Ingo Stengel

According to our database1, Ingo Stengel authored at least 32 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Requirements for Payment Systems in E-Commerce From the Retailers' Perspective.
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020

The Impact of European GDPR on Research.
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020

An Innovative IoT Based Financing Model for SMEs.
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020

Millennial's CSR Perception, Social Influences, and Intention to Buy Social Responsible Products: A Conceptual Framework.
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020

2019
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

The Acceptance and Consulting Quality of Automatic Emergency Call Systems for Cars.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

2018
Teaching agile principles and software engineering concepts through real-life projects.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Enhancing cyber security awareness with mobile games.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Continuous and transparent multimodal authentication: reviewing the state of the art.
Clust. Comput., 2016

A Quorum System for Distributing RFID Tags.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Acceptance Factors of Wearable Computing: An Empirical Investigation.
Proceedings of the Eleventh International Network Conference, 2016

A survey of cyber-security awareness in Saudi Arabia.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A Quorum RFID System Using Threshold Cryptosystem.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

2015
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Impact of External Parameters on the Gait Recognition Using a Smartphone.
Proceedings of the Information Systems Security and Privacy, 2015

The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition.
Proceedings of the ICISSP 2015, 2015

2014
Grammar-based transformations: attack and defence.
Inf. Manag. Comput. Secur., 2014

On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems.
Proceedings of the 2014 Information Security for South Africa, 2014

Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices.
Proceedings of the Computers Helping People with Special Needs, 2014

Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2013
Digital Identity based VoIP Authentication Mechanism.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Co-Processor Aided Attack on Embedded Multi-OS Environments.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013

2011
Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services, 2011

2010
Exploration of Learner Preferences and their Impact Within a Media Module .
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Commoditization as a Criterion for Semantic Service Provisioning.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Towards a New Role Model in Virtual Teams: the Effects of "Elective Leadership".
Proceedings of the Eighth International Network Conference (INC 2010), 2010

2009
Atlantis university: learn your own way.
Int. J. Mob. Learn. Organisation, 2009

2008
Optimisation in Multi-Agent Systems.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2005
Mitigating the mobile agent malicious host problem by using communication patterns.
Inf. Manag. Comput. Security, 2005

1999
Security aspects of an enterprise-wide network architecture.
Internet Res., 1999


  Loading...