| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | A* | conf |
CHI
|
| 2026 | — | ed. |
E-VOTE-ID
|
| 2026 | J | jnl |
Datenschutz und Datensicherheit (dud)
|
| 2026 | A* | conf |
CHI
|
| 2025 | — | conf |
E-VOTE-ID
|
| 2025 | — | ed. |
E-Vote-ID
|
| 2025 | — | ed. |
E-Vote-ID (GI)
|
| 2025 | J | jnl |
Datenschutz und Datensicherheit (dud)
|
| 2025 | A* | conf |
Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness.
SP
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
E-VOTE-ID
|
| 2024 | — | conf |
MuC (Workshopband)
|
| 2024 | A* | conf |
CHI
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | — | ed. |
E-Vote-ID (GI)
|
| 2024 | — | conf |
MuC (Workshopband)
|
| 2024 | B | conf |
ARES
|
| 2024 | — | conf |
HAISA (1)
|
| 2024 | — | conf |
E-Vote-ID (GI)
|
| 2024 | — | conf |
EuroS&P Workshops
|
| 2024 | — | conf |
FC Workshops
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | — | conf |
E-Vote-ID (GI)
|
| 2024 | — | conf |
MuC (Workshopband)
|
| 2024 | J | jnl |
Datenschutz und Datensicherheit (dud)
|
| 2023 | Misc | conf |
MuC
|
| 2023 | J | jnl |
Datenschutz und Datensicherheit (dud)
|
| 2023 | — | ed. |
E-Vote-ID
|
| 2023 | — | conf |
EuroUSEC
|
| 2023 | — | conf |
E-Vote-ID (GI)
|
| 2023 | — | conf |
E-Vote-ID (GI)
|
| 2023 | — | conf |
EuroUSEC
|
| 2023 | J | jnl |
Comput. und Recht
|
| 2023 | J | jnl |
Comput. und Recht
|
| 2023 | C | conf |
ICISSP
|
| 2023 | — | conf |
E-Vote-ID (GI)
|
| 2023 | J | jnl |
Datenschutz und Datensicherheit (dud)
|
| 2022 | — | conf |
SOUPS @ USENIX Security Symposium
|
| 2022 | — | conf |
HAISA
|
| 2022 | B | conf |
ARES
|
| 2022 | — | conf |
CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS
|
| 2022 | — | conf |
STAST
|
| 2022 | — | ed. |
E-Vote-ID
|
| 2022 | — | conf |
Financial Cryptography Workshops
|
| 2022 | — | conf |
Increasing security without decreasing usability: A comparison of various verifiable voting systems.
SOUPS @ USENIX Security Symposium
|
| 2022 | — | conf |
E-Vote-ID
|
| 2022 | J | jnl |
Datenschutz und Datensicherheit
|
| 2022 | — | conf |
MuC (Workshopband)
|
| 2022 | — | conf |
Sicherheit
|
| 2022 | Misc | conf |
NordiCHI
|
| 2022 | B | conf |
ARES
|
| 2022 | — | conf |
GI-Jahrestagung
|
| 2022 | — | conf |
CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS
|
| 2021 | — | conf |
HICSS
|
| 2021 | — | conf |
HAISA
|
| 2021 | — | conf |
EuroUSEC
|
| 2021 | — | ed. |
E-Vote-ID
|
| 2021 | — | conf |
MuC (Workshopband)
|
| 2021 | B | conf |
TrustCom
|
| 2021 | J | jnl |
Datenschutz und Datensicherheit
|
| 2021 | J | jnl |
AIS Trans. Hum. Comput. Interact.
