Filter your results
- 29
- 3
- 26
- 3
- 3
- 32
- 3
- 1
- 1
- 2
- 2
- 5
- 1
- 4
- 3
- 2
- 3
- 1
- 2
- 5
- 32
- 2
- 2
- 1
- 1
- 1
- 7
- 7
- 5
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.165-179, ⟨10.1007/978-3-030-22312-0_12⟩
Conference papers
hal-03744316v1
|
||
|
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-LifeJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.3-16, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_1⟩
Book sections
hal-01431588v1
|
||
|
Using Fraud Patterns for Fraud Risk Assessment of E-services32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.553-567, ⟨10.1007/978-3-319-58469-0_37⟩
Conference papers
hal-01649009v1
|
||
|
Chip-Size Evaluation of a Multithreaded Processor Enhanced with a PID Controller8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.3-12, ⟨10.1007/978-3-642-16256-5_3⟩
Conference papers
hal-01055381v1
|
||
|
“It’s Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.198-215, ⟨10.1007/978-3-319-95729-6_13⟩
Conference papers
hal-01954416v1
|
||
|
Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.119-132, ⟨10.1007/978-3-319-25013-7_10⟩
Conference papers
hal-01448032v1
|
||
Security and Privacy – Silver Linings in the CloudSpringer, AICT-330, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-15256-6
Books
hal-01557549v1
|
|||
|
Using Value Models for Business Risk Analysis in e-Service Networks8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.239-253, ⟨10.1007/978-3-319-25897-3_16⟩
Conference papers
hal-01442255v1
|
||
|
On Gender Specific Perception of Data Sharing in Japan31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.150-160, ⟨10.1007/978-3-319-33630-5_11⟩
Conference papers
hal-01369550v1
|
||
|
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.317-325, ⟨10.1007/978-3-642-21424-0_26⟩
Conference papers
hal-01567604v1
|
||
|
Organizational Resistance to E-Invoicing – Results from an Empirical Investigation among SMEs12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.286-297, ⟨10.1007/978-3-642-40358-3_24⟩
Conference papers
hal-01490914v1
|
||
|
Value-Driven Risk Analysis of Coordination Models9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.102-116, ⟨10.1007/978-3-319-48393-1_8⟩
Conference papers
hal-01653518v1
|
||
|
Aggregating Corporate Information Security Maturity Levels of Different Assets14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.376-392, ⟨10.1007/978-3-030-42504-3_24⟩
Conference papers
hal-03378962v1
|
||
|
A Structured Comparison of the Corporate Information Security Maturity Level34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.223-237, ⟨10.1007/978-3-030-22312-0_16⟩
Conference papers
hal-03744289v1
|
||
|
Secure and Privacy-Friendly Storage and Data Processing in the CloudMarit Hansen; Eleni Kosta; Igor Nai-Fovino; Simone Fischer-Hübner. Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, AICT-526, Springer International Publishing, pp.153-169, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-92924-8. ⟨10.1007/978-3-319-92925-5_10⟩
Book sections
hal-01883628v1
|
||
|
Coupons as Monetary Incentives in Participatory Sensing12th Conference on e-Business, e-Services, and e-Society (I3E), Apr 2013, Athens, Greece. pp.226-237, ⟨10.1007/978-3-642-37437-1_19⟩
Conference papers
hal-01470536v1
|
||
|
Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.275-283, ⟨10.1007/978-3-642-14282-6_23⟩
Conference papers
hal-01061063v1
|
||
|
How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.277-288, ⟨10.1007/978-3-642-15257-3_25⟩
Conference papers
hal-01054509v1
|
||
|
Monitoring of an Artificial DNA in Dynamic Environments6th International Embedded Systems Symposium (IESS), Sep 2019, Friedrichshafen, Germany. pp.167-178, ⟨10.1007/978-3-031-26500-6_14⟩
Conference papers
hal-04489005v1
|
||
|
Privacy Concerns and Behavior of Pokémon Go Players in GermanyMarit Hansen; Eleni Kosta; Igor Nai-Fovino; Simone Fischer-Hübner. Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, AICT-526, Springer International Publishing, pp.314-329, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-92924-8. ⟨10.1007/978-3-319-92925-5_21⟩
Book sections
hal-01883610v1
|
||
|
Towards a Framework for Benchmarking Privacy-ABC Technologies29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.197-204, ⟨10.1007/978-3-642-55415-5_16⟩
Conference papers
hal-01370365v1
|
||
|
Beats Down: Using Heart Rate for Game Interaction in Mobile Settings14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.523-530, ⟨10.1007/978-3-642-40498-6_41⟩
Conference papers
hal-01510498v1
|
||
|
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.223-235, ⟨10.1007/978-3-319-45931-8_14⟩
Conference papers
hal-01639611v1
|
||
|
A Methodology to Assess the Benefits of Smart Order Routing10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society (I3E), Nov 2010, Buenos Aires, Argentina. pp.81-92, ⟨10.1007/978-3-642-16283-1_12⟩
Conference papers
hal-01055031v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer International Publishing, AICT-580, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-58200-5. ⟨10.1007/978-3-030-58201-2⟩
Books
hal-03440837v1
|
||
|
Advancing Research in Information and Communication TechnologySpringer International Publishing, AICT-600, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-81700-8. ⟨10.1007/978-3-030-81701-5⟩
Books
hal-03325976v1
|
||
|
Assessing Privacy Policies of Internet of Things Services33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.156-169, ⟨10.1007/978-3-319-99828-2_12⟩
Conference papers
hal-02023740v1
|
||
|
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.113-126, ⟨10.1007/978-3-642-55415-5_10⟩
Conference papers
hal-01370359v1
|
||
|
Privacy Respecting Targeted Advertising for Social Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers
hal-01573299v1
|
||
|
JonDonym Users’ Information Privacy Concerns33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.170-184, ⟨10.1007/978-3-319-99828-2_13⟩
Conference papers
hal-02023731v1
|
- 1
- 2