


default search action
Open Identity Summit 2025: Neubiberg, Germany
- Heiko Roßnagel, Christian H. Schunck, Daniela Pöhn:
Open Identity Summit 2025, Neubiberg, Germany, May 22-23, 2025. LNI P-364, Gesellschaft für Informatik e.V. 2025
Konferenzbeitrag
- Ignacio Alamillo, Steffen Schwalm:
The role of EBSI in eIDAS - how qualified ledger with governmental trust anchor could shape eIDAS ecosystem. 29-40 - R. X. Schwartz, Kerri Lemoie, Jeanne Kitchens:
Developing A Governance Framework for Learning and Employment Record (LER) Issuer Registries. 41-54 - Tina Hühnlein, Detlef Hühnlein, Steffen Schwalm, Carsten Stöcker:
Towards the European Business Wallet. 127-141 - Michael Kubach:
Economic Challenges of Cybersecurity Innovations Pursuing an Ecosystems Approach. 71-84 - Daniela Pöhn:
"Then I clicked something" - Helping Users to Report Security Incidents with Digital Identity Wallets. 55-69 - Lara Eberl, Lisa-Marie Engländer, Caroline Löhle, Dennis Jahnecke, Aylin Baris, Donjeta Seljaci, Schabnam Shamsi, Jochen Günther:
Phishing and Identity Manipulation through Audiovisual Channels. 101-112 - Eric Biele, Daniel Richter, Ricardo Bochnia, Jürgen Anke:
Supporting trust decisions of holders and verifiers: a unified model of trust management in SSI. 113-126 - Erran Carmel, Edgar Whitley, Emma Grubb:
Tracking the Shift to Decentralised Identity: A Case Study in International Air Travel. 85-99 - Salma Ben Mamia, Christian H. Schunck, Mrudula Arunkumar, Heiko Roßnagel:
Security awareness versus secure behaviour: A bibliometric study of the state of research on human factors in IT Security. 167-173 - Awid Vaziry, Luca Vetter, Axel Küpper:
eIDAS 2.0: Evaluating the Issuance of Digital University Diplomas. 183-190 - Isaac Henderson Johnson Jeyakumar, Michael Kubach:
FidNET: Flexible Infrastructure for Decentralized Trust Establishment in Industrial Supply Chain Networks. 175-182 - Anne Elisabeth Krüger:
Making Security Matter: Engaging Non-Security Users Effectively through Empathy. 161-166 - Aaron Witzki, K. Valeria Carl, Léon Dankert, Oliver Thomas, Oliver Hinz:
What are your intentions with my data? A tool to enhance consumer data sovereignty in digital ecosystems. 13-28 - Mrudula Arunkumar, Christian H. Schunck, Salma Ben Mamia, Heiko Roßnagel:
How can Design Thinking benefit Cybersecurity?: Insights from Don Norman’s The Design of Everyday Things. 153-160 - Lennart Kiss, Rachelle Sellung:
Securing Engagement: Key Takeaways from Onboarding Users into Data Protection Apps. 145-152

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.