Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grand theft API: A forensic analysis of vehicle cloud data., , , , and . Forensic Sci. Int. Digit. Investig., (2024)Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption., , , , and . CNS, page 1-9. IEEE, (2020)Sicherheit medizintechnischer Protokolle im Krankenhaus., , , , , , , , and . Sicherheit, volume P-323 of LNI, page 143-158. Gesellschaft für Informatik e.V., (2022)Attacking Deterministic Signature Schemes Using Fault Attacks., , , , and . EuroS&P, page 338-352. IEEE, (2018)Listen to Your Heart: Evaluation of the Cardiologic Ecosystem., , , , , , , , , and . ARES, page 10:1-10:10. ACM, (2021)Exploring the Landscape of Cybercrime., , , , , , , , , and 1 other author(s). SysSec@DIMVA, page 71-74. IEEE, (2011)"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks., , , , , , , and . SOUPS @ USENIX Security Symposium, page 77-96. USENIX Association, (2022)KIM: Kaos In der Medizin., , and . Sicherheit, volume P-345 of LNI, page 93-104. Gesellschaft für Informatik e.V., (2024)Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption., , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 24-42. Springer, (2019)CORSICA: Cross-Origin Web Service Identification., , , , , and . AsiaCCS, page 409-419. ACM, (2020)