Author of the publication

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.

, , , and . GI-Jahrestagung, volume P-232 of LNI, page 1415-1426. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Proxy Voting to Helios., , , and . ARES, page 98-106. IEEE Computer Society, (2016)Robust electronic voting: Introducing robustness in Civitas., , , and . REVOTE, page 47-55. IEEE Computer Society, (2011)POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes., , and . ACM Conference on Computer and Communications Security, page 1817-1819. ACM, (2016)Towards A Practical JCJ / Civitas Implementation., , , and . GI-Jahrestagung, volume P-220 of LNI, page 804-818. GI, (2013)Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail., , , and . GI-Jahrestagung, volume P-232 of LNI, page 1415-1426. GI, (2014)Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA., , , , , , and . IJISP, 7 (3): 16-35 (2013)Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem., , , , and . Datenschutz und Datensicherheit, 39 (11): 747-752 (2015)SecIVo: a quantitative security evaluation framework for internet voting schemes., , , and . Annales des Télécommunications, 71 (7-8): 337-352 (2016)Pretty Understandable Democracy 2.0., , , and . IACR Cryptology ePrint Archive, (2014)Formal Treatment of Distributed Trust in Electronic Voting., and . IACR Cryptology ePrint Archive, (2013)