<?xml version="1.0"?>
<dblpperson name="Elke Franz 0001" pid="73/5092" n="58">
<person key="homepages/73/5092" mdate="2021-01-15">
<author pid="73/5092">Elke Franz 0001</author>
<note type="affiliation">TU Dresden, Faculty of Computer Science, Germany</note>
<url>https://tu-dresden.de/ing/informatik/sya/ps/die-professur/beschaeftigte/efr_de</url>
<url>https://www.linkedin.com/in/elke-franz-92109119</url>
</person>
<homonyms n="1">
<h f="f/Franz:Elke"><name>Elke Franz</name>
</h>
</homonyms>
<r><article key="journals/tvlsi/JasterHGF25" mdate="2026-03-31">
<author orcid="0009-0001-5085-8166" pid="331/9629">Sebastian Jaster</author>
<author pid="32/9396">Julian Haase</author>
<author orcid="0000-0003-2571-8441" pid="13/2844">Diana G&#246;hringer</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Trust-Based Adaptive Routing in Network-on-Chip: A Comprehensive Overview and Evaluation.</title>
<year>2025</year>
<pages>2916-2928</pages>
<volume>33</volume>
<journal>IEEE Trans. Very Large Scale Integr. Syst.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/tvlsi.2025.3615842</ee>
<url>db/journals/tvlsi/tvlsi33.html#JasterHGF25</url>
<stream>streams/journals/tvlsi</stream>
</article>
</r>
<r><inproceedings key="conf/norcas/JasterHG024" mdate="2025-03-03">
<author orcid="0009-0001-5085-8166" pid="331/9629">Sebastian Jaster</author>
<author pid="32/9396">Julian Haase</author>
<author pid="13/2844">Diana G&#246;hringer</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Improving Reliability in Network-on-Chip with Trust-based Adaptive Routing Approaches.</title>
<pages>1-7</pages>
<year>2024</year>
<booktitle>NorCAS</booktitle>
<ee>https://doi.org/10.1109/NorCAS64408.2024.10752461</ee>
<crossref>conf/norcas/2024</crossref>
<url>db/conf/norcas/norcas2024.html#JasterHG024</url>
</inproceedings>
</r>
<r><inproceedings key="conf/norcas/HaaseJFG23" mdate="2024-10-06">
<author pid="32/9396">Julian Haase</author>
<author orcid="0009-0001-5085-8166" pid="331/9629">Sebastian Jaster</author>
<author pid="73/5092">Elke Franz 0001</author>
<author orcid="0000-0003-2571-8441" pid="13/2844">Diana G&#246;hringer</author>
<title>Enhancing Robustness and Reliability of Networks-on-Chip with Network Coding.</title>
<pages>1-7</pages>
<year>2023</year>
<booktitle>NorCAS</booktitle>
<ee>https://doi.org/10.1109/NorCAS58970.2023.10305485</ee>
<crossref>conf/norcas/2023</crossref>
<url>db/conf/norcas/norcas2023.html#HaaseJFG23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/samos/FranzG23" mdate="2023-11-15">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="360/6200">Anita Gr&#252;tzner</author>
<title>Trust-Based Adaptive Routing for NoCs.</title>
<pages>296-310</pages>
<year>2023</year>
<booktitle>SAMOS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-46077-7_20</ee>
<crossref>conf/samos/2023</crossref>
<url>db/conf/samos/samos2023.html#FranzG23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asap/HaaseJFG22" mdate="2024-10-06">
<author pid="32/9396">Julian Haase</author>
<author orcid="0009-0001-5085-8166" pid="331/9629">Sebastian Jaster</author>
<author pid="73/5092">Elke Franz 0001</author>
<author orcid="0000-0003-2571-8441" pid="13/2844">Diana G&#246;hringer</author>
<title>Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism.</title>
<pages>156-160</pages>
<year>2022</year>
<booktitle>ASAP</booktitle>
<ee>https://doi.org/10.1109/ASAP54787.2022.00033</ee>
<crossref>conf/asap/2022</crossref>
<url>db/conf/asap/asap2022.html#HaaseJFG22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/ForsterCFPF20" mdate="2024-08-04">
<author pid="285/2488">Niklas F&#246;rster</author>
<author pid="230/9980">Juan A. Cabrera 0002</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="118/1475">Stefan Pfennig</author>
<author orcid="0000-0001-8469-9573" pid="f/FHPFitzek">Frank H. P. Fitzek</author>
<title>Efficient Confidentiality for Network Coded Distributed Storage.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOBECOM42002.2020.9347955</ee>
<crossref>conf/globecom/2020</crossref>
<url>db/conf/globecom/globecom2020.html#ForsterCFPF20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/LiH020" mdate="2021-11-30">
<author pid="75/4601-26">Tao Li 0026</author>
<author pid="h/ChristophHofmann">Christoph Hofmann</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT.</title>
<pages>365-368</pages>
<year>2020</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN48667.2020.9314854</ee>
<crossref>conf/lcn/2020</crossref>
<url>db/conf/lcn/lcn2020.html#LiH020</url>
</inproceedings>
</r>
<r><inproceedings key="conf/glvlsi/HarttungFMW19" mdate="2025-01-19">
<author pid="240/9269">Julian Harttung</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="176/1190">Sadia Moriam</author>
<author pid="220/6895">Paul Walther</author>
<title>Lightweight Authenticated Encryption for Network-on-Chip Communications.</title>
<pages>33-38</pages>
<year>2019</year>
