-
Veseli, F., Serna-Olvera, J., Pulls, T. and Rannenberg, K. 2019. "Engineering Privacy by Design – Lessons from the Design and Implementation of an Identity Wallet Platform", The 34th ACM/SIGAPP Symposium on Applied Computing (SAC ’19) , pp. 9, DOI:https://doi.org/10.1145/3297280.3297429, ACM.
-
Harborth, D., Hatamian, M., Tesfay, W., Rannenberg, K.. 2019. "A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications", Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
-
David Harborth and Sebastian Pape. 2019. "How Privacy Concerns and Trust and Risk Beliefs Influence Users’ Intentions to Use Privacy-Enhancing Technologies - The Case of Tor", Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
-
David Harborth. 2019. "Unfolding Concerns about Augmented Reality Technologies: A Qualitative Analysis of User Perceptions", Accepted for: International Conference on Wirtschaftsinformatik (WI 2019), Siegen, Germany.
-
Harborth, D., Braun, M., Grosz, A., Pape, S., & Rannenberg, K.. 2018. "Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext", Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 13-26, Gesellschaft für Informatik e.V., Konstanz.
-
Sebastian Pape, Daniel Tasche Iulia Bastys, Akos Grosz, Joerg Laessig, Kai Rannenberg. 2018. "Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping", To appear In: Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik e.V..
-
Dennis-Kenji Kipker, Sebastian Pape, Kristian Beckers. 2018. "Juristische Bewertung eines Social-Engineering-Abwehr Trainings", To appear In: ITS|Kritis Rahmenwerk.
-
Schmitz, Christopher; Sekulla, André; Pape, Sebastian; Pipek, Volkmar; Rannenberg Kai. 2018. "Easing the Burden of Security Self-Assessments", In: Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018) , Dundee, Scotland.
-
David Harborth and Sebastian Pape. 2018. "JonDonym Users’ Information Privacy Concerns", 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection.
-
Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna. 2018. "PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation", IWSPA @ CODASPY , ACM.
-
Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna. 2018. "I Read but Don’t Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR", Proceedings of WWW '18 Companion of the The Web Conference 2018 on The Web Conference 2018, ACM.
-
Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter and Sebastian Pape . 2018. "Assessing Privacy Policies of Internet of Things Services", 33rd International Conference on ICT Systems Security and Privacy Protection -- IFIP SEC 2018, Springer.
-
David Harborth and Sebastian Pape. 2018. "Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust", Twenty-fourth Americas Conference on Information Systems, New Orleans, 2018.
-
-
Vanessa Kohn and David Harborth. 2018. "Augmented Reality – A Game Changing Technology For Manufacturing Processes?", Twenty-Sixth European Conference on Information Systems (ECIS2018), Portsmouth, UK.
-
-
-
-
-
Nakamura, T., Kiyomoto, S., Tesfay, W., Serna, J.. 2017. "Easing the burden of setting privacy preferences: a machine learning approach", In:
Communications in Computer and Information Science ,
https://www.m-chair.de/images/documents/publications/Rannenberg/CCIS2016.pdf, Springer.
-
Ahmed Seid Yesuf. 2017. "A Review of Risk Identification Approaches in the Telecommunication Domain", International Conference on Information Systems Security and Privacy.
-
-
-
Kristian Beckers, Veronika Fries, Eduard C. Groen, Sebastian Pape. 2017. "Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment",
In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017),
http://ceur-ws.org/Vol-1796/creare-paper-1.pdf.
-
-
-
David Harborth and Sebastian Pape. 2017. "Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go",
2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 155-168, DOI:10.1109/ISMAR.2017.32,
http://ieeexplore.ieee.org/document/8115414/.
-
Jose Maria de Fuentes, Lorena González-Manzano, Jetzabel Serna-Olvera, Fatbardh Veseli. 2017. "Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities",
Personal Ubiquitous Computing, (21:5), pp. 869–891, DOI:https://doi.org/10.1007/s00779-017-1057-6,
https://link.springer.com/article/10.1007%2Fs00779-017-1057-6, Springer.
-
M. Hatamian, J. Serna, K. Rannenberg, and B. Igler. 2017. "FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps",
14th International Conference on Trust and Privacy in Digital Business (TrustBus 2017), pp. 3-18, DOI:https://doi.org/10.1007/978-3-319-64483-7_1,
https://www.m-chair.de/images/documents/publications/Hatamian/2017_Hatamian_TrustBus.pdf, Springer, Lyon, France.
-
-
David Harborth and Sebastian Pape. 2017. "Privacy Concerns and Behavior of Pokémon Go Players in Germany", Proceedings of IFIP Summer School on Privacy and Identity Management – the Smart World Revolution 2017 (IFIPSC2017).
-
Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael B. Tesfay, Andrea Migliavacca, and Felix Hörandner. 2017. "Towards the Adoption of Secure Cloud Identity Services", Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), ACM.
-
-
-
Michael Sailer, Carina Hoppenz, Kristian Beckers, Sebastian Pape. 2017. "Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie",
In Tagung der Sektion "Empirische Bildungsforschung" -- Educational Research and Governance (AEPF 2017),
http://www.smjp.org/files/publications/SHBP17aepf.
-
-
-
David Harborth, Sebastian Pape. 2017. "Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract)", To appear In: Preproceedings of IFIP Summer School on Privacy and Identity Management ? the Smart World Revolution 2017 (IFIPSC2017).
-
Dax, Julian; Hamburg, Daniel; Kreusch, Michael; Ley, Benedikt; Pape, Sebastian; Pipek, Volker; Rannenberg, Kai; Schmitz, Christopher; Terhaag, Frank. 2016. "Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger", Multikonferenz Wirtschaftsinformatik (MKWI 2016), Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), Ilmenau, Germany.
-
-
-
Dax, Julian; Ley, Benedikt; Pape, Sebastian; Schmitz, Christopher; Pipek, Volkmar; Rannenberg, Kai. 2016. "Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions", In: Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany.
-
Shuzhe Yang. 2016. "Understanding the Pain: Examining Individuals’ Online Reputation Management Behaviour and its Obstacles – A Grounded Theory", The 49th Hawaii International Conference on System Sciences (HICSS 2016).
-
Shuzhe Yang, Anabel Quan-Haase. 2016. "People’s sentiment with regard to the right to be forgotten", Social Media and Society.
-
A. Naghizadeh, B. Razeghi, E. Meamari, M. Hatamian, R. Ebrahimi Atani. 2016. "C-Trust: A Trust Management System to Improve Fairness on Circular P2P Networks", Peer-to-Peer Networking and Applications, (9:6), pp. 1128-1144, Springer.
-
M. Hatamian, H. Barati, A. Movaghar, A. Naghizadeh. 2016. "CGC: Centralized Genetic-Based Clustering Protocol for Wireless Sensor Networks using Onion Approach", Telecommunications Systems, (62:4), pp. 657-674, Springer.
-
M. Hatamian, M. Almasi Bardmily, M. Asadboland, M. Hatamian, H. Barati. 2016. "Congestion- Aware Routing and Fuzzy-based Rate Controller for Wireless Sensor Networks", Radioengineering Journal, (25:1), pp. 114-123.
-
Welderufael B. Tesfay, Jetzabel Serna-Olvera. 2016. "Towards User-centered Privacy Risk Detection and Quantification Framework", 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE.
-
Welderufael B. Tesfay, Jetzabel Serna-Olvera. 2016. "Towards User-centered Privacy Risk Detection and Quantification Framework", 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE.
-
Welderufael B. Tesfay, Jetzabel Serna, Sebastian Pape. 2016. "Challenges in Detecting Privacy Revealing Information in Unstructured Text", Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2016) at the International Semantic Web Conference (ISWC) 2016, CEUR-WS.
-
-
S. Berenjian, M. Shajari, N. Farshid, M. Hatamian. 2016. " Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment", IEEE 8th International Conference on Intelligent Systems (IS'16), DOI:10.1109/IS.2016.7737389, IEEE.
-
Iulia Bastys (Boloșteanu), Deepak Garg. 2016. "Asymmetric Secure Multi-Execution with Declassification", Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 24-45.
-
Fatbardh Veseli, Jetzabel Serna. 2016. "Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency", In:
Trust Management X, IFIPTM 2016, ISBN: 978-3-319-41354-9, pp. 63-78, DOI:10.1007/978-3-319-41354-9_5,
https://link.springer.com/chapter/10.1007/978-3-319-41354-9_5, Springer.
