From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA, , , , , , и . International Journal of Information Security and Privacy, (2013)NoPhish-Challenge-Karten., , , , , и . Datenschutz und Datensicherheit, 45 (11): 721-726 (2021)Web Application Security (Dagstuhl Seminar 18321)., , , и . Dagstuhl Reports, 8 (8): 1-17 (2018)Individual Verifiability with Return Codes: Manipulation Detection Efficacy., , и . E-Vote-ID, том 13553 из Lecture Notes in Computer Science, стр. 139-156. Springer, (2022)Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers., , и . Electronic Voting, том P-205 из LNI, стр. 257-270. GI, (2012)Evaluation der interaktiven NoPhish Präsenzschulung., , и . MuC (Workshopband), Gesellschaft für Informatik e.V., (2021)Shoulder-Surfing Resistant Authentication for Augmented Reality., , и . NordiCHI, стр. 29:1-29:13. ACM, (2022)Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen., , и . GI-Jahrestagung, том P-326 из LNI, стр. 601-615. Gesellschaft für Informatik, Bonn, (2022)Council of Europe Guidelines on the Use of ICT in Electoral Processes., , и . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, том 13785 из Lecture Notes in Computer Science, стр. 585-599. Springer, (2022)Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen., , , , , , , , и . Sicherheit, том P-228 из LNI, стр. 283-291. GI, (2014)