Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Johnny 2: a user test of key continuity management with S/MIME and Outlook Express., and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 13-24. ACM, (2005)Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce., , , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 188-202. Springer, (2005)Bitfrost: the one laptop per child security model., and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 132-142. ACM, (2007)Digital forensics XML and the DFXML toolset.. Digital Investigation, 8 (3-4): 161-174 (2012)Enabling Email Confidentiality through the use of Opportunistic Encryption.. DG.O, Digital Government Research Center, (2003)Programming Unicode.. login Usenix Mag., (2012)SIGINFO: Everything Is a Punch Card.. login Usenix Mag., (2020)Building Cocoa applications - a step-by-step guide., and . O'Reilly, (2002)Language translation for file paths., , and . Digit. Investig., 10 (Supplement): S78-S86 (2013)Picking up the trash: Exploiting generational GC for memory analysis., , and . Digit. Investig., (2017)