-
-
Peter Schaab, Kristian Beckers, Sebastian Pape. 2016. "A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology", In: Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), ISBN: 9781841024134, pp. 241-251.
-
-
Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo. 2016. "Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers", In:
APF 2015: Privacy Technologies and Policy, ISBN: 978-3-319-31456-3, pp. 104-123, DOI:10.1007/978-3-319-31456-3_6,
https://link.springer.com/chapter/10.1007%2F978-3-319-31456-3_6, Springer, Cham.
-
Tschersich, Markus. 2015. "Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options (2015).".
-
Tschersich, Markus; Niekamp, Michael. 2015. "Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites (2015).".
-
Chehrazi, Golriz; Schmitz, Christopher; Hinz, Oliver. 2015. "QUANTSEC - Ein Modell zur Nutzenquantifizierung von IT-Sicherheitsmaßnahmen", In: Proceedings of the 12th International Conference on Wirtschaftsinformatik (WI 2015), Eds. Oliver Thomas; Frank Teuteberg, Osnabrück, Germany.
-
Heim, Stephan; Yang, Shuzhe. 2015. "Content Attractiveness in Enterprise Social Networks", Proceedings of the 2nd European Conference on Social Media (ECSM).
-
Bal, Gökhan; Rannenberg, K., and Hong, J. I. 2015. "Styx: Privacy Risk Communication for the Android Smartphone Platform Based on Apps’ Data-Access Behavior Patterns,", Computers & Security (in press).
-
Ahmad Sabouri. 2015. "Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers", The 14th IFIP Conference on e-Business, e-Services and e-Society (I3E 2015).
-
Ahmad Sabouri. 2015. "A Cloud-based Model to Facilitate Mobility of Privacy-preserving Attribute-based Credential Users", The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications,.
-
Pape S., Serna-Olvera J., Tesfay W.. 2015. "Why open data may threaten your privacy", Workshop on Privacy and Inference (Prinf15) co-located with KI 2015 - The 38th German Conference on Artificial Intelligence, Dresden, September 21-25, 2015.
-
Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J. 2015. "STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper", In: ICSE '16: 38th International Conference on Software Engineering Companion.
-
Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.. 2015. "On Gender Specific Perception of Data Sharing in Japan", In: ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016.
-
Shuzhe Yang. 2015. "Understanding Personal Online Reputation Management: A Grounded Theory Study", In: Proceedings of the 19th Pacific Asia Conference on Information Systems (PACIS 2015).
-
Shuzhe Yang. 2015. "Why Are People So Naïve? Long-term Motivation in Online Reputation Management: A Grounded Theory Study", Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015).
-
A. Naghizadeh, B. Razeghi, I. Radmanesh, M. Hatamian, R. Ebrahimi Atani, and Z. Nadem Norudi. 2015. "Counter Attack to Free-Riders: Filling A Security Hole in Bittorrent Protocol", 12th IEEE International Conference on Networking, Sensing and Control (ICNSC'2015), Taiwan.
-
P. T. Heravi, D. M. Souran, S. Tavakkoli, M. Hatamian, A. Mehrabian, and V. E. Balas. 2015. "Classification of the Liver Disorders Data Using Multi-Layer Adaptive Neuro-Fuzzy Inference System", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), USA.
-
B. Razeghi, M. Hatamian, A. Naghizadeh, S. Sabeti, and G. A. Hodtani. 2015. "A Novel Relay Selection Scheme for Multi-user Cooperation Communications Using Fuzzy Logic", 12th IEEE International Conference on Networking, Sensing and Control (ICNSC'2015), Taiwan.
-
M. Hatamian, H. Barati. 2015. "Priority-based Congestion Control Mechanism for Wireless Sensor Networks using Fuzzy Logic", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), DOI:10.1109/ICC- CNT.2015.7395203, USA.
-
M. Hatamian, S. S. Ahmadpoor, S. Berenjian, B. Razeghi, and H. Barati. 2015. "A Centralized Evolutionary Clustering Protocol for Wireless Sensor Networks", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), DOI:10.1109/ICCCNT.2015.7395190, USA.
-
M. Hatamian, H. Barati, S. Berenjian, A. Naghizadeh, and B. Razeghi. 2015. "Error Control Coding in Optical Fiber Communication Systems: An Overview", Advances in Computer Science : an International Journal, (4:14), pp. 70-80.
-
M. Hatamian, H. Barati, and A. Movaghar. 2015. "A New Greedy Geographical Routing in Wireless Sensor Networks", Journal of Advances in Computer Research, (6:1), pp. 1-7.
-
Fatbardh Veseli, Jetzabel Serna-Olvera. 2015. "Benchmarking Privacy-ABC Technologies - An Evaluation of Storage and Communication Efficiency", DOI:10.1109/SERVICES.2015.37,
http://ieeexplore.ieee.org/document/7196525/, IEEE.
-
-
-
-
-
Bal, Gökhan. 2014. "Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps", GA, USA.
-
Bal, Gökhan. 2014. "Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk", Auckland, New Zealand.
-
Pape, Sebastian. 2014. "Sample or Random Security – A Security Model for Segment-Based Visual Encryption", In: Financial Cryptography and Data Security .
-
Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg. 2014. "Trust Relationships in Privacy-ABCs’ Ecosystems", The 11th International Conference on Trust, Privacy & Security in Digital Business.
-
Ahmad Sabouri, Kai Rannenberg. 2014. "ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life - Keynote Paper", The 9th International IFIP Summer School on Privacy and Identity Management for the Future Internet.
-
Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg. 2014. "Privacy-Respecting School Community Interaction Platform", The 3rd Cyber Security and Privacy EU Forum,.
-
Ahmad Sabouri, Ronny Bjones. 2014. "Privacy-ABCs to Leverage Identity Management as a Service", The 2nd EU Annual Privacy Forum.
-
Ahmad Sabouri, Jonas Lindstrøm Jensen, Kasper Lyneborg Damgård, Janus Dam Nielsen, Kai Rannenberg. 2014. "Integrating and trialling Attribute-based Credentials on Smartcards for building Trust - The ABC4Trust project - Keynote Paper", Smartcard Workshop 2014.
-
D. Souran, M. Mir, A. Mehrabian, B. Razeghi, M. Hatamian, S. Sina Sebtahmadi. 2014. "A Performance Comparison of Classical PID Type-1 and Type-2 Fuzzy Controller in a Three Tank Level Control System", IEEE International Symposium on Robotics and Manufacturing Automation, Malaysia.
-
Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti. 2014. "Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten", DOI:10.1007/s00287-013-0748-2,
https://www.springerprofessional.de/technische-sicherheit-und-informationssicherheit/5200350, Springer-Verlag Berlin Heidelberg.
-
-
Yang, Shuzhe; Albers, Andreas . 2013. "Overcoming Information Overload in Online Reputation Management: A Systematic Literature Review.", Amsterdam, Netherlands.
-
Tschersich, Markus; Botha, Reinhardt . 2013. "Understanding the Impact of Default Privacy Settings on Self-Disclosure in Social Networking Services: Building a Conceptual Model and measurement instrument.", Chicago, USA.
-
Schreiber, Tobias; Deuker, André; Albers, Andreas; Neves, Mickel . 2013. "The Privacy Trade-Off: App Usage on OSN", Chicago, USA.
-
Leontaridis, Lefteris; Andersson, Thomas; Leitold, Herbert; Zwattendorfer, Bernd; Yang, Shuzhe; Lindholm, Pasi . 2013. "The INDI Ecosystem of privacy-aware", pp. 45-57, Wiesbaden, Germany.
-
Krontiris, Ioannis; Dimitriou, Tassos . 2013. "Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications", Cambridge, Massachusetts.
-
Kahl, Christian; Albers, Andreas . 2013. "How to unleash the Virus".
-
Fischer-Hübner, Simone; Krontiris, Ioannis, Rannenberg, Kai; Waidner, Michael; Bowden, Caspar . 2013. "Online Privacy: Towards Informational Self-Determination on the Internet", In: Digital Enlightenment Yearbook, Eds. .
-
Benenson, Zinaida; Krontiris, Ioannis; Rannenberg, Kai; Schröder, Dominik; Schopf, Alexander; Stamatiou, Yannis; Liagkou, Vasiliki. 2013. "Understanding and Using Anonymous Credentials, poster at the 9th Symposium On Usable Privacy and Security (SOUPS 2013)", Newcastle, United Kingdom.
