Author of the publication

Strengths and weaknesses of software architectures for the rapid creation of tangible and multimodal interfaces.

, , , , and . Tangible and Embedded Interaction, page 47-54. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4., , , and . GI-Jahrestagung, volume P-220 of LNI, page 752-766. GI, (2013)Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting., , and . VOTE-ID, volume 7187 of Lecture Notes in Computer Science, page 19-35. Springer, (2011)Attacking the Verification Code Mechanism in the Norwegian Internet Voting System., , and . VOTE-ID, volume 7985 of Lecture Notes in Computer Science, page 76-92. Springer, (2013)Strengths and weaknesses of software architectures for the rapid creation of tangible and multimodal interfaces., , , , and . Tangible and Embedded Interaction, page 47-54. ACM, (2008)A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes., and . Computers & Security, (2013)CHVote System Specification., , , and . IACR Cryptology ePrint Archive, (2017)Efficient Vote Authorization in Coercion-Resistant Internet Voting., , , and . VOTE-ID, volume 7187 of Lecture Notes in Computer Science, page 71-88. Springer, (2011)Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting., , , and . Electronic Voting, volume P-205 of LNI, page 113-125. GI, (2012)How to Store some Secrets., and . IACR Cryptology ePrint Archive, (2012)Process Models for Universally Verifiable Elections., , , and . E-Vote-ID, volume 11143 of Lecture Notes in Computer Science, page 84-99. Springer, (2018)