<booktitle>ACM Great Lakes Symposium on VLSI</booktitle>
<ee>https://doi.org/10.1145/3299874.3317990</ee>
<ee>https://www.wikidata.org/entity/Q130841459</ee>
<crossref>conf/glvlsi/2019</crossref>
<url>db/conf/glvlsi/glvlsi2019.html#HarttungFMW19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/WaltherFS19" mdate="2020-12-01">
<author pid="220/6895">Paul Walther</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="69/2809">Thorsten Strufe</author>
<title>Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation.</title>
<pages>76-83</pages>
<year>2019</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN44214.2019.8990820</ee>
<crossref>conf/lcn/2019</crossref>
<url>db/conf/lcn/lcn2019.html#WaltherFS19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/glvlsi/MoriamFWKSF18" mdate="2020-12-01">
<author pid="176/1190">Sadia Moriam</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="220/6895">Paul Walther</author>
<author pid="29/414">Akash Kumar 0001</author>
<author pid="69/2809">Thorsten Strufe</author>
<author pid="f/GFettweis">Gerhard P. Fettweis</author>
<title>Protecting Communication in Many-Core Systems against Active Attackers.</title>
<pages>45-50</pages>
<year>2018</year>
<booktitle>ACM Great Lakes Symposium on VLSI</booktitle>
<ee>https://doi.org/10.1145/3194554.3194582</ee>
<crossref>conf/glvlsi/2018</crossref>
<url>db/conf/glvlsi/glvlsi2018.html#MoriamFWKSF18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/WaltherJFPHSJ18" mdate="2020-12-01">
<author pid="220/6895">Paul Walther</author>
<author pid="161/8918">Carsten Rudolf Janda</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="163/8925">Mathias Pelka</author>
<author pid="09/3611">Horst Hellbr&#252;ck</author>
<author pid="69/2809">Thorsten Strufe</author>
<author pid="20/4825">Eduard A. Jorswieck</author>
<title>Improving Quantization for Channel Reciprocity based Key Generation.</title>
<pages>545-552</pages>
<year>2018</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2018.8638248</ee>
<crossref>conf/lcn/2018</crossref>
<url>db/conf/lcn/lcn2018.html#WaltherJFPHSJ18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/PfennigF17" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Security aspects of confidential network coding.</title>
<pages>1-6</pages>
<year>2017</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2017.7996934</ee>
<crossref>conf/icc/2017</crossref>
<url>db/conf/icc/icc2017.html#PfennigF17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuwb/MatthiesenPBILL17" mdate="2025-03-03">
<author orcid="0000-0002-4582-3938" pid="92/11201">Bho Matthiesen</author>
<author pid="118/1475">Stefan Pfennig</author>
<author pid="177/0153">Mario Bielert</author>
<author pid="63/9894">Thomas Ilsche</author>
<author pid="211/3594">Andrew Lonnstrom</author>
<author pid="75/4601-26">Tao Li 0026</author>
<author pid="230/9980">Juan A. Cabrera 0002</author>
<author orcid="0009-0000-2028-3237" pid="50/5380-6">Christian Scheunert</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="41/6359">Silvia Santini</author>
<author pid="69/2809">Thorsten Strufe</author>
<author pid="20/4825">Eduard A. Jorswieck</author>
<author pid="66/4013">Wolfgang E. Nagel</author>
<author orcid="0000-0001-7008-1537" pid="10/1557-2">Giang T. Nguyen 0002</author>
<author orcid="0000-0001-8469-9573" pid="f/FHPFitzek">Frank H. P. Fitzek</author>
<title>Secure and energy-efficient interconnects for board-to-board communication.</title>
<pages>1-7</pages>
<year>2017</year>
<booktitle>ICUWB</booktitle>
<ee>https://doi.org/10.1109/ICUWB.2017.8250994</ee>
<crossref>conf/icuwb/2017</crossref>
<url>db/conf/icuwb/icuwb2017.html#MatthiesenPBILL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/PfennigF16" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency.</title>
<pages>1-6</pages>
<year>2016</year>
<booktitle>GLOBECOM Workshops</booktitle>
<ee>https://doi.org/10.1109/GLOCOMW.2016.7848896</ee>
<crossref>conf/globecom/2016w</crossref>
<url>db/conf/globecom/globecom2016w.html#PfennigF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/springsim/PfennigFCFRBIN16" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="77/11144">Kim Feldhoff</author>
<author pid="15/2321">Florina M. Ciorba</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="191/2285">Tobias Reiher</author>
<author pid="177/0153">Mario Bielert</author>
<author pid="63/9894">Thomas Ilsche</author>
<author pid="66/4013">Wolfgang E. Nagel</author>
<title>Simulation models verification for resilient communication on a highly adaptive energy-efficient computer.</title>
<pages>6</pages>
<year>2016</year>
<booktitle>SpringSim (HPS)</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2972975</ee>
<crossref>conf/springsim/2016-4</crossref>
<url>db/conf/springsim/springsim2016-4.html#PfennigFCFRBIN16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuwb/FranzPMSJ15" mdate="2025-03-03">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="118/1475">Stefan Pfennig</author>