-
Benenson, Zinaida; Girard, Anna; Krontiris, Ioannis; Liagkou, Vasiliki; Rannenberg, Kai; Stamatiou, Yannis . 2013. "User Acceptance of Privacy-ABCs: An Exploratory Study", Heraklion, Greece.
-
Albers, Andreas; Krontiris Ioannis; Sonehara, Noboru; Echizen, Isao . 2013. "Coupons as Monetary Incentives in Mobile Participatory Sensing", Athens, Greece.
-
Acquisti, Alessandro; Krontiris, Ioannis; Langheinrich, Marc; Sasse, Angela. 2013. "My Life, Shared - Trust and Privacy in the Age of Ubiquitous Experience Sharing".
-
Bleikertz, Sören; Mastelic, Toni; Pape, Sebastian; Pieters, Wolter; Dimkov, Trajce. 2013. "Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers", In: Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pp. 78-87.
-
Samuel Idowu, Desta Haileselassie Hagos, Welderufael B Tesfay, Abiola Famurewa, Juel Rana, Kare Synnes. 2013. "NexTrend: Context-aware music-relay corridors using NFC tags", Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 .
-
Samuel Idowu, Desta Haileselassie Hagos, Welderufael B Tesfay, Abiola Famurewa, Juel Rana, Kare Synnes. 2013. "Welderufael Berhane Tesfay Welderufael Berhane Tesfay NexTrend: Context-aware music-relay corridors using NFC tags", Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013, IEEE.
-
Welderufael B Tesfay, Markus Aleksy, Karl Andersson, Marko Lehtola. 2013. "Mobile computing application for industrial field service engineering: A case for ABB service engineers", Local Computer Networks Workshops (LCN Workshops), IEEE.
-
Yang, Shuzhe; Bal, Gökhan . 2012. "Balancing Security and Usability of Local Security Mechanisms for Mobile Devices", Crete, Greece.
-
Sabouri, Ahmad; Krontiris, Ioannis; Rannenberg, Kai. 2012. "Attribute-based Credentials for Trust (ABC4Trust)", Austria.
-
Luna, Jesus; Suri,Neeraj; Krontiris, Ioannis. 2012. "Privacy-by-Design Based on Quantitative Threat Modeling", Cork, Ireland.
-
Kahl, Christian . 2012. "Create Attention to Attract Attention".
-
Krontiris, Ioannis; Albers, Andreas . 2012. "Monetary Incentives in Participatory Sensing using Multi-Attributive Auctions", International Journal of Parallel, Emergent and Distributed Systems.
-
Gürses Seda; Krontiris, Ioannis; Sabouri, Ahmad; Pashalidis, Andreas; Yang, Shuzhe; Zwattendorfer, Bernd. 2012. "A Privacy Policy Framework for the INDI ecosystem", GINI.
-
Dimitriou, Tassos; Krontiris, Ioannis; Sabouri, Ahmad. 2012. "PEPPeR: A querier's Privacy Enhancing Protocol for PaRticipatory sensing", Frankfurt, Germany.
-
Deuker, André; Rosenkranz, Christoph; Albers, Andreas . 2012. "The usage of individual privacy settings on social networking sites - Drawing desired digital images of oneself", Barcelona, Spain.
-
Deuker, André . 2012. "Friend-to-Friend Privacy Protection on Social Networking Sites: A Grounded Theory Study", Washington, USA.
-
Deuker, André; Albers, Andreas . 2012. "Who Cares - Content Sharing on Social Networking Sites", Ho Chi Minh City, Vietnam.
-
Camenisch, Jan; Krontiris, Ioannis; Lehmann, Anaj; Neven, Gregory; Paquin, Christian; Rannenberg, Kai; Zwingelberg, Harald. 2012. "ABC4Trust Architecture for Developers", ABC4Trust.
-
Bal, Gökhan . 2012. "Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications", San Francisco, USA.
-
Bjones, Ronny; Krontiris, Ioannis; Paillier, Pascal; Rannenberg, Kai. 2012. "Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication", Limassol, Cyprus.
-
Pape, Sebastian; Schöch, Christof; Wegner, Lutz. 2012. "TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions",
Journal of the Text Encoding Initiative, (2:), pp. 1-16,
http://jtei.revues.org/432.
-
Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri. 2012. "PEPPeR: A querier's Privacy Enhancing Protocol for PaRticipatory sensing", The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems.
-
Welderufael Berhane Tesfay, Todd Booth, Karl Andersson. 2012. "Reputation based security model for android applications", IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE.
-
Tschersich, Markus . 2011. "Design Guidelines for Mobile Group Recommender Systems to handle inaccurate or missing Location Data.".
-
Tschersich, Markus; Kahl, Christian; Heim, Stephan; Crane, Stephen; Böttcher, Katja; Krontiris, Ioannis; Rannenberg, Kai. 2011. "Towards Privacy-enhanced Mobile Communities - Architecture",
Journal of Systems and Software, Special Issue: Mobile Applications,
http://dx.doi.org/10.1016/j.jss.2011.06.048, Elsevier.
-
Krontiris, Ioannis; Leitold, Herbert; Posch, Reinhard; Rannenberg, Kai. 2011. "eID Interoperability", Publicis Publishing, Erlangen, Germany.
-
Krontiris, Ioannis; Maisonneuve, Nicolas. 2011. "Participatory Sensing: The Tension between Social Translucence and Privacy", In: Trustworty Internet, Eds. .
-
Krontiris, Ioannis; Dimitriou, Tassos . 2011. "Scatter - Secure Code Authentication for Efficient Reprogramming in Wireless Sensor Networks", International Journal of Sensor Networks, (10:2), pp. p.14-24.
-
Koschinat, Sascha; Bal, Gökhan; Weber, Christian; Rannenberg, Kai . 2011. "Privacy by Sustainable Identity Management Enablers.", In: Privacy and Identity Management for Life, ISBN: 978-3-642-20317-6, pp. 431- 452, Springer, Heidelberg, Germany.
-
Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai . 2011. "Profit vs. Privacy - Advanced Targeted Advertising for Social Networks.".
-
Fritz, Marcel; Schlereth, Christian; Figge, Stefan . 2011. "Empirische Evaluation von Fair-Use Flatrate-Strategien für das mobile Internet".
-
Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai . 2011. "Privacy respecting targeted advertising for social networks", Heraklion, Greece.
-
Fritz, Marcel; Schlereth, Christian; Figge, Stefan . 2011. "Empirical evaluation of fair-use flat rate strategies for mobile Internet".
-
Fischer-Hübner, Simone; Hoofnagle, C,; Krontiris, Ioannis; Rannenberg, Kai; Waidner, Michael. 2011. "Empirical evaluation of fair-use flat rate strategies for mobile Internet, Business & Information Systems Engineering".
-
Camenisch, Jan; Krontiris, Ioannis; Lehmann, Anja; Neven, Gregory; Paquin, Christian; Rannenberg, Kai; Zwingelberg, Harald. 2011. "D2.1 Architecture for Attribute-based Credential Technologies – Version 1".
-
Albers, Andreas . 2011. "Auswirkungen der Verfügbarkeit von Kontextinformationen über mobile Nutzer auf die Vermarktung mobiler Werbeträgerleistung", Zurich, Swiss.
-
Heim, Stephan; Böttcher, Katja, Rannenberg, Kai. 2011. "Social Networks und Netzwerkmanagement – Kann man aus der Datenschutzdiskussion zu Social Networks für das Netzwerkmanagement lernen?", Proceedings der Konferenz interPM in Glashütten 2011, In: Neu denken: vom Projekt- zum Netzwerkmanagement, Eds. Martin Engstler; Reinhard Wagner , pp. 11-24, dPunkt Verlag, Heidelberg, 2011.
-
Tassos Dimitriou, Ahmad Sabouri. 2011. "Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks", The 10th IEEE International Conference on Trust, Security and Privacy in Com- puting and Communications (IEEE TrustCom’11).
-
Ahmad Sabouri, Nikos Komninos, Christos Douligeris. 2011. "User Dependent Cryptography for Security in Fu- ture Mobile Telecommunication Systems", The 8th International Conference on Telecommunications (ICT 2011).
-
Tassos Dimitriou, Ahmad Sabouri. 2011. "Privacy Preservation Schemes for Querying Wireless Sensor Networks", The 7th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS ’11).
