Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation., , , and . HAISA, page 179-188. University of Plymouth, (2019)Zur Benutzbarkeit der AusweisApp2., , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2016)3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren., , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2017)Towards a Maturity Model for Crypto-Agility Assessment., , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 104-119. Springer, (2022)Zur rechtsverträglichen Technikgestaltung anhand einer m-commerce-Anwendung, , and . Proceedings zum 4. Workshop Mobile Commerce, page 162--177. Augsburg, (2004)E- Learning und Hochschulbibliotheken. Master's Thesis, Studiengang Master of Library and Information Science, FH Köln. Köln, (2008)Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte., , and . CoRR, (2021)6. Usable Security und Privacy Workshop., , , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2020)8. Usable Security und PrivacyWorkshop., , , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2022)Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen., and . GI Jahrestagung (2), volume P-35 of LNI, page 366-371. GI, (2003)