<author orcid="0000-0002-4582-3938" pid="92/11201">Bho Matthiesen</author>
<author orcid="0009-0000-2028-3237" pid="50/5380-6">Christian Scheunert</author>
<author orcid="0000-0001-7893-8435" pid="20/4825">Eduard A. Jorswieck</author>
<title>Energy Models for Communication of Future Computing Platforms.</title>
<pages>1-5</pages>
<year>2015</year>
<booktitle>ICUWB</booktitle>
<ee>https://doi.org/10.1109/ICUWB.2015.7324445</ee>
<crossref>conf/icuwb/2015</crossref>
<url>db/conf/icuwb/icuwb2015.html#FranzPMSJ15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuwb/PfennigFRSJ15" mdate="2025-03-03">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="122/5665">Johannes Richter</author>
<author orcid="0009-0000-2028-3237" pid="50/5380-6">Christian Scheunert</author>
<author orcid="0000-0001-7893-8435" pid="20/4825">Eduard A. Jorswieck</author>
<title>Confidential Network Coding: Physical Layer vs. Network Layer.</title>
<pages>1-5</pages>
<year>2015</year>
<booktitle>ICUWB</booktitle>
<ee>https://doi.org/10.1109/ICUWB.2015.7324428</ee>
<crossref>conf/icuwb/2015</crossref>
<url>db/conf/icuwb/icuwb2015.html#PfennigFRSJ15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-4/HofmannFS15" mdate="2020-12-01">
<author pid="h/ChristophHofmann">Christoph Hofmann</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="41/6359">Silvia Santini</author>
<title>A Metric for Adaptive Routing on Trustworthy Paths.</title>
<pages>11-25</pages>
<year>2015</year>
<booktitle>iNetSeC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-39028-4_2</ee>
<crossref>conf/ifip11-4/2015</crossref>
<url>db/conf/ifip11-4/inetsec2015.html#HofmannFS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipccc/MoriamYFFF15" mdate="2023-03-24">
<author pid="176/1190">Sadia Moriam</author>
<author pid="176/1194">Yexin Yan</author>
<author pid="86/10509">Erik Fischer</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="f/GFettweis">Gerhard P. Fettweis</author>
<title>Resilient and efficient communication in many-core systems using network coding.</title>
<pages>1-8</pages>
<year>2015</year>
<booktitle>IPCCC</booktitle>
<ee>https://doi.org/10.1109/PCCC.2015.7410331</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PCCC.2015.7410331</ee>
<crossref>conf/ipccc/2015</crossref>
<url>db/conf/ipccc/ipccc2015.html#MoriamYFFF15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/europar/CiorbaIFPSMSHSKNJM14" mdate="2025-03-03">
<author pid="15/2321">Florina M. Ciorba</author>
<author pid="63/9894">Thomas Ilsche</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="118/1475">Stefan Pfennig</author>
<author orcid="0009-0000-2028-3237" pid="50/5380-6">Christian Scheunert</author>
<author pid="79/9374">Ulf Markwardt</author>
<author pid="23/8770">Joseph Schuchart</author>
<author orcid="0000-0002-8491-770X" pid="28/235">Daniel Hackenberg</author>
<author orcid="0009-0003-0666-4166" pid="72/6192">Robert Sch&#246;ne</author>
<author orcid="0000-0003-3591-397X" pid="32/6648">Andreas Kn&#252;pfer</author>
<author pid="66/4013">Wolfgang E. Nagel</author>
<author pid="20/4825">Eduard A. Jorswieck</author>
<author orcid="0000-0003-2545-5258" pid="13/1808">Matthias S. M&#252;ller</author>
<title>Analysis of Parallel Applications on a High Performance-Low Energy Computer.</title>
<pages>474-485</pages>
<year>2014</year>
<booktitle>Euro-Par Workshops (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14313-2_40</ee>
<crossref>conf/europar/2014w2</crossref>
<url>db/conf/europar/europar2014w2.html#CiorbaIFPSMSHSKNJM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fgct/PfennigFCIN14" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<author orcid="0000-0002-2773-4499" pid="15/2321">Florina M. Ciorba</author>
<author pid="63/9894">Thomas Ilsche</author>
<author pid="66/4013">Wolfgang E. Nagel</author>
<title>Modeling communication delays for network coding and routing for error-prone transmission.</title>
<pages>19-24</pages>
<year>2014</year>
<booktitle>FGCT</booktitle>
<ee>https://doi.org/10.1109/FGCT.2014.6933231</ee>
<crossref>conf/fgct/2014</crossref>
<url>db/conf/fgct/fgct2014.html#PfennigFCIN14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/netcod/PfennigF14" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Adjustable redundancy for secure network coding in a unicast scenario.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>NetCod</booktitle>
<ee>https://doi.org/10.1109/NETCOD.2014.6892131</ee>
<crossref>conf/netcod/2014</crossref>
<url>db/conf/netcod/netcod2014.html#PfennigF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/camad/PfennigF13" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Comparison of different secure network coding paradigms concerning transmission efficiency.</title>
<pages>18-22</pages>
<year>2013</year>
<booktitle>CAMAD</booktitle>
<ee>https://doi.org/10.1109/CAMAD.2013.6708081</ee>
<crossref>conf/camad/2013</crossref>
