C. Reuter, Konstantin Aal, Frank Beham, Alexander Boden, F. Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, S. Geisler, Klaus Gennen, D. Herrmann, Marcel Kaufhold, Michael Klafft, M. Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, S. Nestler, Volkmar Pipek, Jens Pottebaum, G. Rusch, S. Sackmann, S. Stieglitz, C. Sturm, Melanie Volkamer, Volker Wulf
{"title":"信任体和电脑的未来","authors":"C. Reuter, Konstantin Aal, Frank Beham, Alexander Boden, F. Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, S. Geisler, Klaus Gennen, D. Herrmann, Marcel Kaufhold, Michael Klafft, M. Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, S. Nestler, Volkmar Pipek, Jens Pottebaum, G. Rusch, S. Sackmann, S. Stieglitz, C. Sturm, Melanie Volkamer, Volker Wulf","doi":"10.1007/978-3-658-19523-6_30","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":123646,"journal":{"name":"Sicherheitskritische Mensch-Computer-Interaktion","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion\",\"authors\":\"C. Reuter, Konstantin Aal, Frank Beham, Alexander Boden, F. Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, S. Geisler, Klaus Gennen, D. Herrmann, Marcel Kaufhold, Michael Klafft, M. Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, S. Nestler, Volkmar Pipek, Jens Pottebaum, G. Rusch, S. Sackmann, S. Stieglitz, C. Sturm, Melanie Volkamer, Volker Wulf\",\"doi\":\"10.1007/978-3-658-19523-6_30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":123646,\"journal\":{\"name\":\"Sicherheitskritische Mensch-Computer-Interaktion\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sicherheitskritische Mensch-Computer-Interaktion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/978-3-658-19523-6_30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sicherheitskritische Mensch-Computer-Interaktion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-3-658-19523-6_30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}