Author of the publication

Learning and Grading Cryptology via Automated Test Driven Software Development.

. WISE, volume 579 of IFIP Advances in Information and Communication Technology, page 3-17. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Electronic Business Applications - Structure and Quantification., and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 25-37. Springer, (2000)Analyzing Error Rates in Cryptological Programming Assignments.. World Conference on Information Security Education, volume 650 of IFIP Advances in Information and Communication Technology, page 3-16. Springer, (2022)Messung der Schwierigkeiten von Programmieraufgaben zur Kryptologie in Java.. ABP, page 35-42. GI, (2021)Dynamic Access Control through Petri Net Workflows.. ACSAC, page 159-167. IEEE Computer Society, (2000)A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components., , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 248-258. Springer, (2009)Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung., , and . Wirtschaftsinf., 42 (6): 499-508 (2000)Automatisierte Überprüfung von Webauftritten auf Fremdinhalte., and . GI-Jahrestagung, volume P-326 of LNI, page 639-650. Gesellschaft für Informatik, Bonn, (2022)Learning and Grading Cryptology via Automated Test Driven Software Development.. WISE, volume 579 of IFIP Advances in Information and Communication Technology, page 3-17. Springer, (2020)Prozeßmodellierung im Krankenhaus., , , and . Wirtschaftsinformatik, page 26. Physica-Verlag, (1999)Security Analysis of Electronic Business Processes., and . Electron. Commer. Res., 4 (1-2): 59-81 (2004)