<url>db/conf/camad/camad2013.html#PfennigF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/camad/RichterFEPJ13" mdate="2020-12-01">
<author pid="122/5665">Johannes Richter</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="137/3369">Sabrina Engelmann</author>
<author pid="118/1475">Stefan Pfennig</author>
<author orcid="0000-0001-7893-8435" pid="20/4825">Eduard A. Jorswieck</author>
<title>Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?</title>
<pages>164-168</pages>
<year>2013</year>
<booktitle>CAMAD</booktitle>
<ee>https://doi.org/10.1109/CAMAD.2013.6708110</ee>
<crossref>conf/camad/2013</crossref>
<url>db/conf/camad/camad2013.html#RichterFEPJ13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BiselliFC13" mdate="2020-12-01">
<author pid="140/6370">Anna Biselli</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="140/6486">Maur&#237;lio Pereira Coutinho</author>
<title>Protection of consumer data in the smart grid compliant with the German smart metering guideline.</title>
<pages>41-52</pages>
<year>2013</year>
<booktitle>SEGS@CCS</booktitle>
<ee>https://doi.org/10.1145/2516930.2516933</ee>
<crossref>conf/ccs/2013segs</crossref>
<url>db/conf/ccs/segs2013.html#BiselliFC13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/PfennigF13" mdate="2020-12-01">
<author pid="118/1475">Stefan Pfennig</author>
<author pid="73/5092">Elke Franz 0001</author>
<title>Secure network coding: Dependency of efficiency on network topology.</title>
<pages>2100-2105</pages>
<year>2013</year>
<crossref>conf/icc/2013</crossref>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2013.6654836</ee>
<url>db/conf/icc/icc2013.html#PfennigF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobihoc/MburuFS13" mdate="2022-05-24">
<author pid="174/6697">Stephen Mburu</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="41/5584">Thomas Springer 0001</author>
<title>A conceptual framework for designing mHealth solutions for developing countries.</title>
<pages>31-36</pages>
<year>2013</year>
<booktitle>MobileHealth@MobiHoc</booktitle>
<ee>https://doi.org/10.1145/2491148.2491154</ee>
<crossref>conf/mobihoc/2013mh</crossref>
<url>db/conf/mobihoc/mh2013.html#MburuFS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cms/FranzPF12" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="118/1475">Stefan Pfennig</author>
<author pid="35/3260">Andr&#233; Fischer</author>
<title>Efficiency of Secure Network Coding Schemes.</title>
<pages>145-159</pages>
<year>2012</year>
<booktitle>Communications and Multimedia Security</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-32805-3_12</ee>
<crossref>conf/cms/2012</crossref>
<url>db/conf/cms/cms2012.html#FranzPF12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitst/FranzSH12" mdate="2022-05-24">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="41/5584">Thomas Springer 0001</author>
<author pid="127/1654">Norbert Harder</author>
<title>Enhancing privacy in social applications with the notion of group context.</title>
<pages>112-118</pages>
<year>2012</year>
<booktitle>ICITST</booktitle>
<ee>https://ieeexplore.ieee.org/document/6470995/</ee>
<crossref>conf/icitst/2012</crossref>
<url>db/conf/icitst/icitst2012.html#FranzSH12</url>
</inproceedings>
</r>
<r><incollection key="series/lncs/LiesebachFSJBBW11" mdate="2020-12-01">
<author pid="22/3329">Katja Liesebach</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="73/1179">Anne-Katrin Stange</author>
<author pid="03/11089">Andreas Juschka</author>
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</author>
<author pid="07/1499">Alexander B&#246;ttcher</author>
<author pid="68/2353">Hagen Wahrig</author>
<title>Collaborative E-Learning.</title>
<pages>657-677</pages>
<year>2011</year>
<booktitle>Digital Privacy - PRIME</booktitle>
<ee>https://doi.org/10.1007/978-3-642-19050-6_24</ee>
<crossref>series/lncs/6545</crossref>
<url>db/series/lncs/lncs6545.html#LiesebachFSJBBW11</url>
</incollection>
</r>
<r><inproceedings key="conf/mmsec/FranzRB09" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="149/3680">Stefan R&#246;nisch</author>
<author pid="149/3505">Robert Bartel</author>
<title>Improved embedding based on a set of cover images.</title>
<pages>141-150</pages>
<year>2009</year>
<booktitle>MM&#38;Sec</booktitle>
<ee>https://doi.org/10.1145/1597817.1597842</ee>
<crossref>conf/mmsec/2009</crossref>
<url>db/conf/mmsec/mmsec2009.html#FranzRB09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustbus/FranzL09" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="22/3329">Katja Liesebach</author>
<title>Supporting Local Aliases as Usable Presentation of Secure Pseudonyms.</title>
<pages>22-31</pages>
<year>2009</year>
<booktitle>TrustBus</booktitle>
<ee>https://doi.org/10.1007/978-3-642-03748-1_3</ee>
<crossref>conf/trustbus/2009</crossref>
