Author of the publication

Supporting Decision Makers in Choosing Suitable Authentication Schemes.

, , , and . HAISA, page 67-77. University of Plymouth, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Proxy Voting to Helios., , , and . ARES, page 98-106. IEEE Computer Society, (2016)Robust electronic voting: Introducing robustness in Civitas., , , and . REVOTE, page 47-55. IEEE Computer Society, (2011)POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes., , and . ACM Conference on Computer and Communications Security, page 1817-1819. ACM, (2016)Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail., , , and . GI-Jahrestagung, volume P-232 of LNI, page 1415-1426. GI, (2014)Towards A Practical JCJ / Civitas Implementation., , , and . GI-Jahrestagung, volume P-220 of LNI, page 804-818. GI, (2013)Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem., , , , and . Datenschutz und Datensicherheit, 39 (11): 747-752 (2015)SecIVo: a quantitative security evaluation framework for internet voting schemes., , , and . Annales des Télécommunications, 71 (7-8): 337-352 (2016)Formal Treatment of Distributed Trust in Electronic Voting., and . IACR Cryptology ePrint Archive, (2013)Pretty Understandable Democracy 2.0., , , and . IACR Cryptology ePrint Archive, (2014)Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA., , , , , , and . IJISP, 7 (3): 16-35 (2013)