Author of the publication

Recent Developments in the Context of Online Elections and Digital Polls in Germany.

, , , , , , , , , and . Sicherheit, volume P-323 of LNI, page 213-217. Gesellschaft für Informatik e.V., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Secure Multi-Party Computation with Identifiable Abort., , , and . IACR Cryptol. ePrint Arch., (2020)Challenges and Opportunities of Cloud Computing -- Trade-off Decisions in Cloud Computing Architecture, , , , , , , and . 2010-19. Karlsruhe Institue of Technology, Faculty of Informatics, (2010)Universally Composable Auditable Surveillance., , , , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 453-487. Springer, (2023)Composable Long-Term Security with Rewinding., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels., , , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 316-344. Springer, (2022)Methods to Secure Services in an Untrusted Environment., and . Software Engineering, volume P-183 of LNI, page 159-170. GI, (2011)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 750-781. Springer, (2021)ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology., , , , , , and . EuroS&P, page 357-371. IEEE, (2016)Towards Realising Oblivious Voting., , , , and . ICETE (Selected Papers), volume 764 of Communications in Computer and Information Science, page 216-240. Springer, (2016)On Group Key Agreement with Cheater Identification, , and . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)