From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA, , , , , , и . International Journal of Information Security and Privacy, (2013)Individual Verifiability with Return Codes: Manipulation Detection Efficacy., , и . E-Vote-ID, том 13553 из Lecture Notes in Computer Science, стр. 139-156. Springer, (2022)Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers., , и . Electronic Voting, том P-205 из LNI, стр. 257-270. GI, (2012)Why Johnny Fails to Protect his Privacy., , и . EuroS&P Workshops, стр. 109-118. IEEE, (2019)NoPhish-Challenge-Karten., , , , , и . Datenschutz und Datensicherheit, 45 (11): 721-726 (2021)Shoulder-Surfing Resistant Authentication for Augmented Reality., , и . NordiCHI, стр. 29:1-29:13. ACM, (2022)Web Application Security (Dagstuhl Seminar 18321)., , , и . Dagstuhl Reports, 8 (8): 1-17 (2018)Evaluation der interaktiven NoPhish Präsenzschulung., , и . MuC (Workshopband), Gesellschaft für Informatik e.V., (2021)FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen., , и . Sicherheit, том P-77 из LNI, стр. 159-170. GI, (2006)Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen., , , , , , , , и . Sicherheit, том P-228 из LNI, стр. 283-291. GI, (2014)