Author of the publication

Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen.

, , and . GI-Jahrestagung, volume P-326 of LNI, page 601-615. Gesellschaft für Informatik, Bonn, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the German Legal Latitude Principlesin: 5th International Conference on eParticipation (ePart 2013), , , , , and . (2013)Biggest Failures in Security (Dagstuhl Seminar 19451)., , , and . Dagstuhl Reports, 9 (11): 1-23 (2019)Spot the phish by checking the pruned URL., , and . Inf. Comput. Secur., 24 (4): 372-385 (2016)Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays., , , and . CoRR, (2020)A Literature Review on Virtual Reality Authentication., , , , and . HAISA, volume 613 of IFIP Advances in Information and Communication Technology, page 189-198. Springer, (2021)German Voters' Attitudes Towards Voting Online with a Verifiable System., , , , and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 335-350. Springer, (2022)A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness., and . HICSS, page 1-10. ScholarSpace, (2019)From Legal Principles to an Internet Voting System., and . Electronic Voting in Europe, volume P-47 of LNI, page 111-120. GI, (2004)Über die Wirksamkeit von Anti-Phishing-Training., , and . MuC (Workshopband), page 647-655. De Gruyter Oldenbourg, (2015)Verifiability in Electronic Voting - Explanations for Non Security Experts., and . Electronic Voting, volume P-167 of LNI, page 151-162. GI, (2010)