<url>db/conf/trustbus/trustbus2009.html#FranzL09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEares/FranzGSB08" mdate="2023-03-24">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="45/4453">Christin Groba</author>
<author pid="41/5584">Thomas Springer 0001</author>
<author pid="75/5504">Mike Bergmann</author>
<title>A Comprehensive Approach for Context-dependent Privacy Management.</title>
<pages>903-910</pages>
<year>2008</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2008.184</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2008.184</ee>
<crossref>conf/IEEEares/2008</crossref>
<url>db/conf/IEEEares/ares2008.html#FranzGSB08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sswmc/Franz08" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<title>Embedding considering dependencies between pixels.</title>
<pages>68191D</pages>
<year>2008</year>
<booktitle>Security, Forensics, Steganography, and Watermarking of Multimedia Contents</booktitle>
<ee>https://doi.org/10.1117/12.766709</ee>
<crossref>conf/sswmc/2008</crossref>
<url>db/conf/sswmc/sfswmc2008.html#Franz08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sswmc/GloeFW07" mdate="2020-12-01">
<author pid="11/4347">Thomas Gloe</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="82/5782">Antje Winkler</author>
<title>Forensics for flatbed scanners.</title>
<pages>65051I</pages>
<year>2007</year>
<booktitle>Security, Steganography, and Watermarking of Multimedia Contents</booktitle>
<ee>https://doi.org/10.1117/12.704165</ee>
<crossref>conf/sswmc/2007</crossref>
<url>db/conf/sswmc/sswmc2007.html#GloeFW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEares/FranzB06" mdate="2023-03-24">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</author>
<title>Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects.</title>
<pages>872-878</pages>
<year>2006</year>
<crossref>conf/IEEEares/2006</crossref>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2006.77</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2006.77</ee>
<url>db/conf/IEEEares/ares2006.html#FranzB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEares/FranzWBB06" mdate="2023-03-24">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="68/2353">Hagen Wahrig</author>
<author pid="07/1499">Alexander B&#246;ttcher</author>
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</author>
<title>Access Control in a Privacy-Aware eLearning Environment.</title>
<pages>879-886</pages>
<year>2006</year>
<crossref>conf/IEEEares/2006</crossref>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2006.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2006.20</ee>
<url>db/conf/IEEEares/ares2006.html#FranzWBB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/avi/FranzLB06" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="22/3329">Katja Liesebach</author>
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</author>
<title>Privacy-aware user interfaces within collaborative environments.</title>
<pages>45-48</pages>
<year>2006</year>
<booktitle>CAI</booktitle>
<ee>https://doi.org/10.1145/1145706.1145715</ee>
<crossref>conf/avi/2006cai</crossref>
<url>db/conf/avi/cai2006.html#FranzLB06</url>
</inproceedings>
</r>
<r><article key="journals/insk/DittmannFS05" mdate="2020-12-01">
<author pid="d/JDittmann">Jana Dittmann</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="26/6639">Antje Schneidewind</author>
<title>Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen.</title>
<pages>453-461</pages>
<year>2005</year>
<volume>28</volume>
<journal>Inform. Spektrum</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s00287-005-0043-y</ee>
<url>db/journals/insk/insk28.html#DittmannFS05</url>
</article>
</r>
<r><inproceedings key="conf/cbse/FranzW05" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="32/7272">Ute Wappler</author>
<title>Tailored Responsibility Within Component-Based Systems.</title>
<pages>203-218</pages>
<year>2005</year>
<crossref>conf/cbse/2005</crossref>
<booktitle>CBSE</booktitle>
<ee>https://doi.org/10.1007/11424529_14</ee>
<url>db/conf/cbse/cbse2005.html#FranzW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dim/Borcea-PfitzmannFP05" mdate="2020-12-01">
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Usable presentation of secure pseudonyms.</title>
<pages>70-76</pages>
<year>2005</year>
<crossref>conf/dim/2005</crossref>
<booktitle>Digital Identity Management</booktitle>
<ee>https://doi.org/10.1145/1102486.1102498</ee>
<url>db/conf/dim/dim2005.html#Borcea-PfitzmannFP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ih/FranzS05" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="26/6639">Antje Schneidewind</author>
<title>Pre-processing for Adding Noise Steganography.</title>
<pages>189-203</pages>
<year>2005</year>
<crossref>conf/ih/2005</crossref>
<booktitle>Information Hiding</booktitle>
<ee>https://doi.org/10.1007/11558859_15</ee>
<url>db/conf/ih/ih2005.html#FranzS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pet/BorceaDFPW05" mdate="2020-12-01">
