Author of the publication

Recent Developments in the Context of Online Elections and Digital Polls in Germany.

, , , , , , , , , and . Sicherheit, volume P-323 of LNI, page 213-217. Gesellschaft für Informatik e.V., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA, , , , , , and . International Journal of Information Security and Privacy, (2013)Web Application Security (Dagstuhl Seminar 18321)., , , and . Dagstuhl Reports, 8 (8): 1-17 (2018)Why Johnny Fails to Protect his Privacy., , and . EuroS&P Workshops, page 109-118. IEEE, (2019)NoPhish-Challenge-Karten., , , , , and . Datenschutz und Datensicherheit, 45 (11): 721-726 (2021)Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers., , and . Electronic Voting, volume P-205 of LNI, page 257-270. GI, (2012)Evaluation der interaktiven NoPhish Präsenzschulung., , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2021)Individual Verifiability with Return Codes: Manipulation Detection Efficacy., , and . E-Vote-ID, volume 13553 of Lecture Notes in Computer Science, page 139-156. Springer, (2022)Shoulder-Surfing Resistant Authentication for Augmented Reality., , and . NordiCHI, page 29:1-29:13. ACM, (2022)Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen., , and . GI-Jahrestagung, volume P-326 of LNI, page 601-615. Gesellschaft für Informatik, Bonn, (2022)Council of Europe Guidelines on the Use of ICT in Electoral Processes., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 585-599. Springer, (2022)