Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing. | 0 | 0.34 | 2021 |
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. | 0 | 0.34 | 2020 |
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. | 0 | 0.34 | 2020 |
A Two-Pillar Approach To Analyze The Privacy Policies And Resource Access Behaviors Of Mobile Augmented Reality Applications | 0 | 0.34 | 2019 |
Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture | 3 | 0.45 | 2019 |
A Multilateral Privacy Impact Analysis Method For Android Apps | 1 | 0.36 | 2019 |
Engineering privacy by design - lessons from the design and implementation of an identity wallet platform. | 0 | 0.34 | 2019 |
Esara: A Framework For Enterprise Smartphone Apps Risk Assessment | 0 | 0.34 | 2019 |
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping. | 0 | 0.34 | 2018 |
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. | 0 | 0.34 | 2018 |
Easing the Burden of Security Self-Assessments. | 0 | 0.34 | 2018 |
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. | 0 | 0.34 | 2017 |
IT Security Status of German Energy Providers. | 0 | 0.34 | 2017 |
Using Fraud Patterns For Fraud Risk Assessment Of E-Services | 2 | 0.47 | 2017 |
The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten. | 0 | 0.34 | 2017 |
FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps. | 2 | 0.39 | 2017 |
Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services. | 2 | 0.44 | 2017 |
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions. | 0 | 0.34 | 2016 |
On Gender Specific Perception Of Data Sharing In Japan | 0 | 0.34 | 2016 |
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). | 0 | 0.34 | 2016 |
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. | 0 | 0.34 | 2015 |
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns | 1 | 0.36 | 2015 |
Trust Relationships in Privacy-ABCs' Ecosystems. | 2 | 0.53 | 2014 |
Abc4trust: Protecting Privacy In Identity Management By Bringing Privacy-Abcs Into Real-Life | 4 | 0.58 | 2014 |
User Acceptance of Privacy-ABCs: An Exploratory Study | 3 | 0.43 | 2014 |
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. | 3 | 0.56 | 2014 |
Privacy-Respecting School Community Interaction Platform. | 0 | 0.34 | 2014 |
Where Security Research Should Go in the Next Decade. | 0 | 0.34 | 2013 |
Attribute-Based Credentials for Trust (ABC4Trust). | 13 | 0.81 | 2012 |
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication. | 6 | 0.58 | 2012 |
Towards privacy-enhanced mobile communities-Architecture, concepts and user trials | 10 | 0.49 | 2011 |
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). | 6 | 0.49 | 2011 |
Privacy respecting targeted advertising for social networks | 1 | 0.35 | 2011 |
ISO/IEC standardization of identity management and privacy technologies - Making IT Security and Biometrics contribute to better Identity Management and Privacy. | 0 | 0.34 | 2011 |
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. | 0 | 0.34 | 2011 |
Mobile und Ubiquitäre Informationssysteme - Technologien, Anwendungen und Dienste zur Unterstützung von mobiler Kollaboration Proceedings zur 5. Konferenz Mobile und Ubiquitäre Informationssysteme (MMS 2010), 23.-25. Februar 2010 in Göttingen, Germany | 17 | 4.81 | 2010 |
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. | 6 | 0.46 | 2010 |
Enhanced Privacy and Identity Management for Community Services - Demo of the PICOS Project | 0 | 0.34 | 2010 |
User-Centric Identity Management: New Trends in Standardization and Regulation | 9 | 0.67 | 2007 |
Enabling Privacy of Real-Life LBS | 3 | 0.51 | 2007 |
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen | 3 | 0.41 | 2007 |
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings | 28 | 2.43 | 2007 |
Privacy-Friendly LBS: A Prototype-Supported Case Study. | 5 | 0.45 | 2007 |
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden | 45 | 7.78 | 2006 |
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings | 28 | 3.22 | 2006 |
Mobilität, mobile Technologie und Identität - Mobile Identitätsmanagementsysteme. | 0 | 0.34 | 2006 |
Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen | 1 | 0.37 | 2005 |
Vorwort der Herausgeber | 0 | 0.34 | 2005 |
Mobile Brokerage Infrastructures - Capabilities and Security Requirements | 3 | 0.66 | 2005 |
Mobile Business - Processes, Platforms, Payment - Proceedings zur 5. Konferenz Mobile Commerce Technologien und Anwendungen (MCTA 2005), 31.01.-02.02.2005, Universität Augsburg | 11 | 2.01 | 2005 |