<author pid="b/KatrinBorceaPfitzmann">Katrin Borcea</author>
<author pid="71/5290">Hilko Donker</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="68/2353">Hagen Wahrig</author>
<title>Towards Privacy-Aware eLearning.</title>
<pages>167-178</pages>
<year>2005</year>
<crossref>conf/pet/2005</crossref>
<booktitle>Privacy Enhancing Technologies</booktitle>
<ee>https://doi.org/10.1007/11767831_11</ee>
<url>db/conf/pet/pet2005.html#BorceaDFPW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isola/EichenhardtFRW04" mdate="2020-12-01">
<author pid="04/6920">Henrik Eichenhardt</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="05/905">Simone R&#246;ttger</author>
<author pid="32/7272">Ute Wappler</author>
<title>Adapting Component Models to Support Responsibility.</title>
<pages>191-193</pages>
<year>2004</year>
<booktitle>ISoLA (Preliminary proceedings)</booktitle>
<crossref>conf/isola/2004i</crossref>
<url>db/conf/isola/isola2004i.html#EichenhardtFRW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mmsec/FranzS04" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="26/6639">Antje Schneidewind</author>
<title>Adaptive steganography based on dithering.</title>
<pages>56-62</pages>
<year>2004</year>
<crossref>conf/mmsec/2004</crossref>
<booktitle>MM&#38;Sec</booktitle>
<ee>https://doi.org/10.1145/1022431.1022443</ee>
<url>db/conf/mmsec/mmsec2004.html#FranzS04</url>
</inproceedings>
</r>
<r><article key="journals/ife/AignerBFGHHMMMPRSSW03" mdate="2022-05-24">
<author pid="83/2709">Ronald Aigner</author>
<author orcid="0000-0001-8602-4027" pid="99/5231">Henrike Berthold</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="41/5558-1">Steffen G&#246;bel 0001</author>
<author pid="h/HHartig">Hermann H&#228;rtig</author>
<author pid="h/HeinrichHussmann">Heinrich Hu&#223;mann</author>
<author pid="m/KMeissner">Klaus Mei&#223;ner</author>
<author orcid="0000-0002-8102-1019" pid="m/KMeyerWegener">Klaus Meyer-Wegener</author>
<author pid="m/MMeyerhofer">Marcus Meyerh&#246;fer</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="05/905">Simone R&#246;ttger</author>
<author pid="51/3949">Alexander Schill</author>
<author pid="41/5584">Thomas Springer 0001</author>
<author pid="14/2700">Frank Wehner</author>
<title>COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsf&#228;higkeit.</title>
<pages>39-40</pages>
<year>2003</year>
<volume>18</volume>
<journal>Inform. Forsch. Entwickl.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00450-002-0126-9</ee>
<url>db/journals/ife/ife18.html#AignerBFGHHMMMPRSSW03</url>
</article>
</r>
<r><phdthesis key="phd/dnb/Franz02" mdate="2021-07-17">
<author pid="73/5092">Elke Franz 0001</author>
<title>Steganographie durch Nachbildung plausibler &#196;nderungen.</title>
<year>2002</year>
<pages>1-195</pages>
<school>Dresden University of Technology, Germany</school>
<ee>https://d-nb.info/966456483</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/ih/Franz02" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<title>Steganography Preserving Statistical Properties.</title>
<pages>278-294</pages>
<year>2002</year>
<crossref>conf/ih/2002</crossref>
<booktitle>Information Hiding</booktitle>
<ee>https://doi.org/10.1007/3-540-36415-3_18</ee>
<url>db/conf/ih/ih2002.html#Franz02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/Franz01" mdate="2022-11-17">
<author pid="73/5092">Elke Franz 0001</author>
<title>Steganographie unter Erhalt statistischer Merkmale.</title>
<pages>225-240</pages>
<year>2001</year>
<booktitle>VIS</booktitle>
<ee>https://doi.org/10.1007/978-3-663-05918-9_16</ee>
<crossref>conf/vis/2001</crossref>
<url>db/conf/vis/vis2001.html#Franz01</url>
</inproceedings>
</r>
<r><article key="journals/dud/FranzS99" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="35/3039">Dagmar Sch&#246;nfeld</author>
<title>Gesch&#228;ftsmodelle f&#252;r Watermarking.</title>
<year>1999</year>
<volume>23</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>12</number>
<url>db/journals/dud/dud23.html#FranzS99</url>
</article>
</r>
<r><inproceedings key="conf/ih/FranzP99" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Steganography Secure against Cover-Stego-Attacks.</title>
<pages>29-46</pages>
<year>1999</year>
<crossref>conf/ih/1999</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih99.html#FranzP99</url>
<ee>https://doi.org/10.1007/10719724_3</ee>
</inproceedings>
</r>
<r><article key="journals/insk/FranzP98" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Einf&#252;hrung in die Steganographie und Ableitung eines neuen Stegoparadigmas.</title>
<pages>183-193</pages>
<year>1998</year>
<volume>21</volume>
<journal>Inform. Spektrum</journal>
<number>4</number>
<url>db/journals/insk/insk21.html#FranzP98</url>
<ee>https://doi.org/10.1007/s002870050098</ee>
</article>
</r>
<r><inproceedings key="conf/acisp/FranzGJP98" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="60/1637">A. Graubner</author>
