Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avalanche Effect in Improperly Initialized CAESAR Candidates., and . MEMICS, volume 233 of EPTCS, page 72-81. (2016)Experimental large-scale review of attractors for detection of potentially unwanted applications., , , , , and . Comput. Secur., (2018)Will you trust this TLS certificate?: perceptions of people working in IT., , , and . ACSAC, page 718-731. ACM, (2019)Teaching Lab: Training Novice Computer Science Teachers., , and . ITiCSE, page 561. ACM, (2020)Towards Cryptographic Function Distinguishers with Evolutionary Circuits., , and . SECRYPT, page 135-146. SciTePress, (2013)Reflective Diary for Professional Development of Novice Teachers., , and . CoRR, (2018)Usability Insights from Establishing TLS Connections., , , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 289-305. Springer, (2022)Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits., , and . ICETE (Selected Papers), volume 456 of Communications in Computer and Information Science, page 290-305. Springer, (2013)Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors., , , , and . EuroUSEC, page 131-144. ACM, (2022)A Large-Scale Comparative Study of Beta Testers and Standard Users., , , and . CoRR, (2018)