-
-
Royer, Denis . 2010. "Development of a theoretical Model for Explaining and Predicting the Impacts of Enterprise Identity Management Introductions", Pretoria, South Africa.
-
Rannenberg, Kai; Kahl, Christian; Böttcher, Katja . 2010. "Communities, Mobilität und Datenschutz. Innovative Konzepte zum Schutz der Privatsphäre im Projekt PICOS",
Forschung Frankfurt, (2010:1), ISBN: 0175-0992,
http://www.muk.uni-frankfurt.de/FFFM/dok/2010/08Datenschutz.pdf, Frankfurt, Germany.
-
Krontiris, Ioannis; Freiling, Felix; Dimitriou, Tassos . 2010. "Location Privacy in Urban Sensing Networks: Research Challenges and Directions", IEEE Wireless Communications Magazine, (17:5), pp. p30-35.
-
Krontiris, Ioannis; Freiling, Felix . 2010. "Urban Sensing through Social Networks: The Tension between Participation and Privacy", Island of Ponza, Italy.
-
Krontiris, Ioannis; Freiling, Felix . 2010. "Integrating People-centric Sensing with Social Networks: A privacy Research Agenda", Mannheim, Germany.
-
-
Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai . 2010. "Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project", ISBN: 978-3-642-17693-7, Springer, Ghent, Belgium.
-
Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai . 2010. "How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project", ISBN: 978-3642152566,
http://www.springer.com/computer/communication+networks/book/978-3-642-15256-6, Springer, Brisbane, Australia.
-
Kahl, Christian; Albers, Andreas . 2010. "Towards reasonable Revenue Streams through Marketing in Mobile Social Networks", Göttingen, Germany.
-
Giannetsos, Thanassis; Krontiris, Ioannis; Dimitriou, Tassos; Prasad, N.R. . 2010. "Arbitrary Code Injection through Self-propagating Worms", In: Architecture Devices, Eds. .
-
Deuker, André . 2010. "Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services", In: Privacy and Identity Management for Life, Eds. .
-
-
Seyyed Ehsan Mahmoudi, Alireza Akhondi-Asl, Roohollah Rahmani, Shahrooz Faghih-Roohi, Vahid Taimouri, Ahmad Sabouri, Hamid Soltanian-Zade. 2010. " Web-based interactive 2D/3D medical image processing and visualization software", Journal of Computer Methods and Programs in Biomedicine,.
-
Ahmad Sabouri, Adel Ardalan, Reza Shahidi-Nejad. 2010. "Classification of Protein Secondary Structure Based on NMR Chemical Shift Data Using Support Vector Machines", The 12th International Conference on Computer Modelling and Simulation (UKSim 2010).
-
Weiss, Stefan . 2009. "Privacy Threat Model for Data Portability in Social Network Applications".
-
Scherner, Tobias; Muntermann, Jan; Roßnagel, Heiko . 2009. "Integrating Value-Adding Services into an Emergency Management System for Tourist Destinations", Verona, Italy.
-
Royer, Denis; Rannenberg, Kai . 2009. "Open Challenges – Towards the (Not So Distant) Future of Identity", In:
The Future of Identity - Challenges and Opportunities, ISBN: 978-3-540-88480-4,
http://www.springer.com/978-3-540-88480-4, Springer, Heidelberg, Germany.
-
Royer, Denis; Deuker, André; Rannenberg, Kai . 2009. "Mobility and Identity", ISBN: 3-540-88480-07, Springer, Heidelberg, Germany.
-
Royer, Denis; Meints, Martin . 2009. "Enterprise Identity Management - Towards a Decision Support Framework based on the Balanced Scorecard Approach", Business & Information Systems Engineering, (1:3), ISBN: 1867-0202, pp. 245-253..
-
Krontiris, Ioannis . 2009. "Sensor Networks Security for Pervasive Healthcare", In: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, Eds. , ISBN: 978-1615207657.
-
Hegen, Marvin . 2009. "Good bye Medienbruch – Wie Mobile Tagging die Welt verknüpft und das Handy zum Barcodescanner wird", Wirtschaftsinformatik und Management, (2009:4).
-
Franz, Elke; Liesebach Katja . 2009. "Supporting Local Aliases as Usable Presentation of Secure Pseudonyms", Linz, Austria.
-
Crespo, Alberto; Mendez, Rubén; Liesebach, Katja . 2009. "Climbing towards trust and privacy management in social mobile communities", Barcelona, Spain.
-
Bal, Gökhan; Kuntze, Nicolai; Schmidt, Andreas U. . 2009. "Injecting trust to cryptographic Key Management", Phoenix Park, Korea.
-
Hildenbrand, Tobias und Scheibmayr, Sven und Heim, Stephan. 2009. "Entwicklungshilfe: Software über Betriebsgrenzen hinweg erstellen", Wirtschaftsinformatik & Management .
-
-
Tannaz Alinaghi, Camelia Ghoroghi, Ahmad Sabouri, Reza Basseda. 2009. "A Framework for Dependency Evaluation of the Agent oriented Methodologies workflow", The 3rd IEEE Theoretical Aspects of Software Engineering Conference (TASE 2009).
-
Ehsan Valavi, Hamid Reza As’adi, Ahmad Sabouri.. 2009. "Resource Allocation in Wireless Sensor Network using Multi-Armed Bandit Problem", The 3rd International Workshop on Localized Algorithms and Pro- tocols for Wireless Sensor Networks (LOCALGOS 2009).
-
Zibuschka, Jan; Roßnagel, Heiko . 2008. "Implementing Strong Authentication Interoperability with Legacy Systems", Rotterdam, Netherlands.
-
Weiss, Stefan . 2008. "Using the Concept of Topic Maps for Enhancing Information Privacy in Social Networking Applications", Lecture Notes in Informatics, Saarbrücken, Germany.
-
Weiss, Stefan . 2008. "Privacy Threat Model for Data Portability in Social Network Applications", Ontario, Canada.
-
Scherner, Tobias; Muntermann, Jan . 2008. "Sustainable Growth for the Pacific-Asia Tourism Industry: Addressing Natural Disasters and Business Opportunities with Mobile ICT", Suzhou, China.
-
Royer, Denis; Meints, Martin . 2008. "Planung und Bewertung von Enterprise Identity Managementsystemen", Datenschutz und Datensicherheit, (32:3), ISBN: 0724-4371, pp. 189–193..
-
Royer, Denis . 2008. "Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach", pp. 779-786, IEEE Publishing, Barcelona, Spain.
-
Royer, Denis . 2008. "Enterprise Identity Management – What’s in it for Organisations?", pp. 403-416, Karlstad, Sweden.
-
Royer, Denis . 2008. "Ganzheitliche Bewertung von Enterprise Identity Management Systemen – Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterstützungsinstrument", pp. 449-460, Saarbrücken, Germany.
-
Roßnagel, Heiko; Zibuschka, Jan . 2008. "Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen", Saarbrücken, Germany.
-
Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2008. "Identitätsmanagement und Privatsphäre. Vertrauen und Kontrolle in Mobilen Contentumgebungen", In: Prozessgestaltung in der Medienproduktion. Neue Geschäftsmodelle und Technologien für Mobile Portale und HD Broadcast, Eds. , GITO, Berlin, Germany.
-
Radmacher, Mike . 2008. "Adaptive Customer Profiles For Context Aware Services in a Mobile Environment", IFIP International Federation for Information Processing, (251:), pp. 390-399, Wuhan, China.
-
Radmacher, Mike . 2008. "Design Criteria for Transparent Mobile Event Recommendations", Ontario, Canada.
-
Radmacher, Mike . 2008. "A Procedure of How to conduct Research in Transparent Mobile Recommendations", IFIP International Federation for Information Processing, (286:), pp. 49–60, Tokyo, Japan.
-
Meints, Martin; Royer, Denis . 2008. "Der Lebenszyklus von Identitäten", Datenschutz und Datensicherheit, (32:3), ISBN: 0724-4371, pp. 201..
-
Krontiris, Ioannis; Giannetsos, Thanassis; Dimitriou, Tassos; Freiling, Felix.C. . 2008. "Intrusion Detection in Wireless Sensor Networks", ISBN: 978-1420068399, Auerbach Publications.
-
Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos . 2008. "Privacy issues in location based services - Legal considerations on privacy-enhancing Location Based Services using PRIME technology", Computer Law & Security Report, (24:2), pp. 137-146..
