, Rene Golembewski, Günter Schäfer:
Attack-Resistant Distributed Time Synchronization for Virtual Private Networks. ICCCN 2012: 1-8 - [c37]Michael Rossberg, Franz Girlich, Guenter Schaefer:
Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks. ICUMT 2012: 779-785 - [c36]Michael Grey, Michael Rossberg, Guenter Schaefer:
Automatic creation of VPN backup paths for improved resilience against BGP-attackers. SAC 2012: 613-620 - [i2]Sander Wozniak, Michael Rossberg, Franz Girlich, Guenter Schaefer:
Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks. CoRR abs/1210.0061 (2012) - [i1]Sander Wozniak, Michael Rossberg, Guenter Schaefer:
Towards Trustworthy Mobile Social Networking Services for Disaster Response. CoRR abs/1212.4989 (2012) - 2011
- [j13]Michael Rossberg, Guenter Schaefer:
A survey on automatic configuration of virtual private networks. Comput. Networks 55(8): 1684-1699 (2011) - [j12]Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer:
On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies. IEEE Trans. Dependable Secur. Comput. 8(2): 270-281 (2011) - [c35]Sascha Grau, Mathias Fischer, Guenter Schaefer:
On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies. ICDCS 2011: 121-130 - [c34]Mathias Fischer, Sascha Grau, Sebastian Kehr, Guenter Schaefer:
Attack-resilient and multiple-tree-based P2P-IPTV distribution. ICUMT 2011: 1-8 - [c33]Mathias Fischer, Sebastian Delling, Sascha Grau, Guenter Schaefer:
Underlay-robust application layer multicast. IPCCC 2011: 1-2 - [c32]Sander Wozniak, Tobias Gerlach, Guenter Schaefer:
Optimization-based Secure Multi-hop Localization in Wireless Ad Hoc Networks. KiVS 2011: 182-187 - [c31]Robert Karl Schmidt, Achim Brakemeier, Tim Leinmüller, Frank Kargl, Günter Schäfer:
Advanced carrier sensing to resolve local channel congestion. Vehicular Ad Hoc Networks 2011: 11-20 - [c30]Mathias Fischer, Michael Kissmann, Sascha Grau, Guenter Schaefer:
On virtualization-based network support for peer-assisted live-streaming applications. NOF 2011: 25-30 - 2010
- [j11]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Distributed Automatic Configuration of Complex IPsec-Infrastructures. J. Netw. Syst. Manag. 18(3): 300-326 (2010) - [j10]Robert Karl Schmidt, Tim Leinmüller, Elmar Schoch, Frank Kargl, Günter Schäfer:
Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Netw. 24(1): 14-19 (2010) - [c29]Michael Rossberg, Günter Schäfer, Kai Martius:
Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management. ISSE 2010: 334-342 - [c28]Robert Karl Schmidt, Robert Lasowski, Tim Leinmiiller, Claudia Linnhoff-Popien, Günter Schäfer:
An approach for selective beacon forwarding to improve cooperative awareness. VNC 2010: 182-188 - [c27]Markus Trapp, Mathias Fischer, Guenter Schaefer:
Mobility-aware peer-to-peer live-streaming. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [j9]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Günter Schäfer, Thorsten Strufe:
Methods for Improving Resilience in Communication Networks and P2P Overlays. Prax. Inf.verarb. Kommun. 32(1): 64-78 (2009) - [j8]Robert Karl Schmidt, Thomas Köllmer, Tim Leinmüller, Bert Böddeker, Günter Schäfer:
Degradation of Transmission Range in VANETs caused by Interference. Prax. Inf.verarb. Kommun. 32(4): 224-234 (2009) - [j7]Michael Brinkmeier, Günter Schäfer, Thorsten Strufe:
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming. IEEE Trans. Parallel Distributed Syst. 20(6): 831-844 (2009) - [c26]Michael Brinkmeier, Michael Rossberg, Guenter Schaefer:
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays. ICC 2009: 1-6 - [c25]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Guenter Schaefer:
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems. KiVS 2009: 193-204 - [p2]Guenter Schaefer:
Sensor Network Security. Networked Embedded Systems 2009: 10 - 2008
- [j6]Günter Schäfer:
Die FG - Berichte aus den Instituten. Fachgebiet Telematik/Rechnernetze an der Technischen Universität Ilmenau. Prax. Inf.verarb. Kommun. 31(3): 202-204 (2008) - [j5]Marcel Henseler, Michael Rossberg, Guenter Schaefer:
Credential Management for Automatic Identification Solutions in Supply Chain Management. IEEE Trans. Ind. Informatics 4(4): 303-314 (2008) - [c24]Mathias Fischer, Frank-Uwe Andersen, Andreas Köpsel, Günter Schäfer, Morten Schläger:
A Distributed IP Mobility Approach for 3G SAE. PIMRC 2008: 1-6 - [c23]Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe:
A Key Management Solution for Overlay-Live-Streaming. SecureComm 2008 - 2007
- [j4]Jens Wildhagen, Thorsten Strufe, Günter Schäfer:
Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies). it Inf. Technol. 49(5): 304-311 (2007) - [c22]Wolfgang Rolshofen, Peter Dietz, Günter Schäfer:
Application of Tangible Acoustic Interfaces in the Area of Production Control and Manufacturing. HCI (2) 2007: 920-925 - [c21]Thorsten Strufe, Jens Wildhagen, Günter Schäfer:
Netzwerkeffizienz stabiler Overlay-Streaming-Topologien. KiVS 2007: 3-14 - [c20]Daniel Kraft, Günter Schäfer:
Verhaltensbeobachtung und -bewertung zur Vertrauensbildung in offenen Ad-hoc-Netzen. KiVS 2007: 163-174 - [c19]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Using recurring costs for reputation management in peer-to-peer streaming systems. SecureComm 2007: 283-292 - 2006
- [c18]Thorsten Strufe, Günter Schäfer, Arthur Chang:
BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming. ICC 2006: 304-309 - [c17]Sven D. Hermann, Günter Schäfer, Adam Wolisz, Michael Lipka:
Concept for Hierarchical and Distributed Processing of Area Based Triggers. PerCom 2006: 92-102 - [c16]Thorsten Strufe, Jens Wildhagen, Günter Schäfer:
Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies. STM 2006: 111-121 - 2005
- [j3]Tianwei Chen, Michel Sortais, Günter Schäfer, Stefan Adams, Changpeng Fan, Adam Wolisz:
Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover. Comput. Networks 49(3): 449-464 (2005) - [j2]Günter Schäfer:
Sabotageangriffe auf Kommunikationsinfrastrukturen: Angriffstechniken und Abwehrmaßnahmen. Prax. Inf.verarb. Kommun. 28(3): 130-139 (2005) - [c15]Patrick Diebold, Andreas Hess, Günter Schäfer:
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks. KiVS 2005: 245-255 - [p1]Günter Schäfer:
Internet Firewalls. The Industrial Information Technology Handbook 2005: 1-12 - [r1]Guenter Schaefer:
Sensor Network Security. Embedded Systems Handbook 2005 - 2004
- [c14]Daniel Kraft, Günter Schäfer:
Distributed access control for consumer operated mobile ad-hoc networks. CCNC 2004: 35-40 - [c13]Andreas Hess, Günter Schäfer:
ISP-operated protection of home networks with FIDRAN. CCNC 2004: 41-46 - [c12]Andreas Hess, T. Gingold, Sandro Rodriguez Garzon, Günter Schäfer:
Intrusion Prevention with Active Networks: A Performance Comparison between User and Kernel-Space Implementation. DFN-Arbeitstagung über Kommunikationsnetze 2004: 349-359 - [c11]Lars Westerhoff, S. Reinhardt, Günter Schäfer, Adam Wolisz:
Security analysis and concept for the multicast-based handover support architecture MOMBASA. GLOBECOM 2004: 2201-2207 - [c10]Andreas Hess, Günter Schäfer:
Realizing a flexible access control mechanism for active nodes based on active networking technology. ICC 2004: 68-72 - [c9]Tianwei Chen, Günter Schäfer, Adam Wolisz, Michel Sortais:
A Performance Study of Session State Re-Establishment Schemes in IP-Based Micro-Mobility Scenarios. MASCOTS 2004: 159-166 - 2003
- [b3]Günter Schäfer:
Netzsicherheit - algorithmische Grundlagen und Protokolle. dpunkt.verlag 2003, ISBN 978-3-89864-212-5, pp. I-XI, 1-422 - [b2]Günter Schäfer:
Security in fixed and wireless networks - an introduction to securing data communications. Wiley 2003, ISBN 978-0-470-86370-1, pp. I-XIII, 1-382 - [c8]Andreas Hess, Michael Jung, Günter Schäfer:
Combining Multiple Intrusion Detection and Response Technologies in an Active Networking Based Architecture. DFN-Arbeitstagung über Kommunikationsnetze 2003: 153-165 - [c7]Andreas Hess, Michael Jung, Günter Schäfer:
FIDRAN: A Flexible Intrusion Detection and Response Framework for Active Networks. ISCC 2003: 1219-1224 - [c6]Andreas Hess, Günter Schäfer:
A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment. KiVS 2003: 320-332 - 2001
- [j1]Frank Pählke, Günter Schäfer, Jochen H. Schiller:
Multilateral sichere Mobilitätsunterstützung für IP-Netze: Paketfilter- und Tunnelkonfiguration. Prax. Inf.verarb. Kommun. 24(3): 172-179 (2001) - [c5]Günter Schäfer, Michael Eyrich:
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys. GI Jahrestagung (1) 2001: 572-576 - [c4]Marc Bechler, Hartmut Ritter, Günter Schäfer, Jochen H. Schiller:
Traffic Shaping in End Systems Attached to QoS-supporting Networks. ISCC 2001: 296-301 - [c3]Frank Pählke, Günter Schäfer, Jochen H. Schiller:
Paketfilter- und Tunnelkonfiguration zur Firewall-verträglichen Mobilitätsunterstützung in IP-Netzen. Kommunikation in Verteilten Systemen 2001: 59-68 - 2000
- [c2]Stefan Mink, Frank Pählke, Günter Schäfer, Jochen H. Schiller:
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture. ISCC 2000: 172-179
1990 – 1999
- 1998
- [b1]Günter Schäfer:
Effiziente Authentisierung und Schlüsselverwaltung in Hochleistungsnetzen. Karlsruhe Institute of Technology, Germany, 1998, pp. I-VI, 1-236
1980 – 1989
- 1980
- [c1]Günter Schäfer:
Erfahrungen mit der Online-Debitorenbuchhaltung mit Dialogbetrieb bei der B. Braun Melsungen AG. Online-Systeme im Finanz- und Rechnungswesen 1980: 329-337
Coauthor Index
aka: Michael Rossberg
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint