Author of the publication

Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads.

, and . ACM Conference on Computer and Communications Security, page 1493-1494. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences Running a Web Anonymising Service., , and . DEXA Workshops, page 482-486. IEEE Computer Society, (2003)Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals.. IDMAN, volume 396 of IFIP Advances in Information and Communication Technology, page 104-106. Springer, (2013)Identitätsdokumente - eIDs und maschinenlesbare Ausweise., and . Datenschutz und Datensicherheit, 30 (9): 560-564 (2006)Marrying Transparency Tools with User-Controlled Identity Management.. FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 199-220. Springer, (2007)Best Practice Solutions.. Privacy and Identity Management for Life, Springer, (2011)Towards Displaying Privacy Information with Icons., , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 338-348. Springer, (2010)Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung., , and . Datenschutz und Datensicherheit, 42 (7): 442-446 (2018)Transparenz der Verwaltung auch beim Einsatz von Algorithmen und Künstlicher Intelligenz.. Datenschutz und Datensicherheit, 42 (12): 733 (2018)Datenschutzaspekte von Identitätsmanagementsystemen - Recht und Praxis in Europa., , , and . Datenschutz und Datensicherheit, (2003)Human-Computer Interaction., , , , , and . Digital Privacy - PRIME, volume 6545 of Lecture Notes in Computer Science, Springer, (2011)