Direkt zur zweiten Navigationsebene, fallls vorhanden.Direkt zum Seiteninhalt
www.m-chair.de | @mchair | Imprint | Sitemap
Logo - Johann Wolfgang Goethe University Frankfurt
Deutsche Telekom Chair of Mobile Business & Multilateral SecurityDeutsche TelekomDeutsche Telekom Chair of Mobile Business & Multilateral Security

Publications


Monographs

  • Kahl, Christian (2014)
    You Create Attention to Attract Attention – Viral Marketing of Digital Music in Social Networks, Schriften zum Mobile Commerce und zur Mobilkommunikation, Band 5, Verlag Dr. Kovač, Hamburg, Germany.
    [Find it here]

  • Albers, Andreas (2010)
    Commercialisation of Context-sensitive Mobile Attention in Mobile Media Markets - Design Recommendations for Mobile Marketing Providers, Schriften zum Mobile Commerce und zum Mobilfunk, Verlag Dr. Kovač, Hamburg, Germany.
    - Buy the book on the Publisher Website (Verlag Dr. Kovač)
    - Download the PDF Version (please This email address is being protected from spambots. You need JavaScript enabled to view it. the password first)
    - Read it Online (scribd.com)

  • Hegen, Marvin (2010)
    Mobile Tagging: Potenziale von QR-Codes im Mobile Business, Diplomica Verlag, Hamburg, Deutschland.

  • Radmacher, Mike, Dr. (2010)
    Transparente mobile Empfehlungssysteme: Gestaltung und Einfluss auf die Kundenbindung mobiler Dienste, Schriften zu Mobile Commerce und zur Mobilfunkkommunikation, Hrsg. Prof. Dr. Kai Rannenberg, Verlag Dr. Kovac J., Hamburg, Deutschland

  • Weiss, Stefan (2010)
    An Information Architecture Framework for Enhancing Privacy in Social Network Applications, INTERNET - Praxis und Zukunftsanwendungen des Internets, Bd. 7, Verlag Dr. Kovac, Hamburg, Germany.
    ISBN: 978-3-8300-4976-0
    [Find it]

  • Fritsch, Lothar (2009)
    Privatsphäre per Design, In: Eigenverlag, Oslo, Norway.
    ISBN: 9788249703098
    [Find it]

  • Deuker, André (2008)
    Mobile TV. Chancen und Herausforderungen für das Marketing der Zukunft, Diplomica Verlag, Hamburg, Germany.
    ISBN: 3836663007
    [Find it]

  • Krontiris, Ioannis (2008)
    Intrusion Prevention and Detection in Wireless Sensor Networks, University of Mannheim, Mannheim, Germany.
    Download

  • Kahl, Christian (2007)
    Dynamische Visualisierung serviceorientierter Architekturen, Diplomica Verlag, Hamburg, Germany.
    ISBN: 3836654083
    [Find it]

  • Liesebach, Katja (2007)
    Semantische Netze im eLearning: Kontext- und zielgruppenspezifische Repräsentation von Lernobjekten mit Hilfe semantischer Netze, VDM Verlag Dr. Müller.
    ISBN: 3836453452

  • Figge, S. (2006)
    Innovatives Mobile Marketing - Kontextabhängige Kundenansprache mit Hilfe mobiler Portale. Kovac, Hamburg, Germany.

  • Dimitriou, T.; Krontiris, Ioannis; Nikakis, F. (2004)
    Fast and Scalable Key Establishment in Sensor Networks, In: Phoha, S. (Eds.) Invitation for submission to IEEE Monograph on Sensor Network Operations, September, IEEE Press.
    Download

  • Rannenberg, Kai (1998)
    Zertifizierung mehrseitiger IT-Sicherheit – Kriterien und organisatorische Rahmenbedingungen, In: Reihe DuD-Fachbeiträge im Verlag Vieweg, Braunschweig, Germany.
    ISBN: 3-528-05666-8
    [Find it]

[Top]


Editorships

  • Camenisch, Jan; Fischer-Hübner, Simone; Rannenberg, Kai (Eds.) (2011)
    Privacy and Identity Management for Life, Springer, Berlin Heidelberg, 2011.

