Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pathways to Successful Online Testing: eExams with the "Secure Exam Environment" (SEE)., , and . CSEDU (Selected Papers), volume 1022 of Communications in Computer and Information Science, page 231-250. Springer, (2018)Guaranteeing High Availability of the "Secure Exam Environment" (SEE)., , and . CSEDU (1), page 130-136. SciTePress, (2018)Secure online exams using students' devices., , and . EDUCON, page 1-7. IEEE, (2012)Internetbanking - Sicherheitsaspekte und Haftungsfragen., and . Datenschutz und Datensicherheit, (2002)Video Surveillance: A Distributed Approach to Protect Privacy., and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 140-149. Springer, (2005)Unique User-Generated Digital Pseudonyms., and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 194-205. Springer, (2005)Secure Data Recording and Bio-Inspired Functional Integrity for Intelligent Robots., , and . IROS, page 8723-8728. IEEE, (2018)Geheimschriften in der Praxis., and . Datenschutz und Datensicherheit, 35 (11): 753 (2011)Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs., and . HEALTHINF (1), page 51-58. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)Key Escrow with Tree-Based Access Structure., and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 454-459. Springer, (2005)