Search
    • Deutsch
    • English
  • About bonndoc
  • Guidelines
  • English 
    • Deutsch
    • English
  • Login
Search 
  •   bonndoc Home
  • Fakultäten der Universität Bonn
  • Mathematisch-Naturwissenschaftliche Fakultät
  • Search
  •   bonndoc Home
  • Faculties of University Bonn
  • The Faculty of Mathematics and Natural Sciences
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

The Faculty of Mathematics and Natural Sciences: Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-5 of 5

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

The perception of security in selected contexts 

Busse, Karoline (2021-08-20)
The perception of security has a strong impact on a person's choice of and interaction with security technology, especially within the context of Usable Security and Privacy research. This thesis sheds light on how people ...
Thumbnail

Software Supply Chain Angriffe: Analyse und Erkennung 

Ohm, Marc-Philipp (2021-09-29)
Moderne Softwareentwicklung profitiert in vielen Hinsichten von der ausgiebigen Wiederverwendung externer Softwaremodule. Die Abhängigkeit von externen und somit schwer zu kontrollierenden Softwaremodulen – welche in ihrer ...
Thumbnail

Maßgeschneiderte nutzbarkeitserhaltende Pseudonymisierung: Anforderungen, Beschreibung, Umsetzung 

Kasem-Madani, Raedah Saffija (2023-01-30)
Die Verarbeitung personenbezogener Daten ist omnipräsent. Um die Privatsphäre und die informationelle Selbstbestimmung der Betroffenen zu achten, ist das Ergreifen von Maßnahmen zum Schutze der Vertraulichkeit der Daten ...
Thumbnail

On the Usability of Coverage-Based Fuzzing of C/C++ Programs 

Plöger, Stephan (2024-02-15)
Even though the foundations for fuzzing were laid more than 30 years ago, it did not play a role in industry or academia for a long time. Interestingly, the popularity of fuzzing has risen for top-tier companies and academia ...
Thumbnail

The Never-Ending Story of Authentication: Investigating Password Composition Policies and Second-Factor Recoverability 

Tiefenau, Eva (2025-01-10)
Authentication is an area where users regularly encounter IT security, and it has been studied in the field of usable IT security for at least 25 years. There are numerous proposals and ideas to improve the IT security of ...

Contact | Impressum
Indexed by 
BASE
Theme by 
Atmire NV
 

 

Discover

AuthorBusse, Karoline (1)Kasem-Madani, Raedah Saffija (1)Ohm, Marc-Philipp (1)Plöger, Stephan (1)Tiefenau, Eva (1)Subject
IT-Sicherheit (5)
IT Security (2)Usability (2)Angewandte Kryptographie (1)Angriffserkennungssysteme (1)Applied Cryptography (1)Authentication (1)Authentifizierung (1)Benutzbare IT-Sicherheit (1)Benutzerfreundlichkeit (1)... View MoreClassification (DDC)
004 Informatik (5)
... View MoreResource TypeDissertation oder Habilitation (5)... View MoreDate Issued2021 (2)2023 (1)2024 (1)2025 (1)

Browse

All of bonndocCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsClassification (DDC)Resource TypeOpen Access Fund (University Bonn)This CommunityBy Issue DateAuthorsTitlesSubjectsClassification (DDC)Resource TypeOpen Access Fund (University Bonn)

Contact | Impressum
Indexed by 
BASE
Theme by 
Atmire NV