    ISBN: 978-3-642-20317-6

  • Vivas, José Luis; Agudo, Isaac; Tschersich, Markus (2011)
    D3.1.2 Trust and Privacy Assurance for the Design Platform 2.
    [Find it]

  • Rannenberg, Kai; Varadharajan, Vijay; Weber, Christian (Eds.) (2010)
    Security and Privacy – Silver Linings in the Cloud, Proceedings of the 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, 20-23 September 2010, Brisbane, Australia, Springer, Heidelberg, Germany.
    ISBN: 978-3-642-15256-6
    [Find it]

  • Royer, Denis; Deuker, André; Rannenberg, Kai (Eds.) (2009)
    The Future of Identity - Challenges and Opportunities, Springer, Heidelberg, Germany.
    ISBN: 978-3-540-88480-4
    [Find it]

  • Dittrich, Klaus; König, Wolfgang; Oberweis, Andreas; Rannenberg, Kai; Wahlster, Wolfgang (Eds.) (2003)
    Informatik 2003 - Innovative Informatikanwendungen Band 2, In: Lecture Notes in Informatics, GI 2003, Bonn, Germany.

  • Dittrich, Klaus; König, Wolfgang; Oberweis, Andreas; Rannenberg, Kai; Wahlster, Wolfgang (Eds.) (2003)
    Informatik 2003 - Innovative Informatikanwendungen Band 1, In: Lecture Notes in Informatics, GI 2003, Bonn, Germany.

  • Grimm, Rüdiger; Keller, Hubert B.; Rannenberg, Kai (Eds.) (2003)
    Informatik 2003 - Mit Sicherheit Informatik, In: Lecture Notes in Informatics (LNI); Tagungsband zur Teiltagung; Bonn, Germany.

  • Kursawe, Klaus (2002) (Eds.)
    Asynchronous Group Communication, RPPDS.

[Top]


Reviewed Project Publications

  • Fatbardh Veseli, Jesus Luna, Hamza Ghani, Tsvetoslava Vateva-Gurova, Harald Zwingelberg, Katalin Storf, Felix Bieker, Daniel Deibler, Marit Hansen (2014).
    "D2.3 Benchmarking Criteria for Privacy-ABC technologies" In: Fatbardh Veseli (ed.).
    [Find it]

  • Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna (2014).
    "D3.1 Scientific comparison of ABC
    protocols - Part II: Practical comparison". In Fatbardh Veseli (ed.).
    [Find it]

  • Joerg Abendroth, Souheil Bcheri, Ioannis Krontiris, Vasiliki Liagkou, Ahmad Sabouri, Eva Schlehahn, Fatbardh Veseli, Harald Zwingelberg (2013)
    D5.2 Amendment Building Blocks of ABC Technology, 2013. In ABC4Trust deliverable.
    [Find it]

  • Deuker, André; Albers, Andreas (2011)
    Entwicklung des kontextbasierten
    Preifindungsservices, In: PREMIUM-Services Consortium (Eds.): TP: Kontextreiche Preisfindung in kontextreichen Netzen, Frankfurt, Germany.

  • Koschinat, Sascha; Bal, Gökhan; Rannenberg, Kai; Hegen, Marvin (2011)
    D6.1.2 - Economic Valuation of Identity Management Enablers, Public Deliverable of EU Project PrimeLife

    [Find it]

  • Vivas, José Luis; Agudo, Isaac; Tschersich, Markus
    D3.1.2 Trust and Privacy Assurance for the Design Platform 2.
    Find it here.

  • Deuker, André; Albers, Andreas (2010)
    Anforderungen für kontextbasierte Preisfindung im Mobile Marketing, In: PREMIUM-Services Consortium (Eds.): TP: Kontextreiche Preisfindung in kontextreichen Netzen, Frankfurt, Germany.

  • Döbelt, Susen; Ueberschär, Bernd; Pietro, Elsa; Tschersich, Markus; Heim, Stephan (2010)
    D7.1b Trial plan for the second community prototype. Deliverable of the PICOS Project.
    [Find it]

  • Albers, Andreas; Radmacher, Mike (2009)
    Bestandsaufnahme "Kontextbasierte Preisfindung", In: PREMIUM-Services Consortium (Eds.): TP: Kontextreiche Preisfindung in kontextreichen Netzen, Frankfurt, Germany.