<author pid="23/645">Anja Jerichow</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks.</title>
<pages>111-122</pages>
<year>1998</year>
<crossref>conf/acisp/1998</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/BFb0053726</ee>
<url>db/conf/acisp/acisp1998.html#FranzGJP98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/FranzJ98" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="23/645">Anja Jerichow</author>
<title>A Mix-Mediated Anonymity Service and Its Payment.</title>
<pages>313-327</pages>
<year>1998</year>
<crossref>conf/esorics/1998</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/BFb0055872</ee>
<url>db/conf/esorics/esorics1998.html#FranzJ98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip/FranzJW98" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="23/645">Anja Jerichow</author>
<author pid="30/5262">Guntram Wicke</author>
<title>A Payment Scheme for Mixes Providing Anonymity.</title>
<pages>94-108</pages>
<ee>https://doi.org/10.1007/BFb0053404</ee>
<year>1998</year>
<crossref>conf/ifip/1998trec</crossref>
<booktitle>Trends in Distributed Systems for Electronic Commerce</booktitle>
<url>db/conf/ifip/trec1998.html#FranzJW98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kivs/FederrathFJMP97" mdate="2020-12-01">
<author pid="f/HannesFederrath">Hannes Federrath</author>
<author pid="73/5092">Elke Franz 0001</author>
<author pid="23/645">Anja Jerichow</author>
<author pid="48/2018">Jan M&#252;ller 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Ein Vertraulichkeit gew&#228;hrendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in k&#252;nftigen Mobilkommunikationssystemen.</title>
<pages>77-91</pages>
<year>1997</year>
<crossref>conf/kivs/1997</crossref>
<booktitle>Kommunikation in Verteilten Systemen</booktitle>
<url>db/conf/kivs/kivs97.html#FederrathFJMP97</url>
<ee>https://doi.org/10.1007/978-3-642-60729-5_6</ee>
</inproceedings>
</r>
<r><incollection key="books/vi/97/FranzJP97" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="23/645">Anja Jerichow</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Systematisierung und Modellierung von Mixen.</title>
<pages>171-190</pages>
<year>1997</year>
<booktitle>Verl&#228;&#223;liche IT-Systeme</booktitle>
<ee>https://doi.org/10.1007/978-3-322-86842-8_13</ee>
<crossref>books/vi/97/MRRS1997</crossref>
<url>db/books/collections/MRRS1997.html#FranzJP97</url>
</incollection>
</r>
<r><inproceedings key="conf/ih/FranzJMPS96" mdate="2020-12-01">
<author pid="73/5092">Elke Franz 0001</author>
<author pid="23/645">Anja Jerichow</author>
<author pid="55/6718">Steffen M&#246;ller</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="08/998">Ingo Stierand</author>
<title>Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best.</title>
<pages>7-21</pages>
<year>1996</year>
<crossref>conf/ih/1996</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih96.html#FranzJMPS96</url>
<ee>https://doi.org/10.1007/3-540-61996-8_28</ee>
</inproceedings>
</r>
<coauthors n="84" nc="4">
<co c="0"><na f="a/Aigner:Ronald" pid="83/2709">Ronald Aigner</na></co>
<co c="1"><na f="b/Bartel:Robert" pid="149/3505">Robert Bartel</na></co>
<co c="0"><na f="b/Bergmann:Mike" pid="75/5504">Mike Bergmann</na></co>
<co c="0"><na f="b/Berthold:Henrike" pid="99/5231">Henrike Berthold</na></co>
<co c="0"><na f="b/Bielert:Mario" pid="177/0153">Mario Bielert</na></co>
<co c="2"><na f="b/Biselli:Anna" pid="140/6370">Anna Biselli</na></co>
<co c="0" n="2"><na f="b/Borcea=Pfitzmann:Katrin" pid="b/KatrinBorceaPfitzmann">Katrin Borcea-Pfitzmann</na><na>Katrin Borcea</na></co>
<co c="0"><na f="b/B=ouml=ttcher:Alexander" pid="07/1499">Alexander B&#246;ttcher</na></co>
<co c="0"><na f="c/Ciorba:Florina_M=" pid="15/2321">Florina M. Ciorba</na></co>
<co c="2"><na f="c/Coutinho:Maur=iacute=lio_Pereira" pid="140/6486">Maur&#237;lio Pereira Coutinho</na></co>
<co c="3"><na f="d/Dittmann:Jana" pid="d/JDittmann">Jana Dittmann</na></co>
<co c="0"><na f="d/Donker:Hilko" pid="71/5290">Hilko Donker</na></co>
<co c="0"><na f="e/Eichenhardt:Henrik" pid="04/6920">Henrik Eichenhardt</na></co>
<co c="0"><na f="e/Engelmann:Sabrina" pid="137/3369">Sabrina Engelmann</na></co>
<co c="0"><na f="f/Federrath:Hannes" pid="f/HannesFederrath">Hannes Federrath</na></co>
<co c="0"><na f="f/Feldhoff:Kim" pid="77/11144">Kim Feldhoff</na></co>
<co c="0"><na f="f/Fettweis:Gerhard_P=" pid="f/GFettweis">Gerhard P. Fettweis</na></co>
<co c="0"><na f="f/Fischer:Andr=eacute=" pid="35/3260">Andr&#233; Fischer</na></co>
<co c="0"><na f="f/Fischer:Erik" pid="86/10509">Erik Fischer</na></co>
<co c="0"><na f="f/Fitzek:Frank_H=_P=" pid="f/FHPFitzek">Frank H. P. Fitzek</na></co>
<co c="0"><na f="f/F=ouml=rster:Niklas" pid="285/2488">Niklas F&#246;rster</na></co>
<co c="0"><na f="g/Gloe:Thomas" pid="11/4347">Thomas Gloe</na></co>
<co c="0"><na f="g/G=ouml=bel_0001:Steffen" pid="41/5558-1">Steffen G&#246;bel 0001</na></co>
