Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Privacy-Preserving Proxy Voting System., , and . ICEBE, page 472-477. IEEE Computer Society, (2013)A Modular and Flexible Identity Management Architecture for National eID Solutions., and . WEBIST, page 321-331. SciTePress, (2015)A privacy-preserving eID based Single Sign-On solution., , and . NSS, page 295-299. IEEE, (2011)Secure cross-cloud single sign-on (SSO) using eIDs., and . ICITST, page 150-155. IEEE, (2012)CREDENTIAL: Secure Cloud Identity Wallet., , , and . ERCIM News, (2016)A Shared Certified Mail System for the Austrian Public and Private Sectors., , and . EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 356-369. Springer, (2011)Cloud Computing in E-Government across Europe - A Comparison., , , and . EGOVIS/EDEM, volume 8061 of Lecture Notes in Computer Science, page 181-195. Springer, (2013)Secure and Privacy-Preserving eGovernment - Best Practice Austria., , , , and . Rainbow of Computer Science, volume 6570 of Lecture Notes in Computer Science, page 259-269. Springer, (2011)A Comparative Survey of Cloud Identity Management-Models., , and . WEBIST (Revised Selected Papers), volume 226 of Lecture Notes in Business Information Processing, page 128-144. Springer, (2014)On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 300-314. Springer, (2013)