-
Groth, Sven; Muntermann, Jan . 2008. "A Text Mining Approach to Support Intraday Financial Decision-Making", Toronto, Canada.
-
Deuker, André; Radmacher, Mike . 2008. "Individualisierungsmöglichkeiten im Mobile TV - Ein werbebasierter Geschäftsmodellansatz", pp. 39-52, Munich, Germany.
-
Deuker, André; Radmacher, Mike . 2008. "Multicast and Individual Service Provisioning in Mobile TV".
-
Albers, Andreas; Kahl, Christian . 2008. "Design and Implementation of context-sensitive Mobile Marketing Platforms", Washington DC, USA.
-
Albers, Andreas; Kahl, Christian . 2008. "Prototypical Implementation of an Intermediary Platform for Context-sensitive Mobile Marketing Applications", Toronto, Canada.
-
Pape, Sebastian; Benamar, Nabil. 2008. "Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy", In:
The Future of Identity in the Information Society, Eds. Fischer-Hübner, Simone; Duquenoy, Penny; Zuccato, Albin; Martucci, Leonardo, ISBN: 978-0-387-79026-8, pp. 299-310,
http://www.sebastian-pape.de/fileadmin/docs/literatur/publ/0806-pape_benamar-id_based_pk_crypto.pdf, Springer Boston.
-
Zibuschka, Jan; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Empowering LBS Users: Technical, Legal and Economic Aspects", The Hague, Netherlands.
-
Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning", Sandton, South Africa.
-
Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Privacy-Friendly LBS: A Prototype-supported Case Study", CO, USA.
-
Weiss, Stefan . 2007. "The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications", Karlstad, Sweden.
-
Scherner, Tobias . 2007. "Enabling Efficient and Privacy-friendly Location-based Services with Standardized Intermediary Infrastructures", Colorado, USA.
-
Royer, Denis . 2007. "Enterprise Identity Management – What’s in it for Organisations?", Karlstad, Sweden.
-
Roßnagel, Heiko; Zibuschka, Jan . 2007. "Integrating Qualified Electronic Signatures with Password Legacy Systems", Digital Evidence Journal, (4:1), pp. 5-11, Pario Comm. Ltd..
-
Roßnagel, Heiko . 2007. "Sichere Mobile Finanzdienstleistungen", digma. Zeitschrift für Datenrecht und Informationssicherheit, (7:1), pp. 12-15..
-
Roßnagel, Heiko; Hinz, Oliver . 2007. "Zahlungsbereitschaft für elektronische Signaturen", In: Wirtschaftsinformatik 2007, Eds. , Universitätsverlag Karlsruhe, Karlsruhe, Germany.
-
Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2007. "Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher", Karlsruhe, Germany.
-
Radmacher, Mike . 2007. "Elicitation of Profile Attributes by Transparent Communication", pp. 199-202, Minnesota, USA.
-
Nickerson, Robert C.; Varshney, Upkar; Muntermann, Jan; Isaac, Henri . 2007. "Towards a Taxonomy of Mobile Applications", Colorado, USA.
-
Muntermann, Jan; Güttler, André . 2007. "Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case", Journal of International Financial Markets, Institutions and Money, (17:1), pp. 1-24..
-
Muntermann, Jan . 2007. "Event-driven Mobile Financial Information Services – Design of an Intraday Decision Support System".
-
Krontiris, Ioannis; Dimitriou, Tassos; Salajegheh, Mastooreh; Soroush, Hamed . 2007. "WSN Link-Layer Security Frameworks", In: Wireless Sensors Networks Security, Eds. , ISBN: 978-1586038137, IOS Press.
-
Krontiris, Ioannis; Dimitriou, Tassos . 2007. "Secure Network Programming in Wireless Sensor Networks", In: Security in Distributed and Networking Systems, Eds. , ISBN: 978-9812708076, World Scientific Publishing Co.
-
Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos . 2007. "Privacy-enhancing user-friendly Identity Management for Location Based Services using PRIME technology – A legal discussion", Beijing, China.
-
König, Wolfgang; Fritsch, Lothar . 2007. "Innovationsförderung im öffentlichen Umfeld durch Public Private Partnerships - Das Beispiel der Satellitennavigation", Frankfurt, Germany.
-
Kohlweiss, Markulf; Gedrojc, Bartek; Fritsch, Lothar; Preneel, Bart . 2007. "Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker", Ottawa, Canada.
-
Fritsch, Lothar . 2007. "Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering", Journal of Theoretical and Applied E-Commerce research, (2:3), pp. 1-17..
-
Eicker, Stefan; Spies, Thorsten; Kahl, Christian . 2007. "Softwarevisualisierung im Kontext serviceorientierter Architekturen", ISBN: 1860-2770, Universität Duisburg-Essen, Essen, Germany.
-
Eicker, Stefan; Spies, Thorsten; Kahl, Christian . 2007. "Software Visualization in the Context of Service-Oriented Architectures", Banff, Canada.
-
Borcea-Pfitzmann, Katrin; Liesebach, Katja . 2007. "The concept of workspaces - re-defined for eLearning".
-
Borcea-Pfitzmann, Katrin; Hansen, Marit; Liesebach, Katja; Pfitzmann, Andreas; Steinbrecher, Sandra. 2007. "Managing One".
-
Albers, Andreas . 2007. "An Electronic Market Framework for context-sensitive Mobile Consumer Profiles in the Marketing Domain", CO, USA.
-
Albers, Andreas . 2007. "Allokation und Bepreisung kontextbezogener Kundenkontakte im Mobile Marketing", Karlsruhe, Germany.
-
Tobias Hildenbrand, Alla Korchminskaya, Stephan Oswald, Eike Bieber, Jean-Pierre Berchez, Niels Maché. 2007. "Konzeption einer Kollaborationsplattform für die zwischenbetriebliche Softwareerstellung", Wirtschaftsinformatik, (49:(4)), pp. 247-256.
-
Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2006. "Towards a Unified Interface for Privacy Regulation-conformant Location-based Services",
http://www.w3.org/2006/07/privacy-ws/, Ispra, Italy.
-
Scherner, Tobias . 2006. "Privacy as an enabler for new communities - an example of a leisure-time community", FIDIS, Långholmen, Sweden.
-
Scherner, Tobias; Zibuschka, Jan; Rannenberg, Kai . 2006. "Präsentation: Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen", In: DIN Workshop Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen, u.a. Ad-hoc Networking, Eds. , Berlin, Germany.
-
-
Royer, Denis; Deuker, André . 2006. "Komplexe Kommunikation - Der Einsatz von TYPO3 für Forschungsprojekte", T3N: Magazin für Open Source und TYPO3, (1:), Hannover, Germany.
-
Roßnagel, Heiko; Zibuschka, Jan . 2006. "Single Sign On mit Signaturen - Integration von elektronischen Signaturen und Passwortsystemen", Datenschutz und Datensicherheit, (30:12), pp. 773-777, Wiesbaden, Germany.
-
Roßnagel, Heiko; Scherner, Tobias . 2006. "Secure Mobile Notifications of Civilians in Case of a Disaster", pp. 33-42, Crete, Greece.
-
Roßnagel, Heiko; Royer, Denis . 2006. "Wirtschaftlichkeit mobiler qualifizierter Signaturen im E-Government", In: Informatik 2006 - Informatik für Menschen, pp. 451-459., Dresden, Germany.
-
Roßnagel, Heiko . 2006. "On Diffusion and Confusion - Why Electronic Signatures Have Failed", Krakow, Poland.
-
Muntermann, Jan; Roßnagel, Heiko . 2006. "Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures", Journal of Information System Security, (2:1), pp. 27-43..
-
Muntermann, Jan; Milic Frayling, Natasa . 2006. "Enhancing Asynchronous User Communication with Cross Platform and Channel Agnostic Messaging Services", Acapulco, Mexico.
-
Fritsch, Lothar; Scherner, Tobias; Rannenberg, Kai . 2006. "Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur", Praxis der Informationsverarbeitung und Kommunikation, Mannheim, Germany.
-
Fritsch, Lothar . 2006. "Der Rüstungswettlauf um das elektronische Geld", Frankfurt, Germany.
-
Fritsch, Lothar; Roßnagel, Heiko . 2006. "Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht", In: Kontaktbehaftet oder kontaktlos: auf jeden Fall Sicherheit, Eds. , Berlin, Germany.