|
| 2021 | — | conf |
CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS
|
| 2021 | — | conf |
EuroUSEC
|
| 2020 | J | jnl |
CoRR
|
| 2020 | B | ed. |
ARES
|
| 2020 | — | conf |
SOUPS @ USENIX Security Symposium
|
| 2020 | — | conf |
DETIPS/DeSECSys/MPS/SPOSE@ESORICS
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | — | ed. |
E-Vote-ID
|
| 2020 | J | jnl |
Datenschutz und Datensicherheit
|
| 2020 | J | jnl |
J. Cybersecur.
|
| 2020 | — | conf |
GI-Jahrestagung
|
| 2020 | J | jnl |
Datenschutz und Datensicherheit
|
| 2020 | — | conf |
Financial Cryptography Workshops
|
| 2020 | J | jnl |
Datenschutz und Datensicherheit
|
| 2020 | — | conf |
Financial Cryptography Workshops
|
| 2020 | J | jnl |
CoRR
|
| 2019 | — | conf |
HICSS
|
| 2019 | J | jnl |
Dagstuhl Reports
|
| 2019 | — | conf |
INTERACT (1)
|
| 2019 | — | conf |
E-VOTE-ID
|
| 2019 | — | ed. |
E-Vote-ID
|
| 2019 | A* | conf |
CHI
|
| 2019 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2019 | J | jnl |
Datenschutz und Datensicherheit
|
| 2019 | — | conf |
EuroS&P Workshops
|
| 2018 | — | conf |
TrustCom/BigDataSE
|
| 2018 | J | jnl |
Datenschutz und Datensicherheit
|
| 2018 | — | conf |
Sicherheit
|
| 2018 | B | conf |
TrustBus
|
| 2018 | J | jnl |
Datenschutz und Datensicherheit
|
| 2018 | — | ed. |
E-Vote-ID
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | B | conf |
ARES
|
| 2018 | — | conf |
Euro-CYBERSEC
|
| 2018 | Misc | conf |
SAC
|
| 2018 | J | jnl |
J. Inf. Secur. Appl.
|
| 2018 | — | conf |
HAISA
|
| 2018 | J | jnl |
Datenschutz und Datensicherheit
|
| 2018 | A | conf |
ACSAC
|
| 2018 | — | conf |
SOUPS @ USENIX Security Symposium
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | J | jnl |
Dagstuhl Reports
|
| 2018 | A* | conf |
CHI
|
| 2017 | A | conf |
SOUPS
|
| 2017 | — | conf |
STAST
|
| 2017 | — | conf |
TrustCom/BigDataSE/ICESS
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | B | conf |
TrustBus
|
| 2017 | Misc | conf |
SEC
|
| 2017 | — | ed. |
E-VOTE-ID
|
| 2017 | — | ed. |
E-Vote-ID
|
| 2017 | — | conf |
Financial Cryptography Workshops
|
| 2017 | J | jnl |
Datenschutz und Datensicherheit
|
| 2017 | — | conf |
HCI (22)
|
| 2017 | — | conf |
GI-Jahrestagung
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
Inf. Comput. Secur.
|
| 2017 | B | conf |
ARES
|
| 2017 | B | conf |
ARES
|
| 2017 | — | conf |
HCI (22)
|
| 2017 | J | jnl |
J. Inf. Secur. Appl.
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2016 | J | jnl |
Datenschutz und Datensicherheit
|
| 2016 | J | jnl |
Ann. des Télécommunications
|
| 2016 | J | jnl |
Datenschutz und Datensicherheit
|
| 2016 | Misc | conf |
SEC
|
| 2016 | J | jnl |
Datenschutz und Datensicherheit
|
| 2016 | — | conf |
Financial Cryptography Workshops
|
| 2016 | — | conf |
MuC (Workshopband)
|
| 2016 | B | conf |
ARES
|
| 2016 | — | conf |
HAISA
|
| 2016 | — | conf |
GI-Jahrestagung
|
| 2016 | A* | conf |
CCS
|
| 2016 | — | conf |
IMPS@ESSoS
|
| 2016 | — | ed. |
IMPS@ESSoS
|
| 2016 | J | jnl |
Ann. des Télécommunications
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
Inf. Comput. Secur.
|
| 2016 | — | conf |
HAISA
|
| 2016 | Misc | conf |
SEC
|
| 2016 | Misc | conf |
SEC
|
| 2016 | — | conf |
HAISA
|
| 2016 | J | jnl |
Inf. Comput. Secur.
|
| 2016 | A | conf |
EuroS&P
|
| 2015 | — | conf |
STM
|
| 2015 | J | jnl |
Datenschutz und Datensicherheit
|
| 2015 | — | conf |
TRUST
|
| 2015 | B | conf |
ARES
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | — | conf |
WorldCIS
|
| 2015 | — | conf |
VoteID
|
| 2015 | — | conf |
World Conference on Information Security Education
|
| 2015 | A | conf |
ACSAC
|
| 2015 | J | jnl |
Datenschutz und Datensicherheit
|
| 2015 | J | jnl |
SIGCAS Comput. Soc.
