Publications

Publications

Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]


Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information and Computer Security, p.75-85
[Journal Article]


Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems
Demirel, Denise; Henning, Maria
Jusletter IT - Die Zeitschrift für IT und Recht
[Journal Article]


IT-Sicher­heits­forschung in Darmstadt - von den Grundlagen bis zur Anwendung
Kreutzer, Michael; Waidner, Michael; Buchmann, Johannes
Praxis der Informationsverarbeitung und Kommunikation, p.305-308
[Journal Article]


Physical Unclonable Functions: Sicher­heits­eigen­schaften und Anwendungen
Katzenbeisser, Stefan; Schaller, André
Datenschutz und Datensicherheit, p.881-885
[Journal Article]


A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
[Journal Article]