Author of the publication

Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems

, , , and . Datenschutz und Datensicherheit, 40 (5): 283–289 (Mai 2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering., , , , and . HistoCrypt, volume 183 of Linköping Electronic Conference Proceedings, page 111-120. Linköping University Electronic Press, (2021)What is the Code for the Code? Historical Cryptology Terminology., , , , , and . HistoCrypt, volume 195 of Linköping Electronic Conference Proceedings, page 130-138. Linköping University Electronic Press, (2023)Verfahren und Implementationen von "pretty Easy privacy" (pEp)., and . Datenschutz und Datensicherheit, 42 (2): 101-105 (2018)CrypTool 2.0. Open-Source Kryptologie für Jedermann, , , and . Datenschutz und Datensicherheit (DuD), (October 2014)New Ciphers and Cryptanalysis Components in CrypTool 2., and . HistoCrypt, volume 188 of Linköping Electronic Conference Proceedings, page 127-136. Linköping University Electronic Press, (2022)Reducing the Complexity of Understanding Cryptology using CrypTool, , and . The 10th International Conference on Education and Information Systems,Technologies and Applications (EISTA 2012), Orlando, Florida, USA, (17-20 07 2012)Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher., , , , , and . HistoCrypt, volume 188 of Linköping Electronic Conference Proceedings, page 82-90. Linköping University Electronic Press, (2022)Public-Key-Aktivitäten der Deutschen Bank., and . Prax. Inf.verarb. Kommun., 24 (2): 92-98 (2001)Datenschutz im 21.Jahrhundert - Ist Schutz der Privatsphäre (noch) möglich?, , , , , , and . INFOS, volume P-249 of LNI, page 33-42. GI, (2015)Vertrauensvolle E-Mail-Kommunikation. Technische Grundlagen der E-Mail(-Verschlüsselung), , , , and . Datenschutz und Datensicherheit (DuD), 40 (5): 271-277 (Mai 2016)