Name
Papers
Collaborators
KAI RANNENBERG
82
135
Citations 
PageRank 
Referers 
548
126.39
1208
Referees 
References 
595
294
Search Limit
1001000
Title
Citations
PageRank
Year
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.00.342021
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.00.342020
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings.00.342020
A Two-Pillar Approach To Analyze The Privacy Policies And Resource Access Behaviors Of Mobile Augmented Reality Applications00.342019
Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture30.452019
A Multilateral Privacy Impact Analysis Method For Android Apps10.362019
Engineering privacy by design - lessons from the design and implementation of an identity wallet platform.00.342019
Esara: A Framework For Enterprise Smartphone Apps Risk Assessment00.342019
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.00.342018
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.00.342018
Easing the Burden of Security Self-Assessments.00.342018
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.00.342017
IT Security Status of German Energy Providers.00.342017
Using Fraud Patterns For Fraud Risk Assessment Of E-Services20.472017
The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten.00.342017
FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps.20.392017
Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services.20.442017
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions.00.342016
On Gender Specific Perception Of Data Sharing In Japan00.342016
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461).00.342016
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.00.342015
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns10.362015
Trust Relationships in Privacy-ABCs' Ecosystems.20.532014
Abc4trust: Protecting Privacy In Identity Management By Bringing Privacy-Abcs Into Real-Life40.582014
User Acceptance of Privacy-ABCs: An Exploratory Study30.432014
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten.30.562014
Privacy-Respecting School Community Interaction Platform.00.342014
Where Security Research Should Go in the Next Decade.00.342013
Attribute-Based Credentials for Trust (ABC4Trust).130.812012
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.60.582012
Towards privacy-enhanced mobile communities-Architecture, concepts and user trials100.492011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).60.492011
Privacy respecting targeted advertising for social networks10.352011
ISO/IEC standardization of identity management and privacy technologies - Making IT Security and Biometrics contribute to better Identity Management and Privacy.00.342011
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.00.342011
Mobile und Ubiquitäre Informationssysteme - Technologien, Anwendungen und Dienste zur Unterstützung von mobiler Kollaboration Proceedings zur 5. Konferenz Mobile und Ubiquitäre Informationssysteme (MMS 2010), 23.-25. Februar 2010 in Göttingen, Germany174.812010
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project.60.462010
Enhanced Privacy and Identity Management for Community Services - Demo of the PICOS Project00.342010
User-Centric Identity Management: New Trends in Standardization and Regulation90.672007
Enabling Privacy of Real-Life LBS30.512007
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen30.412007
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings282.432007
Privacy-Friendly LBS: A Prototype-Supported Case Study.50.452007
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden457.782006
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings283.222006
Mobilität, mobile Technologie und Identität - Mobile Identitätsmanagementsysteme.00.342006
Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen10.372005
Vorwort der Herausgeber00.342005
Mobile Brokerage Infrastructures - Capabilities and Security Requirements30.662005
Mobile Business - Processes, Platforms, Payment - Proceedings zur 5. Konferenz Mobile Commerce Technologien und Anwendungen (MCTA 2005), 31.01.-02.02.2005, Universität Augsburg112.012005
  • 1
  • 2