Author of the publication

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.

, , , , , , , , , , and . Privacy and Identity Management, volume 526 of IFIP Advances in Information and Communication Technology, page 153-169. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Earning m-oney - a situation based approach for mobile business models., , , , and . ECIS, page 642-656. (2003)IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems., , and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 317-325. Springer, (2011)The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten., , and . New Media & Society, 19 (12): 1983-2002 (2017)Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten., , , , , , , and . Informatik Spektrum, 37 (1): 14-24 (2014)Open Challenges - Towards the (Not So Distant) Future of Identity., and . The Future of Identity in the Information Society, Springer, (2009)Mobility and Identity., , and . The Future of Identity in the Information Society, Springer, (2009)Where Security Research Should Go in the Next Decade.. Secure Data Management, volume 8425 of Lecture Notes in Computer Science, page 28-32. Springer, (2013)Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services., , and . IESS, volume 279 of Lecture Notes in Business Information Processing, page 323-336. (2017)A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication., , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 111-124. Springer, (2012)