  • Deuker, André (2009)
    D11.8: Study on Mobile Communities, In: FIDIS Deliverables, Frankfurt, Germany.
    [Find it]

  • Deuker, André (2009)
    D11.12: Mobile Marketing in the Perspective of Identity, Privacy, and Transparency, In: FIDIS Deliverables (editor and contributor), Frankfurt, Germany.
    [Find it]

  • Deuker, André; Royer, Denis (2009)
    D11.11: Next Generation Networks,
    In: FIDIS Deliverables (editor and contributor), Frankfurt, Germany.
    [Find it]

  • Koschinat, Sascha; Rannenberg, Kai; Bal, Gökhan (Eds.) (2009)
    D6.1.1 - Identity Management Infrastructure Protocols for Privacy-enabled SOA, Public Deliverable of EU Project PrimeLife, Frankfurt, Germany.
    [Find it]

  • Royer, Denis; Deuker, André (2009)
    D11.6: Survey on Mobile Identity,
    In: FIDIS Deliverables (editor and contributor), Frankfurt, Germany.
    [Find it]

  • Deuker, André (2008)
    D11.2: Mobility and LBS, In: FIDIS Deliverables (editor and contributor), Frankfurt, Germany.
    [Find it]

[Top]


Refereed Publications

  • Chehrazi, Golriz; Schmitz, Christopher; Hinz, Oliver (2015)
    QUANTSEC - Ein Modell zur Nutzenquantifizierung von IT-Sicherheitsmaßnahmen, In: Proceedings of the 12th International Conference on Wirtschaftsinformatik (WI 2015), Osnabrück, Germany.

  • Tschersich, Markus
    Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options (2015). Proceedings of 48th Hawaii International Conference on System Sciences, Pre-Proceedings.

  • Tschersich, Markus; Niekamp, Michael
    Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites (2015). Proceedings of 48th Hawaii International Conference on System Sciences, Pre-Proceedings.

  • Bal, G. (2014)
    “Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk, Trust, and Privacy Information Quality,” in ICIS 2014 Proceedings, 14-17 December 2014, Auckland, New Zealand.
    Alternative link

    [Download]

  • Bal, G. (2014).
    “Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps,” in Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), August 7-9 2014, Savannah, GA, USA.
    [Find it]

  • Bal, G., and Rannenberg, K. (2014)
    “User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps,” in Online Proceedings of the W3C Workshop on Privacy and User–Centric Controls, Berlin.
    Alternative link

    [Download]

  • Bal, G., Rannenberg, K., and Hong, J. (2014)
    “Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones,” in 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. A. El Kalam, and T. Sans (eds.),vpp. 113–126.
    [Find it]

  • Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg and Neeraj Suri (2014).
    "Towards a Framework for Benchmarking Privacy-ABC Technologies", in 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. A. El Kalam, and T. Sans (eds.), pp 197-204.
    ISBN: 978-3-642-55415-5
    [Find it]

  • Tschersich, Markus
    Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites - Analyzing the Combined Effect of Default Settings and Interface Style (2014). Data Privacy Management – 9th International Workshop, Pre-Proceedings.

  • Tschersich, Markus and Botha, Reinhardt
    "Exploring the impact of restrictive default privacy settings on the privacy calculus in social network sites" (2014). ECIS 2014 Proceedings, http://aisel.aisnet.org/ecis2014/proceedings/track14/11/ .
    [Find it]

  • Acquisti, A.; Krontiris. I.; Langheinrich, M.; Sasse, A. (2013)
    "My Life, Shared - Trust and Privacy in the Age of Ubiquitous Experience Sharing", Dagstuhl Manifestos, p. 74 - 107, vol 3, issue 7, November 2013.

  • Albers, Andreas; Krontiris Ioannis; Sonehara, Noboru; Echizen, Isao (2013)
    Coupons as Monetary Incentives in Mobile Participatory Sensing, The 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013). 25-26 April 2013, Athens, Greece.

  • Benenson, Z.; Girard, A.; Krontiris, I.; Liagkou, V.; Rannenberg, K.; Stamatiou, Y. (2013)
    "User Acceptance of Privacy-ABCs: An Exploratory Study", the 16th International Conference on Human-Computer Interaction (HCI International 2014), Heraklion, Greece, 22 - 27 June 2014.

  • Benenson, Z.; Krontiris, I.; Rannenberg, K.; Schröder, D.; Schopf, A.; Stamatiou, Y.; Liagkou, V.(2013)
    "Understanding and Using Anonymous Credentials," poster at the 9th Symposium On Usable Privacy and Security (SOUPS 2013), Newcastle, UK, July 2013.