<co c="0"><na f="g/G=ouml=hringer:Diana" pid="13/2844">Diana G&#246;hringer</na></co>
<co c="0"><na f="g/Graubner:A=" pid="60/1637">A. Graubner</na></co>
<co c="0"><na f="g/Groba:Christin" pid="45/4453">Christin Groba</na></co>
<co c="-1"><na f="g/Gr=uuml=tzner:Anita" pid="360/6200">Anita Gr&#252;tzner</na></co>
<co c="0" n="2"><na f="g/Guerrero:Juan_Alberto_Cabrera" pid="230/9980">Juan Alberto Cabrera Guerrero</na><na>Juan A. Cabrera 0002</na></co>
<co c="0"><na f="h/Haase:Julian" pid="32/9396">Julian Haase</na></co>
<co c="0"><na f="h/Hackenberg:Daniel" pid="28/235">Daniel Hackenberg</na></co>
<co c="0"><na f="h/Harder:Norbert" pid="127/1654">Norbert Harder</na></co>
<co c="0"><na f="h/H=auml=rtig:Hermann" pid="h/HHartig">Hermann H&#228;rtig</na></co>
<co c="0"><na f="h/Harttung:Julian" pid="240/9269">Julian Harttung</na></co>
<co c="0"><na f="h/Hellbr=uuml=ck:Horst" pid="09/3611">Horst Hellbr&#252;ck</na></co>
<co c="0"><na f="h/Hofmann:Christoph" pid="h/ChristophHofmann">Christoph Hofmann</na></co>
<co c="0"><na f="h/Hu=szlig=mann:Heinrich" pid="h/HeinrichHussmann">Heinrich Hu&#223;mann</na></co>
<co c="0"><na f="i/Ilsche:Thomas" pid="63/9894">Thomas Ilsche</na></co>
<co c="0"><na f="j/Janda:Carsten_Rudolf" pid="161/8918">Carsten Rudolf Janda</na></co>
<co c="0"><na f="j/Jaster:Sebastian" pid="331/9629">Sebastian Jaster</na></co>
<co c="0"><na f="j/Jerichow:Anja" pid="23/645">Anja Jerichow</na></co>
<co c="0"><na f="j/Jorswieck:Eduard_A=" pid="20/4825">Eduard A. Jorswieck</na></co>
<co c="0"><na f="j/Juschka:Andreas" pid="03/11089">Andreas Juschka</na></co>
<co c="0"><na f="k/Kn=uuml=pfer:Andreas" pid="32/6648">Andreas Kn&#252;pfer</na></co>
<co c="0"><na f="k/Kumar_0001:Akash" pid="29/414">Akash Kumar 0001</na></co>
<co c="0"><na f="l/Li_0026:Tao" pid="75/4601-26">Tao Li 0026</na></co>
<co c="0"><na f="l/Liesebach:Katja" pid="22/3329">Katja Liesebach</na></co>
<co c="0"><na f="l/Lonnstrom:Andrew" pid="211/3594">Andrew Lonnstrom</na></co>
<co c="0"><na f="m/Markwardt:Ulf" pid="79/9374">Ulf Markwardt</na></co>
<co c="0"><na f="m/Matthiesen:Bho" pid="92/11201">Bho Matthiesen</na></co>
<co c="0"><na f="m/Mburu:Stephen" pid="174/6697">Stephen Mburu</na></co>
<co c="0"><na f="m/Mei=szlig=ner:Klaus" pid="m/KMeissner">Klaus Mei&#223;ner</na></co>
<co c="0"><na f="m/Meyer=Wegener:Klaus" pid="m/KMeyerWegener">Klaus Meyer-Wegener</na></co>
<co c="0"><na f="m/Meyerh=ouml=fer:Marcus" pid="m/MMeyerhofer">Marcus Meyerh&#246;fer</na></co>
<co c="0"><na f="m/M=ouml=ller:Steffen" pid="55/6718">Steffen M&#246;ller</na></co>
<co c="0"><na f="m/Moriam:Sadia" pid="176/1190">Sadia Moriam</na></co>
<co c="0"><na f="m/M=uuml=ller_0001:Jan" pid="48/2018">Jan M&#252;ller 0001</na></co>
<co c="0"><na f="m/M=uuml=ller:Matthias_S=" pid="13/1808">Matthias S. M&#252;ller</na></co>
<co c="0"><na f="n/Nagel:Wolfgang_E=" pid="66/4013">Wolfgang E. Nagel</na></co>
<co c="0"><na f="n/Nguyen_0002:Giang_T=" pid="10/1557-2">Giang T. Nguyen 0002</na></co>
<co c="0"><na f="p/Pelka:Mathias" pid="163/8925">Mathias Pelka</na></co>
<co c="0"><na f="p/Pfennig:Stefan" pid="118/1475">Stefan Pfennig</na></co>
<co c="0"><na f="p/Pfitzmann:Andreas" pid="p/AndreasPfitzmann">Andreas Pfitzmann</na></co>
<co c="0"><na f="r/Reiher:Tobias" pid="191/2285">Tobias Reiher</na></co>
<co c="0"><na f="r/Richter:Johannes" pid="122/5665">Johannes Richter</na></co>
<co c="1"><na f="r/R=ouml=nisch:Stefan" pid="149/3680">Stefan R&#246;nisch</na></co>
<co c="0"><na f="r/R=ouml=ttger:Simone" pid="05/905">Simone R&#246;ttger</na></co>
<co c="0"><na f="s/Santini:Silvia" pid="41/6359">Silvia Santini</na></co>
<co c="0"><na f="s/Scheunert:Christian" pid="50/5380-6">Christian Scheunert</na></co>
<co c="0" n="2"><na f="s/Schiffel:Ute" pid="32/7272">Ute Schiffel</na><na>Ute Wappler</na></co>
<co c="0"><na f="s/Schill:Alexander" pid="51/3949">Alexander Schill</na></co>
<co c="3"><na f="s/Schneidewind:Antje" pid="26/6639">Antje Schneidewind</na></co>
<co c="0"><na f="s/Sch=ouml=ne:Robert" pid="72/6192">Robert Sch&#246;ne</na></co>
<co c="0"><na f="s/Sch=ouml=nfeld:Dagmar" pid="35/3039">Dagmar Sch&#246;nfeld</na></co>
<co c="0"><na f="s/Schuchart:Joseph" pid="23/8770">Joseph Schuchart</na></co>
<co c="0"><na f="s/Springer_0001:Thomas" pid="41/5584">Thomas Springer 0001</na></co>
<co c="0"><na f="s/Stange:Anne=Katrin" pid="73/1179">Anne-Katrin Stange</na></co>
<co c="0"><na f="s/Stierand:Ingo" pid="08/998">Ingo Stierand</na></co>
<co c="0"><na f="s/Strufe:Thorsten" pid="69/2809">Thorsten Strufe</na></co>
<co c="0"><na f="w/Wahrig:Hagen" pid="68/2353">Hagen Wahrig</na></co>
<co c="0"><na f="w/Walther:Paul" pid="220/6895">Paul Walther</na></co>
<co c="0"><na f="w/Wehner:Frank" pid="14/2700">Frank Wehner</na></co>
<co c="0"><na f="w/Wicke:Guntram" pid="30/5262">Guntram Wicke</na></co>
<co c="0"><na f="w/Winkler:Antje" pid="82/5782">Antje Winkler</na></co>
<co c="0"><na f="y/Yan:Yexin" pid="176/1194">Yexin Yan</na></co>
</coauthors>
</dblpperson>

