Search

Your search keyword '"Simone Fischer"' showing total 296 results

Search Constraints

Start Over You searched for: Author "Simone Fischer" Remove constraint Author: "Simone Fischer"
296 results on '"Simone Fischer"'

Search Results

251. Sharing Is Caring, a Boundary Object Approach to Mapping and Discussing Personal Data Processing

252. Privacy Patterns for Pseudonymity

253. Me and My Robot - Sharing Information with a New Friend

254. Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications

255. Glycos: The Basis for a Peer-to-Peer, Private Online Social Network

256. Privacy and Socially Assistive Robots - A Meta Study

257. From Privacy to Algorithms’ Fairness

258. mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies

259. Designing a GDPR-Compliant and Usable Privacy Dashboard

260. Data Protection Impact Assessment: A Hands-On Tour of the GDPR’s Most Practical Tool

261. Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering

262. All Your Data Are Belong to us . European Perspectives on Privacy Issues in ‘Free’ Online Machine Translation Services

263. Smart Cars Cruising on the Road Paved with Good Intentions? – Workshop on Big Data Applications and Individual Rights Under the New European General Data Protection Regulation

264. Modelling the Relationship Between Privacy and Security Perceptions and the Acceptance of Surveillance Practices

265. Big Data Privacy and Anonymization

266. Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model

267. Patterns in Privacy - A Pattern-Based Approach for Assessments

268. Extending EMV Payment Smart Cards with Biometric On-Card Verification

269. Logout in Single Sign-on Systems

270. Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives

271. Dynamic Identity Federation Using Security Assertion Markup Language (SAML)

272. Do-Not-Track Techniques for Browsers and Their Implications for Consumers

273. Privacy Preserving Mechanisms for a Pervasive eHealth System

274. Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective

275. The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services

276. Detecting illegal system calls using a data-oriented detection model

277. Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

278. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?

279. Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement

280. A Conceptual Model for Privacy Policies with Consent and Revocation Requirements

281. Retrofitting Security in COTS Software with Binary Rewriting

282. Delegation of Obligations and Responsibility

283. Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies

284. Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report from the Insurance and Auditing Domain

285. Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements

286. Privacy-Friendly Incentives and Their Application to Wikipedia

287. Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World

288. Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns

289. Privacy: What Are We Actually Talking About?

290. Privacy Effects of Web Bugs Amplified by Web 2.0

291. Secure Logging of Retained Data for an Anonymity Service

292. Lifelong Privacy: Privacy and Identity Management for Life

293. Anonymous Credentials in Web Applications - A Child's Play with the PRIME Core

294. Privacy-Respecting Access Control in Collaborative Workspaces

295. Privacy of Outsourced Data

296. An Analysis for Anonymity and Unlinkability for a VoIP Conversation

Catalog

Books, media, physical & digital resources