Author of the publication

The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things

, , , , , , , , , , , and . Proceedings of the 15ᵗʰ International Joint Conference on e-Business and Telecommunications, volume 2 of SECRYPT '18, page 372–379. Porto, SciTePress, (July 2018)
DOI: 10.5220/0006850305380545

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Protection in the Cloud - The MimoSecco Approach., , and . Trusted Cloud Computing, Springer, (2014)Taxonomy for Mobile Terminals - A Selective Classification Scheme., and . ICE-B, page 255-258. INSTICC Press, (2008)PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services., , , , , and . J. Grid Comput., 15 (2): 219-234 (2017)Security-by-Design in der Cloud-Anwendungsentwicklung., , , and . HMD - Praxis Wirtschaftsinform., 53 (5): 688-697 (2016)The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things, , , , , , , , , and 2 other author(s). Proceedings of the 15ᵗʰ International Joint Conference on e-Business and Telecommunications, volume 2 of SECRYPT '18, page 372–379. Porto, SciTePress, (July 2018)A System for Mobile and Wireless Advertising - Personalized information as incentive for receiving advertisement on mobile terminals., , , and . MOBIS, volume 191 of IFIP, page 287-301. Springer, (2005)Specific Challenges for Small and Medium-Sized Enterprises (SME) in m-Business - a SME-Suitable Framework for Mobile Services., , and . ICE-B, page 169-174. INSTICC Press, (2006)A SME-friendly framework for the provision of mobile services., , and . ICMB, page 9. IEEE Computer Society, (2006)A Distributed Key Management Approach., , , , and . CloudCom, page 509-514. IEEE Computer Society, (2016)Anonymity by Design - Eine Architektur zur Gewährleistung von Kundenschutz im mobilen Marketing., , and . MCTA, volume P-59 of LNI, page 87-100. GI, (2005)