Author of the publication

Secure and Privacy-Preserving eGovernment - Best Practice Austria.

, , , , and . Rainbow of Computer Science, volume 6570 of Lecture Notes in Computer Science, page 259-269. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext., , , and . Angew. Inform., 25 (3): 108-113 (1983)Ein Modell zur gemeinsamen Nutzung einer Rechenanlage., , and . GI Jahrestagung, volume 19 of Informatik-Fachberichte, page 534-544. Springer, (1979)ISDN Security services., , and . Communications and Multimedia Security, volume 152 of IFIP Conference Proceedings, page 21-35. Kluwer, (1999)Robustness-Agile Encryptor for ATM Networks., , , , , and . SEC, volume 175 of IFIP Conference Proceedings, page 231-240. Kluwer, (2000)Modulo Reduction in Residue Number Systems., and . IEEE Trans. Parallel Distributed Syst., 6 (5): 449-454 (1995)Protecting Devices by Active Coating.. J. Univers. Comput. Sci., 4 (7): 652-668 (1998)MRSA - a new public key encryption method.. SAFECOMP, page 341-348. Springer, (1993)Reconstruction of electronic signatures from eDocument printouts., , and . Comput. Secur., 29 (5): 523-532 (2010)Allocating Computer Resources to Satisfy User and Management Demands., and . Softw. Pract. Exp., 14 (4): 311-321 (1984)Digitale Signaturen in der Praxis., and . GI Jahrestagung (1), volume 157 of Schriftenreihe der Österreichischen Computer-Gesellschaft, page 477-485. Konstanz UVK-Verl.-Ges., (2001)