Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ernst
    Last name: Bekkering
    DBLP: 89/3722
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 8 of 8  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Chunxue Wu, Wenliang Wu, Caihua Wan, Ernst Bekkering, Naixue Xiong.
    Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.
    Sensors 2017, Volume 17 (0) 2017
    Journal article
    Michael Brian Pope, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt.
    Digital Steganography - An Introduction to Techniques and Tools.
    CAIS 2012, Volume 30 (0) 2012
    Journal article
    Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt.
    An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
    IRMJ 2009, Volume 22 (0) 2009
    Conference paper
    Merrill Warkentin, Robert S. Moore, Ernst Bekkering, Allen C. Johnston.
    Analysis of systems development project risks: an integrative framework.
    DATA BASE 2009, Volume 40 (0) 2009
    Journal article
    Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt.
    Steganography: Forensic, Security, and Legal Issues.
    JDFSL 2008, Volume 3 (0) 2008
    Conference paper
    Merrill Warkentin, Ernst Bekkering, Allen C. Johnston, Robert S. Moore.
    Risk Perspectives in Systems Development.
    Reaching New Heights. 13th Americas Conference on Information Systems, AMCIS 2007, Keystone, Colorado, USA, August 9-12, 2007 2007 (0) 2007
    Conference paper
    Ernst Bekkering, J. P. Shim.
    Trust in videoconferencing.
    Commun. ACM 2006, Volume 49 (0) 2006
    Journal article
    Merrill Warkentin, Kimberly Davis, Ernst Bekkering.
    Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.
    JOEUC 2004, Volume 16 (0) 2004
    Show item 1 to 8 of 8  

    Your query returned 8 matches in the database.