-
Figge, Stefan; Theysohn, Sven . 2006. "Quantifizierung IKS-basierter Marktleistungen - Analyse eines werbefinanzierten Geschäftsmodells für den Mobile Commerce", WIRTSCHAFTSINFORMATIK, (48:2).
-
Franz, Elke; Liesebach, Katja; Borcea-Pfitzmann, Katrin. 2006. "Privacy-Aware User Interfaces within Collaborative Environments", pp. 45-48..
-
Dimitriou, Tassos; Krontiris, Ioannis; Nikakis, Fotios. 2006. "Fast and Scalable Key Establishment in Sensor Networks", In: Sensor Network Operations, ISBN: 978-0471719762, pp. 557-570, Wiley-IEEE Press.
-
Dimitriou, Tassos; Krontiris, Ioannis . 2006. "GRAViTy: Geographic Routing Around Voids", The International Journal of Pervasive Computing and Communications.
-
Dimitriou, Tassos; Krontiris, Ioannis . 2006. "Secure In-Network Processing in Sensor Networks", In: Security in Sensor Networks, Eds. , ISBN: 978-0849370588.
-
Deng, Mina; Fritsch, Lothar; Kursawe, Klaus . 2006. "Personal Rights Management - Taming camera-phones for individual privacy enforcement", Cambridge, United Kingdom.
-
Borcea-Pfitzmann, Katrin; Hansen, Marit; Liesebach, Katja; Steinbrecher, Sandra; Pfitzmann, Andreas. 2006. "What User-Controlled Identity Management Should Learn from Communities", Technical Report, (11:3), pp. 119-128..
-
Royer, Denis . 2005. "How to cope with complexity: The usage of Typo3 for Research Projects", Karlsruhe, Germany.
-
Scherner, Tobias; Fritsch, Lothar . 2005. "Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure".
-
Roßnagel, Heiko; Royer, Denis . 2005. "Making Money with Mobile Qualified Electronic Signatures", pp. 110-118, Copenhagen, Denmark.
-
Roßnagel, Heiko; Royer, Denis . 2005. "Investing in security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators? ", Nebraska, USA.
-
Roßnagel, Heiko; Royer, Denis . 2005. "Profitability of Mobile Qualified Electronic Signatures", Bangkok, Thailand.
-
Roßnagel, Heiko; Murmann, Tobias . 2005. "How Secure are Current Mobile Operating Systems?", Windermere, United Kingdom.
-
Roßnagel, Heiko; Fritsch, Lothar . 2005. "Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht", In: Sicherheit - Schutz und Zuverlässigkeit, Eds. , Regensburg, Germany.
-
Rannenberg, Kai; Schneider, Ingo; Figge, Stefan . 2005. "Mobile Systeme und Anwendungen - Editorial zum Schwerpunktheft", WIRTSCHAFTSINFORMATIK, (47:1).
-
Rannenberg, Kai; Albers, Andreas; Figge, Stefan; Radmacher, Mike; Roßnagel, Heiko . 2005. "Mobile Commerce – Forschungsfragen am Scheideweg der Mobilfunkgenerationen", Augsburg, Germany.
-
-
Murmann, Tobias; Roßnagel, Heiko . 2005. "Sicherheitsanalyse von Betriebssystemen für Mobile Endgeräte", In: SICHERHEIT 2005, Sicherheit - Schutz und Zuverlässigkeit, Eds. , Regensburg, Germany.
-
-
Muntermann, Jan; Janssen, Lars . 2005. "Assessing Customers’ Value of Mobile Financial Information Services – Empirical-based Measures", Las Vegas, USA.
-
Muntermann, Jan . 2005. "Automated Mobile Alerting Services - Towards A Level Playing Field in the Financial Community", Journal of Electronic Commerce Research, (6:3).
-
Lippmann, Silvia; Roßnagel, Heiko . 2005. "Geschäftsmodelle für signaturgesetzkonforme Trust Center", In: Wirtschaftsinformatik 2005, Eds. , Physica, Bamberg, Germany.
-
Liesebach, Katja . 2005. "Kontext- und zielgruppenspezifische Repräsentation von Lernmaterialien mit Hilfe von semantischen Netzen", Rostock, Germany.
-
Koelsch, Tobias; Fritsch, Lothar; Kohlweiss, Markulf; Kesdogan, Dogan . 2005. "Privacy for Profitable Location Based Services", pp. 164-179, Boppard, Germany.
-
Hess, Thomas; Kaspar, Christian; Rauscher, Barbara; Figge, Stefan; et al., . 2005. "Technische Möglichkeiten und Akzeptanz mobiler Anwendungen - Eine interdisziplinäre Betrachtung", WIRTSCHAFTSINFORMATIK, (47:1).
-
Fritsch, Lothar; Stephan, Kerstin; Grohmann, Alexander . 2005. "Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle", Dresden, Germany.
-
Fritsch, Lothar; Scherner, Tobias . 2005. "Schutz der Privatsphäre wahren: Sichere Bevölkerungswarnung per Handy", WIK - Zeitschrift für Sicherheit in der Wirtschaft, (3:), Ingelheim, Germany.
-
Fritsch, Lothar; Scherner, Tobias . 2005. "A Multilaterally Secure, Privacy-Friendly Location-based Service for Disaster Management and Civil Protection", pp. 1130-1137, La Réunion, France.
-
Fritsch, Lothar; Rannenberg, Kai . 2005. "Mobile Goverment", Otto Schmidt, Düsseldorf, Germany.
-
Fritsch, Lothar; Roßnagel, Heiko; Schwenke, Matthias; Stadler, Tobias . 2005. "Die Pflicht zum Angebot anonym nutzbarer Dienste - Eine technische und rechtliche Zumutbarkeitsbetrachtung", Datenschutz und Datensicherheit, (29:10), pp. 592-596, Wiesbaden, Germany.
-
Fritsch, Lothar; Muntermann, Jan . 2005. "Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location Based Service-Angeboten", In: Lecture Notes on Informatics, Eds. , Augsburg, Germany.
-
Figge, Stefan; Albers, Andreas . 2005. "Individualising M-Commerce Services by Semantic User Situation Modelling", Bamberg, Germany.
-
Deng, Mina; Fritsch, Lothar; Kursawe, Klaus . 2005. "Personal Rights Management - enabling privacy rights in digital online content", Salzburg, Austria.
-
Borcea-Pfitzmann, Katrin; Liesebach, Katja; Wahrig, Hagen. 2005. "Das Workspace-Konzept - neu verpackt im eLearning!", Rostock, Germany.
-
Borcea-Pfitzmann, Katrin; Liesebach, Katja; Pfitzmann, Andreas. 2005. "Establishing a Privacy-Aware Collaborative eLearning Environment", Rome, Italy.
-
Borcea, Katrin; Donker, Hilko; Franz, Elke; Liesebach, Katja; Pfitzmann, Andreas; Wahrig, Hagen. 2005. "Intra-application Partitioning of Personal Data", Edinburgh, United Kingdom.
-
Albers, Andreas; Figge, Stefan; Radmacher, Mike . 2005. "LOC3 - Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures", Munich, Germany.
-
Albers, Andreas; Figge, Stefan; Hochstatter, Iris; Kaspar, Christian; et al. . 2005. "Mobile Anwendungen - Best Practices in der TIME-Branche", Universitätsverlag Göttingen, Göttingen, Germany.
-
Roßnagel, Heiko . 2004. "Mobile Qualified Electronic Signatures and Certification on Demand", Samos Island, Greece.
-
Roßnagel, Heiko . 2004. "Mobile Qualified Electronic Signatures for Secure Mobile Brokerage", Cyprus, Turkey.
-
-
Roßnagel, Heiko . 2004. "Enabling Mobile Qualified Electronic Signatures with Certification on Demand", Information Security Bulletin, (9:6).
-
-
Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai . 2004. "Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen", In:
E-Science und GRID, Ad-hoc-Netze und Medienintegration, pp. 361-376.,
http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5672/, Bonn, Germany.
-
Muntermann, Jan; Güttler, André . 2004. "Mobile Financial Information Services: Capabilities of Suitable Push Services", Shanghai, China.
-
Muntermann, Jan . 2004. "Notifying Investors in Time - A Mobile Information System Approach", New York, .
-
-
Günnewig, Dirk; Rannenberg, Kai; Sadeghi, Ahmad-Reza; Stüble, Christian . 2004. "Trusted Computing Platforms – Zur technischen und industriepolitischen Situation und Vorgehensweise", In:
Trusted Computing – Technik, Recht und gesellschaftspolitische Implikationen vertrauenswürdiger Systemumgebungen, ISBN: 3-8005-1341-2, pp. 154-162,
http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5680/, Recht und Wirtschaft GmbH, Heidelberg, Germany.
