default search action
Ingo Stengel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [e2]Haithem Afli, Udo Bleimann, Dirk Burkhardt, Robert Loew, Stefanie Regier, Ingo Stengel, Haiying Wang, Huiru Jane Zheng:
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), Belfast, Northern-Ireland, UK, September 10-11, 2020. CEUR Workshop Proceedings 2815, CEUR-WS.org 2021 [contents] - 2020
- [c27]Lisa Zuyeva, Ingo Stengel, Stefanie Regier:
Requirements for Payment Systems in E-Commerce From the Retailers' Perspective. CERC 2020: 349-360 - [c26]Marcel Kehler, Stefanie Regier, Ingo Stengel:
An Innovative IoT Based Financing Model for SMEs. CERC 2020: 361-370 - [c25]En-Chi Chang, Stefanie Regier, Ingo Stengel:
Millennial's CSR Perception, Social Influences, and Intention to Buy Social Responsible Products: A Conceptual Framework. CERC 2020: 427-433 - [c24]Ingo Stengel:
The Impact of European GDPR on Research. CERC 2020
2010 – 2019
- 2019
- [c23]Thomas Rieger, Stefanie Regier, Ingo Stengel, Nathan L. Clarke:
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review. CERC 2019: 69-80 - [c22]Stefanie Regier, Vjollca Sadikaj, Fatbardha Shabani, Ingo Stengel:
The Acceptance and Consulting Quality of Automatic Emergency Call Systems for Cars. CERC 2019: 175-184 - [e1]Udo Bleimann, Dirk Burkhardt, Bernhard Humm, Robert Löw, Stefanie Regier, Ingo Stengel, Paul Walsh:
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), Darmstadt, Germany, March 29-30, 2019. CEUR Workshop Proceedings 2348, CEUR-WS.org 2019 [contents] - 2018
- [c21]Andreas Heberle, Rainer Neumann, Ingo Stengel, Stefanie Regier:
Teaching agile principles and software engineering concepts through real-life projects. EDUCON 2018: 1723-1728 - 2017
- [c20]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
Enhancing cyber security awareness with mobile games. ICITST 2017: 129-134 - [c19]Ayad Al-Adhami, Marcel Ambroze, Ingo Stengel, Martin Tomlinson:
A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function. ICUFN 2017: 165-171 - 2016
- [j5]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. Clust. Comput. 19(1): 455-474 (2016) - [c18]Ayad Al-Adhami, Marcel Ambroze, Ingo Stengel, Martin Tomlinson:
A Quorum RFID System Using Threshold Cryptosystem. FiCloud 2016: 107-113 - [c17]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
A survey of cyber-security awareness in Saudi Arabia. ICITST 2016: 154-158 - [c16]Lena Gribel, Stefanie Regier, Ingo Stengel:
Acceptance Factors of Wearable Computing: An Empirical Investigation. INC 2016: 67-72 - [c15]Ayad Al-Adhami, Marcel Ambroze, Ingo Stengel, Martin Tomlinson:
A Quorum System for Distributing RFID Tags. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 510-517 - 2015
- [c14]Josselyn Le Moing, Ingo Stengel:
Impact of External Parameters on the Gait Recognition Using a Smartphone. ICISSP (Revised Selected Papers) 2015: 219-233 - [c13]Josselyn Le Moing, Ingo Stengel:
The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition. ICISSP 2015: 322-328 - [c12]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes. TrustBus 2015: 153-168 - 2014
- [j4]Dusan Repel, Ingo Stengel:
Grammar-based transformations: attack and defence. Inf. Manag. Comput. Secur. 22(2): 141-154 (2014) - [c11]Pierre Schnarz, Joachim Wietzke, Ingo Stengel:
Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection. CS2@HiPEAC 2014: 25-30 - [c10]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices. ICCHP (1) 2014: 383-390 - [c9]Pierre Schnarz, Clemens Fischer, Joachim Wietzke, Ingo Stengel:
On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems. ISSA 2014: 1-8 - 2013
- [c8]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices. HCI (8) 2013: 311-320 - [c7]Pierre Schnarz, Joachim Wietzke, Ingo Stengel:
Co-Processor Aided Attack on Embedded Multi-OS Environments. ICITCS 2013: 1-4 - [c6]Andreas Plies, Michael Massoth, Ingo Stengel:
Digital Identity based VoIP Authentication Mechanism. MoMM 2013: 239 - 2011
- [c5]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View. HCI (8) 2011: 129-135 - 2010
- [c4]Ingo Stengel, Oliver Schneider, Udo Bleimann:
Exploration of Learner Preferences and their Impact Within a Media Module . INC 2010: 279-288 - [c3]Normen Haas, Bernhard Humm, Ingo Stengel, Paul Walsh:
Commoditization as a Criterion for Semantic Service Provisioning. INC 2010: 325-334 - [c2]Ralf Friedrich, Udo Bleimann, Ingo Stengel, Paul Walsh:
Towards a New Role Model in Virtual Teams: the Effects of "Elective Leadership". INC 2010: 371-374
2000 – 2009
- 2009
- [j3]Oliver Schneider, Udo Bleimann, Ingo Stengel:
Atlantis university: learn your own way. Int. J. Mob. Learn. Organisation 3(2): 184-201 (2009) - 2008
- [c1]Ingo Stengel, Udo Bleimann, Jeanne Stynes:
Optimisation in Multi-Agent Systems. INC 2008: 271-280 - 2005
- [j2]Ingo Stengel, Klaus Peter Fischer, Udo Bleimann, Jeanne Stynes:
Mitigating the mobile agent malicious host problem by using communication patterns. Inf. Manag. Comput. Security 13(3): 203-211 (2005)
1990 – 1999
- 1999
- [j1]Robert Loew, Ingo Stengel, Udo Bleimann, Aidan McDonald:
Security aspects of an enterprise-wide network architecture. Internet Res. 9(1): 8-15 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint