Author of the publication

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.

, , , , , , , , , , and . Privacy and Identity Management, volume 526 of IFIP Advances in Information and Communication Technology, page 153-169. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences from Educating Practitioners in Vulnerability Analysis., , , and . World Conference on Information Security Education, volume 237 of IFIP, page 73-80. Springer, (2007)Privacy for Peer Profiling in Collective Adaptive Systems., , , , , , and . Privacy and Identity Management, volume 457 of IFIP Advances in Information and Communication Technology, page 237-252. Springer, (2014)Surveillance and Privacy., and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 175-177. Springer, (2010)HCI for Policy Display and Administration., , , and . Privacy and Identity Management for Life, Springer, (2011)The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials., and . Privacy and Identity Management for Life, Springer, (2011)Möglichkeiten und Grenzen von Kriterienkatalogen., and . Wirtschaftsinformatik, 34 (4): 391-400 (1992)Usable Security und Privacy., , and . Datenschutz und Datensicherheit, 34 (11): 773-782 (2010)Privacy and identity management for everyone., , , , , , , , and . Digital Identity Management, page 20-27. ACM, (2005)Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Accountability for cloud and other future Internet services., , , , , , , , , and 3 other author(s). CloudCom, page 629-632. IEEE Computer Society, (2012)