  • Fischer-Hübner, S.; Krontiris, I:, Rannenberg, K.; Waidner, M.; Bowden, C. (2013)
    "Online Privacy: Towards Informational Self-Determination on the Internet," in Digital Enlightenment Yearbook. IOS Press, 2013.


  • Kahl, Christian; Albers, Andreas (2013)
    How to unleash the Virus -
    Social Networks as a Host for Viral Music Marketing.
    In: Proceedings of 15th IEEE Conference on Business Informatics (CBI 2013)

  • Krontiris, I.; Dimitriou, T. (2013)
    "Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications", in the 9th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), 20-23 May 2013, Cambridge, Massachusetts.

  • Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm (2013)
    The INDI Ecosystem of privacy-aware, user-centric Identity. In: Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider (Eds.), ISSE 2013 - Securing Electronic Business Processes, 45-57, Springer Fachmedien Wiesbaden.

  • Schreiber, Tobias; Deuker, André; Albers, Andreas; Neves, Mickel (2013)
    The Privacy Trade-Off: App Usage on OSN, Forthcoming: Proceedings of the 19th Americas Conference on Information Systems (AMCIS), Chicago, USA.

  • Tschersich, Markus; Botha, Reinhardt (2013)
    Understanding the Impact of Default Privacy Settings on Self-Disclosure in Social Networking Services: Building a Conceptual Model and measurement instrument. Proceedings of the 19th Americas Conference on Information Systems (AMCIS), Chicago, USA.
    [Find it]

  • Yang, Shuzhe.; Albers, Andreas (2013)
    Overcoming Information Overload in Online Reputation Management: A Systematic Literature Review. Proceedings of the 21st European Conference on Information Systems (ECIS 2013), Amsterdam, Netherlands.

  • Bal, Gökhan (2012)
    Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications (Short Paper), In: Online Proceedings of the Mobile Security Technologies Workshop (MoST 2012), San Francisco, USA.
    [Download]

  • Bjones, R.; Krontiris, I.; Paillier, P.; Rannenberg, K. (2012)
    "Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication", Annual Privacy Forum 2012, 10-11 October 2012, Limassol, Cyprus.


  • Camenisch, J.; Krontiris, I.; Lehmann, A.; Neven, G.; Paquin, C.; Rannenberg, K.; Zwingelberg, H. (2012)
    "ABC4Trust Architecture for Developers," ABC4Trust Deliverable H2.1, December 2012.

  • Deuker, André (2012)
    Friend-to-Friend Privacy Protection on Social Networking Sites: A Grounded Theory Study: 18th Americas Conference on Information Systems (AMCIS), Seattle, Washington, USA.

  • Deuker, André; Albers, Andreas (2012)
    Who Cares - Content Sharing on Social Networking Sites: Proceedings of the 16th Pacific Asia Conference on Information Systems (PACIS), Ho Chi Minh City, Vietnam.

  • Deuker, André; Rosenkranz, Christoph; Albers, Andreas (2012)
    The usage of individual privacy settings on social networking sites - Drawing desired digital images of oneself: Proceedings of the 20th European Conference on Information Systems (ECIS), Barcelona, Spain.

  • Dimitriou, T.; Krontiris, I.; Sabouri, A. (2012)
    "PEPPeR: A querier's Privacy Enhancing Protocol for PaRticipatory sensing", in the 4th International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2012), June 25-26, Frankfurt, Germany.


  • Gürses. S.; Krontiris, I.; Sabouri, A.; Pashalidis, A.; Yang, S.; Zwattendorfer, B. (2012)
    "A Privacy Policy Framework for the INDI ecosystem," GINI Deliverable D4.1, March 2012.


  • Kahl, Christian (2012)
    Create Attention to Attract Attention -
    Viral Marketing of Digital Music in Social Networks, In: Proceedings of the 18th Americas Conference on Information Systems (AMCIS 2012), Seattle, WA, USA.
    [Find it]

  • Krontiris, Ioannis; Albers, Andreas (2012)
    "Monetary Incentives in Participatory Sensing using Multi-Attributive Auctions", International Journal of Parallel, Emergent and Distributed Systems, May 2012.

  • Luna, J.; Suri,N.; Krontiris, I. (2012)
    "Privacy-by-Design Based on Quantitative Threat Modeling", in the Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), October 2012, Cork, Ireland.

  • Sabouri, A.; Krontiris, I; Rannenberg, K. (2012)
    "Attribute-based Credentials for Trust (ABC4Trust)", in the 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), Vienna, Austria, September 2012.