|
| 2015 | — | conf |
MuC (Workshopband)
|
| 2014 | — | ed. |
EVOTE
|
| 2014 | B | conf |
ARES
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | Misc | conf |
ICISS
|
| 2014 | — | conf |
CHI Extended Abstracts
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | — | conf |
GI-Jahrestagung
|
| 2014 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 2014 | — | conf |
EVOTE
|
| 2014 | — | conf |
GI-Jahrestagung
|
| 2014 | — | conf |
EGOVIS
|
| 2014 | — | conf |
EVOTE
|
| 2014 | J | jnl |
J. Inf. Secur. Appl.
|
| 2014 | — | conf |
GI-Jahrestagung
|
| 2014 | — | conf |
STM
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | J | jnl |
Datenschutz und Datensicherheit
|
| 2014 | J | jnl |
Comput. und Recht
|
| 2014 | — | conf |
HAISA
|
| 2014 | J | jnl |
Datenschutz und Datensicherheit
|
| 2014 | — | conf |
WOSIS
|
| 2014 | — | conf |
WPES
|
| 2014 | A | conf |
Privacy Enhancing Technologies
|
| 2014 | — | conf |
Sicherheit
|
| 2013 | — | conf |
HCI (27)
|
| 2013 | — | conf |
STAST
|
| 2013 | C | conf |
FedCSIS
|
| 2013 | — | conf |
EISMC
|
| 2013 | — | conf |
TRUST
|
| 2013 | — | conf |
EISMC
|
| 2013 | — | conf |
GI-Jahrestagung
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
Int. J. Inf. Secur. Priv.
|
| 2013 | — | conf |
GI-Jahrestagung
|
| 2013 | — | conf |
Number Theory and Cryptography
|
| 2013 | — | conf |
VoteID
|
| 2013 | — | conf |
ePart
|
| 2013 | B | conf |
ARES
|
| 2013 | — | conf |
GI-Jahrestagung
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
VoteID
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 2013 | — | conf |
VoteID
|
| 2012 | — | ed. |
Electronic Voting
|
| 2012 | — | conf |
SocInfo
|
| 2012 | — | conf |
WWW (Companion Volume)
|
| 2012 | B | conf |
ARES
|
| 2012 | — | conf |
Sicherheit
|
| 2012 | — | conf |
Electronic Voting
|
| 2012 | — | conf |
Electronic Voting
|
| 2012 | — | conf |
Electronic Voting
|
| 2012 | — | conf |
Electronic Voting
|
| 2012 | — | conf |
EuroPKI
|
| 2012 | — | conf |
ICEGOV
|
| 2012 | — | ed. |
TRUST
|
| 2012 | — | conf |
HAISA
|
| 2011 | Misc | conf |
SAC
|
| 2011 | — | conf |
VoteID
|
| 2011 | B | conf |
ARES
|
| 2011 | — | conf |
ICEGOV
|
| 2011 | — | conf |
REVOTE
|
| 2011 | — | conf |
REVOTE
|
| 2011 | — | conf |
VoteID
|
| 2011 | — | conf |
EVT/WOTE
|
| 2011 | — | conf |
STAST
|
| 2011 | — | conf |
REVOTE
|
| 2010 | — | conf |
Electronic Voting
|
| 2010 | B | conf |
ARES
|
| 2010 | — | conf |
Electronic Voting
|
| 2010 | — | ch. |
Data Protection in a Profiled World
|
| 2010 | J | jnl |
it Inf. Technol.
|
| 2010 | — | conf |
Bled eConference
|
| 2010 | — | conf |
Electronic Voting
|
| 2009 | — | conf |
GI Jahrestagung
|
| 2009 | — | conf |
REVOTE
|
| 2009 | — | conf |
VoteID
|
| 2009 | — | conf |
GI Jahrestagung
|
| 2009 | — | book |
|
| 2009 | — | — |
|
| 2009 | — | conf |
REVOTE
|
| 2009 | — | conf |
REVOTE
|
| 2009 | — | conf |
ICEGOV
|
| 2009 | — | conf |
GI Jahrestagung
|
| 2008 | — | conf |
Electronic Voting
|
| 2008 | — | ch. |
Ausgezeichnete Informatikdissertationen
|
| 2008 | — | conf |
GI Jahrestagung (1)
|
| 2007 | — | conf |
VOTE-ID
|
| 2007 | — | ed. |
VOTE-ID
|
| 2007 | B | conf |
ARES
|
| 2007 | — | conf |
VOTE-ID
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2006 | J | jnl |
Inform. Spektrum
|
| 2006 | — | conf |
Sicherheit
|
| 2006 | — | conf |
ECEH
|
| 2006 | — | conf |
SPC
|
| 2006 | — | conf |
Electronic Voting
|
| 2006 | B | conf |
ARES
|
| 2006 | — | conf |
Electronic Voting
|
| 2006 | — | conf |
GI Jahrestagung (1)
|
| 2005 | — | conf |
EGOV (Workshops and Posters)
|
| 2004 | — | conf |
Electronic Voting in Europe
|