Author of the publication

Johnny 2: a user test of key continuity management with S/MIME and Outlook Express.

, and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 13-24. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Email Confidentiality through the use of Opportunistic Encryption.. DG.O, Digital Government Research Center, (2003)Digital forensics XML and the DFXML toolset.. Digital Investigation, 8 (3-4): 161-174 (2012)Programming Unicode.. login Usenix Mag., (2012)SIGINFO: Everything Is a Punch Card.. login Usenix Mag., (2020)Picking up the trash: Exploiting generational GC for memory analysis., , and . Digit. Investig., (2017)Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb., and . Digit. Investig., (2015)Language translation for file paths., , and . Digit. Investig., 10 (Supplement): S78-S86 (2013)Johnny 2: a user test of key continuity management with S/MIME and Outlook Express., and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 13-24. ACM, (2005)Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce., , , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 188-202. Springer, (2005)Bitfrost: the one laptop per child security model., and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 132-142. ACM, (2007)