  • Yang, Shuzhe; Bal, Gökhan (2012)
    Balancing Security and Usability of Local Security Mechanisms for Mobile Devices, In: Proceedings of the 27th International Information Security and Privacy Conference (SEC 2012), 4-6 June 2012, Crete, Greece.

  • Albers, Andreas (2011)
    Auswirkungen der Verfügbarkeit von Kontextinformationen über mobile Nutzer auf die Vermarktung mobiler Werbeträgerleistung, Proceeding of the 10th International Conference Wirtschaftsinformatik 2011, Zurich, Swiss.

  • Camenisch, J.; Krontiris, I.; Lehmann, A.; Neven, G.; Paquin, C.; Rannenberg, K.; Zwingelberg, H. (2011)
    "D2.1 Architecture for Attribute-based Credential Technologies – Version 1", ABC4Trust Deliverable D2.1, December 2011

  • Fischer-Hübner, S.; Hoofnagle, C,; Krontiris, I.; Rannenberg, K.; Waidner, M. (2011)


  • Fritz, Marcel; Schlereth, Christian; Figge, Stefan (2011)
    Empirical evaluation of fair-use flat rate strategies for mobile Internet, Business & Information Systems Engineering, 3(5), forthcoming (The final publication is available at www.springerlink.com.

  • Fritz, Marcel; Schlereth, Christian; Figge, Stefan (2011)
    Empirische Evaluation von Fair-Use Flatrate-Strategien für das mobile Internet", Wirtschaftsinformatik, 2011(5), erscheint demnächst (die finale Fassung der Publikation ist auf www.springerlink.com verfügbar).

  • Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai (2011)
    Privacy respecting targeted advertising for social networks, In: Workshop in Information Security Theory and Practice (WISTP 11) - 5th Edition - Proceedings, 1-3 June 2011, Heraklion, Greece, Springer (2011).

  • Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai (2011)
    Profit vs. Privacy - Advanced Targeted Advertising for Social Networks. In: The 6th Mediterranean Conference on Information Systems (MCIS 2011) (Proceedings), 2011.

  • Koschinat, Sascha; Bal, Gökhan; Weber, Christian; Rannenberg, Kai (2011)
    Privacy by Sustainable Identity Management Enablers. In: Camenisch, Jan; Fischer-Hübner, Simone; Rannenberg, Kai (Eds.): Privacy and Identity Management for Life, Springer, Berlin Heidelberg, pp. 431- 452.
    Doi: 10.1007/978-3-642-20317-6_23
    ISBN: 978-3-642-20317-6
    [Find it]

  • Krontiris, I.; Dimitriou, T. (2011)
    “Scatter - Secure Code Authentication for Efficient Reprogramming in Wireless Sensor Networks,” In the International Journal of Sensor Networks, Vo. 10, Nos. 1/2, p.14-24, 2011.

  • Krontiris, I.; Leitold, H.; Posch, R.; Rannenberg, K. (2011)
    "eID Interoperability", book chapter in "Handbook of eID Security - Concepts, Practical Experiences, Technologies", Fumy, Walter and Paeschke, Manfred (eds.), Publicis Publishing, Erlangen, 2011.

  • Krontiris, I.; Maisonneuve, N. (2011)
    "Participatory Sensing: The Tension between Social Translucence and Privacy", book chapter, in "Trustworty Internet", L. Salgarelli, G. Bianchi, N. Blefari-Melazzi (Eds.), Springer, July 2011

  • Tschersich, M.; Kahl, C.; Heim, S.; Crane, S.; Böttcher, K.; Krontiris, I.; Rannenberg, K. (2011)
    Towards Privacy-enhanced Mobile Communities - Architecture, Concepts and User Trials. In: Journal of Systems and Software, Special Issue: Mobile Applications (JSS-D-11-00155R1). Elsevier, 2011.
    [Find it]
    [Download]

  • Tschersich, Markus (2011)
    Design Guidelines for Mobile Group Recommender Systems to handle inaccurate or missing Location Data. In: ACM Recommender Systems 2011 (Proceedings, forthcoming).

  • Van Alsenoy, B.; Vandezande, N.; Janssen, K.; Kuczerawy, A.; Kindt, E.; Dumortier, J.; Leitold, H.; Zwattendorfer, B.; Krontiris, I. (2011)
    "Legal provisions for deploying INDI services", GINI-SA Deliverable D3.1, October 2011.

