default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2018
- Marit Hansen, Eleni Kosta, Igor Nai Fovino, Simone Fischer-Hübner:
Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 526, Springer 2018, ISBN 978-3-319-92924-8 [contents] - 2017
- José M. del Álamo, Yod Samuel Martín, Julio C. Caiza:
Towards Organizing the Growing Knowledge on Privacy Engineering. Privacy and Identity Management 2017: 15-24 - Benjamin Bergemann:
The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection. Privacy and Identity Management 2017: 111-131 - Felix Bieker, Nicholas Martin, Michael Friedewald, Marit Hansen:
Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool. Privacy and Identity Management 2017: 207-220 - Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini:
Secure and Privacy-Friendly Storage and Data Processing in the Cloud. Privacy and Identity Management 2017: 153-169 - Silvia De Conca:
From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots. Privacy and Identity Management 2017: 282-298 - Kovila P. L. Coopamootoo, Thomas Groß:
Cyber Security and Privacy Experiments: A Design and Reporting Toolkit. Privacy and Identity Management 2017: 243-262 - Elena Ferrari:
Identification Services for Online Social Networks (OSNs) Extended Abstract. Privacy and Identity Management 2017: 240-242 - Alexander Gabel, Ina Schiering, Sandra Verena Müller, Funda Ertas:
mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies. Privacy and Identity Management 2017: 330-345 - David Harborth, Sebastian Pape:
Privacy Concerns and Behavior of Pokémon Go Players in Germany. Privacy and Identity Management 2017: 314-329 - Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Privacy and Socially Assistive Robots - A Meta Study. Privacy and Identity Management 2017: 265-281 - Michael Hölzl, Michael Roland, René Mayrhofer:
Real-World Identification for an Extensible and Privacy-Preserving Mobile eID. Privacy and Identity Management 2017: 354-370 - Agnieszka Kitkowska, Erik Wästlund, Joachim Meyer, Leonardo A. Martucci:
Is It Harmful? Re-examining Privacy Concerns. Privacy and Identity Management 2017: 59-75 - Eleni Kosta, Igor Nai Fovino, Simone Fischer-Hübner, Marit Hansen, Charles D. Raab, Ignacio Sanchez, Diane Whitehouse:
The Smart World Revolution. Privacy and Identity Management 2017: 3-12 - Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi:
NFC Payments - Gaps Between User Perception and Reality. Privacy and Identity Management 2017: 346-353 - Sophia Kununka, Nikolay Mehandjiev, Pedro Sampaio:
A Comparative Study of Android and iOS Mobile Applications' Data Handling Practices Versus Compliance to Privacy Policy. Privacy and Identity Management 2017: 301-313 - Matthias Marx, Erik Sy, Christian Burkert, Hannes Federrath:
Anonymity Online - Current Solutions and Challenges. Privacy and Identity Management 2017: 38-55 - Ricardo Neisse, Gary Steri, Igor Nai Fovino:
Blockchain-based Identity Management and Data Usage Control (Extended Abstract). Privacy and Identity Management 2017: 237-239 - Norberto Patrignani, Diane Whitehouse, Monica Gemo:
Forget About Privacy ... or Not? Privacy and Identity Management 2017: 76-85 - Alexandr Railean, Delphine Reinhardt:
Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices. Privacy and Identity Management 2017: 132-149 - Philip Raschke, Axel Küpper, Olha Drozd, Sabrina Kirrane:
Designing a GDPR-Compliant and Usable Privacy Dashboard. Privacy and Identity Management 2017: 221-236 - Kjetil Rommetveit, Alessia Tanas, Niels van Dijk:
Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering. Privacy and Identity Management 2017: 25-37 - Chiara Sabelli, Mariachiara Tallacchini:
From Privacy to Algorithms' Fairness. Privacy and Identity Management 2017: 86-110 - Aderonke Busayo Sakpere, Anne V. D. M. Kayem:
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments. Privacy and Identity Management 2017: 170-186 - Yefim Shulman:
Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures. Privacy and Identity Management 2017: 187-204
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-10 06:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint