Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Survey of Cloud Identity Management-Models., , and . WEBIST (Revised Selected Papers), volume 226 of Lecture Notes in Business Information Processing, page 128-144. Springer, (2014)Secure and Privacy-Preserving eGovernment - Best Practice Austria., , , , and . Rainbow of Computer Science, volume 6570 of Lecture Notes in Computer Science, page 259-269. Springer, (2011)Android - On-device detection of SMS catchers and sniffers., , , , and . PRISMS, page 1-8. IEEE, (2014)A Shared Certified Mail System for the Austrian Public and Private Sectors., , and . EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 356-369. Springer, (2011)Total Eclipse of the Heart - Disrupting the InterPlanetary File System., , and . CoRR, (2020)Evaluation in Pilot-Based Research Projects: A Hierarchical Approach.. WEBIST (Revised Selected Papers), volume 372 of Lecture Notes in Business Information Processing, page 125-146. Springer, (2018)Towards a Personal Security Device., , and . STM, volume 9871 of Lecture Notes in Computer Science, page 1-16. Springer, (2016)WebCrySIL - Web Cryptographic Service Interoperability Layer., , and . WEBIST, page 35-44. SciTePress, (2015)CrySIL: Bringing Crypto to the Modern User., , and . WEBIST (Revised Selected Papers), volume 246 of Lecture Notes in Business Information Processing, page 70-90. Springer, (2015)Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe., and . EGOVIS, volume 9265 of Lecture Notes in Computer Science, page 86-100. Springer, (2015)