  • Deuker, André (2010)
    Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services, in: M. Bezzi et al. (Eds.): Privacy and Identity Management for Life, IFIP AICT 320, Nice/France, 7-14 September 2009. (Revised Selected Papers), Springer, 2010.

  • Giannetsos, T.; Krontiris, Ioannis; Dimitriou, T.; Prasad, N.R. (2010)
    Arbitrary Code Injection through Self-propagating Worms, In: Von Neumann "Architecture Devices", The Computer Journal, Special Issue on Algorithms, Protocols, and Future Applications of Wireless Sensor Networks. Oxford University Press, United Kingdom.
    Download

  • Kahl, Christian; Albers, Andreas (2010)
    Towards reasonable Revenue Streams through Marketing in Mobile Social Networks, In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI), Göttingen, Germany.

  • Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai (2010)
    How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project, In: Proceedings of 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud (IFIP SEC 2010), 20-23 September 2010, Brisbane, Australia, Springer (2010).
    ISBN: 978-3642152566
    Download (pdf)

  • Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai (2010)
    Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project, In: Di Nitto, Elisabetta; Yahyapour, Ramin (Eds.): Towards a Service-Based Internet - Third European Conference, ServiceWave 2010 (Proceedings), Ghent, Belgium, December 13-15, 2010, Springer 2010.
    ISBN: 978-3-642-17693-7
    [Find it]

  • Krontiris, Ioannis; Albers, Andreas; Rannenberg, Kai (2010)
    W3C Geolocation API calls for Better User Privacy Protection, W3C Workshop on Privacy for Advanced Web APIs, London, UK.
    Download

  • Krontiris, Ioannis; Freiling, Felix (2010)
    Integrating People-centric Sensing with Social Networks: A privacy Research Agenda, In: the IEEE International Workshop on Security and Social Networking (SESOC 2010) held with PerCom 2010, Mannheim, Germany.
    Download

  • Krontiris, Ioannis; Freiling, Felix (2010)
    Urban Sensing through Social Networks: The Tension between Participation and Privacy, In the International Tyrrhenian Workshop on Digital Communications (ITWDC), Island of Ponza, Italy, September 2010. (invited paper)
    Download

  • Krontiris, Ioannis; Freiling, Felix; Dimitriou, Tassos (2010)
    "Location Privacy in Urban Sensing Networks: Research Challenges and Directions", in IEEE Wireless Communications Magazine, Vol.17, No.5, p.30-35, October 2010.
    Download

  • Rannenberg, Kai; Kahl, Christian; Böttcher, Katja (2010)
    Communities, Mobilität und Datenschutz. Innovative Konzepte zum Schutz der Privatsphäre im Projekt PICOS, In: Forschung Frankfurt 1-2010, Frankfurt, Germany.
    ISBN: ISSN: 0175-0992
    [Find it]

  • Royer, Denis (2010)
    Development of a theoretical Model for Explaining and Predicting the Impacts of Enterprise Identity Management Introductions
    In: Accepted for publication at: 18th European Conference on Information Systems (ECIS 2010), Pretoria,South Africa.

    [Find it]

  • Bal, Gökhan; Kuntze, N.; Schmidt, AU (2009)
    Injecting trust to cryptographic Key Management, In: Proceedings of the The 11th International Conference on Advanced Communication, Technology (ICACT 2009), Feb. 2009, Phoenix Park, Korea.

  • Crespo, A.; Mendez, R.; Liesebach, Katja (2009)
    Climbing towards trust and privacy management in social mobile communities, In: W3C Workshop on the Future of Social Networking Proceedings, W3C, Barcelona, Spain.

  • Franz, E.; Liesebach Katja (2009)
    Supporting Local Aliases as Usable Presentation of Secure Pseudonyms, In: 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus´09), Linz, Austria.

  • Hegen, Marvin (2009)
    Good bye Medienbruch – Wie Mobile Tagging die Welt verknüpft und das Handy zum Barcodescanner wird, Wirtschaftsinformatik und Management (04/2009) pp. 24-28.