-
Fritsch, Lothar; Roßnagel, Heiko . 2004. "SIM-based Mobile Electronic Signatures: Enabling M-Business with Certification on Demand", Card Forum International, (8:1), Lüneburg, Germany.
-
-
Figge, Stefan . 2004. "Situation-dependent services - a challenge for mobile network operators", Journal of Business Research - Mobility and Markets: Emerging Outlines of M-Commerce, (57:12).
-
Pape, Sebastian;Dietz, Laura; Tandler, Peter. 2004. "Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops", In: Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04.
-
Tiebel, O.; Liesebach, Katja; Mitschick, A. et al. . 2003. "DIPOL-Edit – a new system supporting the WWW-based delivery of course content at Dresden Medical Faculty", University of Bern, Switzerland.
-
Roßnagel, Heiko . 2003. "Mobile/kabellose Netzwerke", In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik, Eds. , Frankfurt am Main, Germany.
-
Rannenberg, Kai; Roßnagel, Heiko; Fritsch, Lothar . 2003. "Economics & IT Security Certification", Stockholm, Sweden.
-
Rannenberg, Kai . 2003. "Identity Management in Mobile Applications", Datenschutz und Datensicherheit, (27:9), pp. 546-550, Wiesbaden, Germany.
-
Rannenberg, Kai . 2003. "Sicherheit", In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik, ISBN: 978-3-8171-1694-2, pp. 353-361, Frankfurt a.M., Germany.
-
Ranke, Johannes; Fritsch, Lothar; Roßnagel, Heiko . 2003. "M-Signaturen aus rechtlicher Sicht", Datenschutz und datensicherheit, (27:2), pp. 95-100, Wiesbaden, Germany.
-
Fritsch, Lothar; Weber, Christoph . 2003. "Volcanic Activity Report - Erta Ale: Frequent changes in the active crater morphology and lava lake level", Smithsonian National Museum of Natural History, Washington D.C., USA.
-
Fritsch, Lothar; Rannenberg, Kai . 2003. "Informationstechnische Voraussetzungen von E-Government am Beispiel des Katastrophenschutzes mittels Mobilkommunikation", In:
Tagungsband zur Jahrstagung 2002 der Deutschen Gesellschaft für Recht und Informatik,
http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5558/, Otto-Schmidt, Cologne, Germany.
-
Fritsch, Lothar; Ranke, Johannes; Roßnagel, Heiko . 2003. "ualified mobile electronic signatures: Possible, but worth a try?", Vienna, Austria.
-
Fritsch, Lothar . 2003. "Die T-Mobile-Stiftungsprofessur für Mobile Commerce und Mehrseitige Sicherheit an der Johann Wolfgang Goethe-Universität Frankfurt", Praxis der Informationsverarbeitung und Kommunikation, (2:3), pp. 114f, K.G. Saur, München, Germany.
-
-
-
Figge, Stefan; Schrott, Gregor . 2003. "3G “ad” Work - 3G’S Breakthrough with mobile Advertising", München, Germany.
-
Amberg, Michael; Figge, Stefan; Wehrmann, Jens . 2003. "A Cooperation Model for Personalised and Situation Dependent Services in Mobile Networks", Berlin, Germany.
-
-
Rannenberg, Kai . 2002. "Interview: Werbefreie Identität gewünscht", MARKET Magazin für Online-Marketing und E-Commerce, (5:), Munich, Germany.
-
Kursawe, Klaus; Cachin, Christian; Lysyanskaya, Anna; Strobl, Reto . 2002. "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems.".
-
Fuchß, Thomas; Fritsch, Lothar . 2002. "Effective Business Processes Online - A Platform for Secure Online Business Transactions with Electronic Signatures", Düsseldorf, Germany.
-
Kursawe, Klaus . 2002. "Optimistic Byzantine Agreement".
-
Figge, Stefan . 2002. "Die Open Mobile Architecture - Systemumgebung für mobile Dienste der nächsten Generation", WIRTSCHAFTSINFORMATIK, (44:).
-
Fritsch, Lothar . 2002. "A secure, economic infrastructure for signing of web based documents and financial affairs", CBL – Cyberbanking & Law, Ausgabe, (2:).
-
Amberg, Michael; Figge, Stefan; Wehrmann, Jörg . 2002. "COMPASS – Ein Kooperationsmodell für situationsabhängige mobile Dienst", In: Mobile and Collaborative Business 2002, Eds. .
-
-
Fuchß, Thomas; Fritsch, Lothar . 2001. "Sicherheit im Mobile Banking", Mobile Computer & Kommunikation, (10:), pp. 66f..
-
Fritsch, Lothar . 2001. " secure, affordable infrastructure for electronic signature applications", Datenschutz und Datensicherheit, (9:), pp. 532f.
-
Fuchß, Thomas; Fritsch, Lothar . 2001. "Endgeräte für den M-Commerce: Defizite und Aussichten", KES, Zeitschrift für Kommunikations- und EDV-Sicherheit, (1:), pp. 6f.
-
Fritsch, Lothar . 2001. "Sicherheit im M-Commerce", IT-Lösungen und Banktechnik.
-
Fox, Dirk; Fritsch, Lothar; Giessmann, Ernst G. . 2001. "Vertrauen", Kiel, Germany.
-
Figge, Stefan; Schoedel, Sven . 2001. "Architekturen für mobile Geschäfte", Computerwoche Extra, (8:).
-
-
Rannenberg, Kai . 2000. "IT Security Certification and Criteria – Progress, Problems and Perspectives",
Proceedings of the 16th Annual Working Conference on Information Security (IFIP/SEC 2000), ISBN: 0-7923-7914-4, pp. 1-10 in Sihan Qing,
https://m-chair.de/images/documents/publications/Rannenberg/IFIP-SEC-2000-978-0-387-35515-3_1.pdf, Kluwer Academic Publishers, Boston, Jan H.P.El:Information Security for Global Information Infrastructures, Beijing, China.
-
-
-
Rannenberg, Kai . 2000. "Electronic Commerce und Mehrseitige Sicherheit - Baustellen", Informatik Forschung und Entwicklung, (15:4), pp. 193-206..
-
Rannenberg, Kai . 2000. "Multilateral Security - Why and How?", pp. 520, Maryland, USA.
-
Rannenberg, Kai . 2000. "Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet", Wirtschaftsinformatik, (42:6).
-
Fuchß, Thomas; Fritsch, Lothar . 2000. "Erfahrungen mit der ITSEC E4/Hoch-Zertifizierung", Datenschutz und Datensicherheit, (10:), pp. 583f.
-
Fuchß, Thomas; Fritsch, Lothar . 2000. "M-Commerce Security", Barcelona, Spain.
-
Fuchß, Thomas; Fritsch, Lothar . 2000. "Security Certificates as a tool for reliably software engineering", Datenschutz und Datensicherheit, (9:), pp. 514f.
-
Fritsch, Lothar; Fuchß, Thomas . 2000. "Experience with E4/High evaluation", Paris, France.
-
Fritsch, Lothar; Fuchß, Thomas . 2000. "Erfahrungen eines Softwarehauses in Deutschland mit der ITSEC E4/Hoch-Zertifizierung – Ist bewiesene Sicherheit bezahlbar?", Darmstadt, Germany.
-
Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1999. "Mehrseitige Sicherheit in der Telekommunikation", In: Mobile und sichere Kommunikation im Gesundheitswesen, ISBN: 3-528-05690-8, pp. 35-44, Vieweg, Braunschweig, Germany.
-
Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1999. "IT Security and Multilateral Security", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 21-29, Addison-Wesley-Longman, Massachusetts, USA.
-
Rannenberg, Kai; Fox, Dirk . 1999. "Privacy Points", Datenschutz und Datensicherheit, (23:2), pp. 99.
-
Rannenberg, Kai . 1999. "Sicherheit", Praxis der Wirtschaftsinformatik, (22:3), pp. 138-139..
-
Rannenberg, Kai . 1999. "What can IT Security Certification do for Multilateral Security?", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 515-530, Addison-Wesley-Longman, Germany.
-
Rannenberg, Kai . 1999. "IT-Sicherheitszertifizierung – Garantie für Sicherheit?", Praxis der Wirtschaftsinformatik, (22:3), pp. 154-161..
