Author of the publication

Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems

, , , and . Datenschutz und Datensicherheit, 40 (5): 283–289 (Mai 2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming, , , , , and . CCGRID '07: Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, page 773--782. Washington, DC, USA, IEEE Computer Society, (2007)Deciphering ADFGVX Messages from World War I Eastern Front, , , and . Cryptologia, (August 2016)A Concept for Intelligent Collaborative Network Intrusion Detection, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)Informatik mit Recht., , , , and . GI-Jahrestagung, volume P-294 of LNI, page 293-294. GI, (2019)A novel method for securing critical infrastructures by detecting hidden flows of data., , , and . CNS, page 648-654. IEEE, (2015)Comparing Nudges and Deceptive Patterns at a Technical Level., , and . DDPCHI@CHI, volume 3720 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)IT-Sicherheit, and . Wirtschaftsinformatik: Eine Einführung (Pearson Studium - Economic BWL), Wirtschaftsinformatik, chapter 15, Hallbergmoos, Germany: Pearson Deutschland GmbH, 3 edition, (Oktober 2015)The Future of Socio-Technical Design for Ubiquitous Computing Systems, , and . Socio-technical Design of Ubiquitous Computing Systems, Springer, Berlin, (2014)CrypTool 2.0. Open-Source Kryptologie für Jedermann, , , and . Datenschutz und Datensicherheit (DuD), (October 2014)Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages, , and . Cryptologia, (2015)