Author of the publication

E-Voting - An Overview of the Development in the Past 15 Years and Current Discussions.

, , and . E-VOTE-ID, volume 11759 of Lecture Notes in Computer Science, page 1-13. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA, , , , , , and . International Journal of Information Security and Privacy, (2013)Individual Verifiability with Return Codes: Manipulation Detection Efficacy., , and . E-Vote-ID, volume 13553 of Lecture Notes in Computer Science, page 139-156. Springer, (2022)Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers., , and . Electronic Voting, volume P-205 of LNI, page 257-270. GI, (2012)Why Johnny Fails to Protect his Privacy., , and . EuroS&P Workshops, page 109-118. IEEE, (2019)NoPhish-Challenge-Karten., , , , , and . Datenschutz und Datensicherheit, 45 (11): 721-726 (2021)Shoulder-Surfing Resistant Authentication for Augmented Reality., , and . NordiCHI, page 29:1-29:13. ACM, (2022)Web Application Security (Dagstuhl Seminar 18321)., , , and . Dagstuhl Reports, 8 (8): 1-17 (2018)Evaluation der interaktiven NoPhish Präsenzschulung., , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2021)FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen., , and . Sicherheit, volume P-77 of LNI, page 159-170. GI, (2006)Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen., , , , , , , , and . Sicherheit, volume P-228 of LNI, page 283-291. GI, (2014)