-
Mueller, Guenter; Rannenberg, Kai . 1999. "DFG-Schwerpunktprogramm", Praxis der Informationsverarbeitung und Kommunikation, (22:1), pp. 61-62..
-
Rannenberg, Kai . 1999. "Sicherung internetbasierter Unternehmenskommunikation", Praxis der Wirtschaftsinformatik, (36:209), pp. 53-66..
-
Mueller, Guenter; Rannenberg, Kai . 1999. "Sicherheit in der Informations- und Kommunikationstechnik – Ein neues DFG-Schwerpunktprogramm", Informatik Forschung und Entwicklung, (14:1), pp. 46-48..
-
Mueller, Guenter; Rannenberg, Kai . 1999. "Security for Global Communications", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 11-17, Addison-Wesley-Longman, Massachusetts, USA.
-
Kursawe, Klaus; Albers, Susanne; Schuierer, Sven . 1999. "Exploring Onknown Environments with Obstacles".
-
Mueller, Guenter; Rannenberg, Kai . 1999. "Multilateral Security – Empowering Users", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 563-570, Addison-Wesley-Longman, Massachusetts, USA.
-
Jendricke, Uwe; Rannenberg, Kai . 1999. "A MixDemonstrator for teaching Security in the Virtual University", ISBN: 91-7153-910-7, pp. 83-96, Kista, Sweden.
-
Bludau, Hans-Bernd; Rannenberg, Kai . 1999. "Das Erfahrungsfeld im "Erreichbarkeitsmanagement" im Kontext mehrseitiger Sicherheit – Simulationsstudien als didaktisches Instrument", In: Zur Didaktik der IT-Sicherheit, ISBN: 3-922746-33-0, pp. 173-188, Secu-Media, Ingelheim, Germany.
-
Bertsch, Andreas; Rannenberg, Kai; Bunz, Herbert . 1999. "Nachhaltige Überprüfbarkeit digitaler Signaturen", In: Sicherheitsinfrastrukturen, ISBN: 3-528-05709-2, pp. 39-50, Vieweg, Braunschweig, Germany.
-
Bertsch, Andreas; Rannenberg, Kai . 1999. "Lean Infrastructures for Sustainable Digital Signatures", pp. 173-189..
-
Rannenberg, Kai . 1998. "Sicherheitszertifizierung", Datenschutz und Datensicherheit, (22:4), pp. 190-192..
-
Rannenberg, Kai . 1998. "Datenschutz als Innovationsmotor statt als Technikfeind", In: Der neue Datenschutz - Datenschutz in der Informationsgesellschaft von morgen, ISBN: 3-472-03284-7, pp. 190-205, Neuwied, Germany.
-
Fox, Dirk; Rannenberg, Kai . 1998. "Zertifikate – Gütesiegel oder Feigenblatt?", Datenschutz und Datensicherheit, (22:4), pp. 186.
-
-
Damker, Herbert; Pordesch, Ulrich; Rannenberg, Kai; Schneider, Michael . 1998. "Aushandlung mehrseitiger Sicherheit: der Erreichbarkeits- und Sicherheitsmanager", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Erwartung, Akzeptanz, Nutzung, ISBN: 3-8273-1355-0, pp. 29-42, Addison-Wesley-Longman, Bonn, Germany.
-
-
Reichenbach, Martin; Damker, Herbert; Federrath, Hannes; Rannenberg, Kai . 1997. "Individual Management of Personal Reachability in Mobile Communication", ISBN: 0-412-8178-02, pp. 163-174,
https://m-chair.de/images/documents/publications/Rannenberg/ReiDFRa_97.IFIP_SEC.pdf, Chapman & Hall, London, United Kingdom.
-
Rannenberg, Kai; Mueller, Guenter . 1997. "Mehrseitige Sicherheit – Nutzer stärken", FIFF-Kommunikation, (14:3), pp. 29-31..
-
Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1997. "Sicherheit", ISBN: 3-8273-1116-0, pp. 21-29, Addison-Wesley-Longman, Bonn, Germany.
-
Rannenberg, Kai . 1997. "Tragen Zertifizierung und Evaluationskriterien zu mehrseitiger Sicherheit bei?", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, ISBN: 3-8273-1116-0, pp. 527-562, Addison-Wesley-Longman, Bonn, Germany.
-
Mueller, Guenter; Rannenberg, Kai . 1997. "Mehrseitige Sicherheit – Nutzer stärken", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, ISBN: 3-8273-1116-0, pp. 565-572, Addison-Wesley-Longman, Bonn, Germany.
-
Mueller, Guenter; Rannenberg, Kai . 1997. "Das Ladenburger Kolleg – Sicherheit in der Kommunikationstechnik", Zeitschrift für Kommunikations- und EDV-Sicherheit, (13:6), pp. 54-56.
-
-
Rannenberg, Kai; Damker, Herbert; Langenheder, Werner; Mueller, Guenter . 1995. "Mehrseitige Sicherheit als integrale Eigenschaft von Kommunikationstechnik – Kolleg", In: Jahrbuch „Telekommunikation & Gesellschaft, Eds. , R. v. Decker's, Heidelberg, Germany.
-
-
Rannenberg, Kai . 1995. "Normfähigkeit von Test- und Bewertungsmethoden", Datenschutz-Berater, (19:6), pp. 19.
-
-
Rannenberg, Kai . 1994. "Version 1.0 des Evaluationshandbuches ITSEM", Datenschutz-Berater, (18:5), pp. 5-6.
-
-
Rannenberg, Kai . 1994. "GI und Studierende", Informatik-Spektrum, (17:4), pp. 219.
-
Mueller, Guenter; Rannenberg, Kai; Damker, Herbert . 1994. "Kolleg "Sicherheit in der Kommunikationstechnik" eingerichtet", Praxis der Informationsverarbeitung und Kommunikation, (17:4), pp. 255-257.
-
Mueller, Guenter; Rannenberg, Kai . 1994. "Sicherheit in der Kommunikationstechnik – zu Aufgabe und Struktur eines Kollegs", In: Sicherheit von Technik – Ladenburger Kolleg, ISBN: 3-8249-0224-9, pp. 183-189, TÜV Rheinland GmbH, Cologne, Germany.
-
Rannenberg, Kai . 1993. "The 15th National Computer Security Conference - Security made out of Building Blocks", The Computer Law and Security Report, (9:3), pp. 143-144.
-
Rannenberg, Kai . 1993. "Die USA präsentieren den Orange-Book-Nachfolger", Datenschutz-Berater, (17:5), pp. 8-10.
-
-
Rannenberg, Kai . 1992. "Tagungsbericht: 15. National Computer Security Conference", pp. 13-15.
-
Rannenberg, Kai . 1992. "Evaluierung", Datenschutz und Datensicherung, (16:5), pp. 250-251.
-
-
Rienhoff, O.; Lutterbeck, Bernd; Retter, K.; Rannenberg, Kai; Reinecke, Elke . 1991. "Rechtsunsicherheiten bei der digitalen Bildverarbeitung und Archivierung", In: Digitale Radiographie, Referate und Vorträge, ISBN: 3-87018-081-1, pp. 159-164, Schnetztor, Konstanz, Germany.
-
Rannenberg, Kai . 1991. "GI-Fachgruppe VIS zu den ITSEC-Plänen", KES – Zeitschrift für Kommunikations- und EDV-Sicherheit, (7:4), pp. 261-263.
-
Rannenberg, Kai . 1991. "Diskussion "IT-Sicherheit – Bewertungskriterien" auf der VIS", Datenschutz und Datensicherung, (15:5), pp. 267-269.
-
Rannenberg, Kai . 1991. "IT-Sicherheit – Bewertungskriterien", Computer und Recht, (7:11), pp. 699-701.
-
Rannenberg, Kai . 1991. "IT-Sicherheit – Bewertungskriterien auf der VIS", Informatik-Spektrum, (14:4), pp. 235-236.
-
Meyer, Martin; Rannenberg, Kai . 1991. "Eine Bewertung der „Information Technology Security Evaluation Criteria“", In: Proc. Verläßliche Informationssysteme (VIS'91), pp. 243-258, Springer, Darmstadt, Germany.
-
Brandenburg, Uwe-Wolfgang; Rannenberg, Kai . 1990. "Viren und Würmer.", Automatisierungstechnische Praxis, (32:10), pp. 500-508.