  • Krontiris, Ioannis (2009)
    Sensor Networks Security for Pervasive Healthcare, In: Coronato, A.; De Pietro, G. (Eds.) "Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools", IGI Global.
    ISBN: 978-1615207657

  • Royer, Denis; Deuker, André; Rannenberg, Kai (2009)
    Mobility and Identity, In: Rannenberg, Kai; Royer, Denis; Deuker, André (Eds.): The Future of Identity - Challenges and Opportunities, Springer, Heidelberg, Germany.
    ISBN: 3-540-88480-07
    [Find it]

  • Royer, Denis; Meints, Martin (2009)
    Enterprise Identity Management - Towards a Decision Support Framework based on the Balanced Scorecard Approach, In: Business & Information Systems Engineering (BISE) (1:3), ISSN 1867-0202, pp.245-253. Also available in German in: Wirtschaftsinformatik (WI) (51:3), ISSN 0937-6429, pp.284-294.
    ISBN: 1867-0202
    [Find it]

  • Royer, Denis; Rannenberg, Kai (2009)
    Open Challenges – Towards the (Not So Distant) Future of Identity, In: Rannenberg, Kai; Royer, Denis; Deuker, André (Eds.): The Future of Identity - Challenges and Opportunities, Springer, Heidelberg, Germany.
    ISBN: 978-3-540-88480-4
    [Find it]

  • Scherner, Tobias; Muntermann, Jan; Roßnagel, Heiko (2009)
    Integrating Value-Adding Services into an Emergency Management System for Tourist Destinations, In: Proceedings of the 17th European Conference on Information Systems (ECIS), Verona, Italy.
    [Find it]

  • Weiss, Stefan (2009)
    Privacy Threat Model for Data Portability in Social Network Applications,
    In: International Journal of Information Management, August 2009, (29:4), pp. 249-254, Elsevier Ltd.

  • Albers, Andreas; Kahl, Christian (2008)
    Prototypical Implementation of an Intermediary Platform for Context-sensitive Mobile Marketing Applications, Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Canada.

  • Albers, Andreas; Kahl, Christian (2008)
    Design and Implementation of context-sensitive Mobile Marketing Platforms, In: Proceedings of 10th IEEE Conference on E-Commerce Technology (CEC’ 08), Crystal City, Washington DC, USA.

  • Deuker, André; Radmacher, Mike (2008)
    Multicast and Individual Service Provisioning in Mobile TV,
    In: Proceedings of 10th IEEE Conference on E-Commerce Technology (CEC'08), pp. 261-266, Crystal City, Washington DC, USA.

  • Deuker, André; Radmacher, Mike (2008)
    Individualisierungsmöglichkeiten im Mobile TV - Ein werbebasierter Geschäftsmodellansatz, In: Proceedings der 3. Konferenz Mobile und Ubiquitäre Informationssysteme (MMS 2008), Lecture Notes in Informatics (LNI), Gesellschaft für Informatik GI, pp. 39-52, Munich, Germany.

  • Groth, Sven; Muntermann, Jan (2008)
    A Text Mining Approach to Support Intraday Financial Decision-Making, In: Proceedings of the Fourteenth Americas Conference on Information Systems (AMCIS), Toronto, Canada.
    [Find it]

  • Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos (2008)
    Privacy issues in location based services - Legal considerations on privacy-enhancing Location Based Services using PRIME technology, In: Computer Law & Security Report (24:2), pp.137-146.

  • Krontiris, Ioannis; Giannetsos, T.; Dimitriou, T.; Freiling, F.C. (2008)
    Intrusion Detection in Wireless Sensor Networks, In: Zhang, Yan; Kitsos, Paris “Security in RFID and Sensor Networks”, Auerbach Publications, CRC Press, Taylor&Francis Group.
    ISBN: 978-1420068399

  • Meints, Martin; Royer, Denis (2008)
    Der Lebenszyklus von Identitäten, In: Datenschutz und Datensicherheit (DuD) (32:3), ISSN 0724-4371, pp.201.
    ISBN: 0724-4371
    [Find it]

  • Radmacher, Mike (2008)
    A Procedure of How to conduct Research in Transparent Mobile Recommendations, pp. 49–60, (Eds.) Oya, M.; Uda, R.; Yasunobu, C., In: IFIP International Federation for Information Processing, Volume 286, Towards Sustainable Society on Ubiquitous Networks, Springer, Tokyo, Japan.

  • Radmacher, Mike (2008)
    Design Criteria for Transparent Mobile Event Recommendations, In: Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Ontario, Canada.

  • Radmacher, Mike (2008)
    Adaptive Customer Profiles For Context Aware Services in a Mobile Environment, In: Wang, W. (Eds.) IFIP International Federation for Information Processing, Volume 251, Integration and Innovation Orient to E-Society Volume 1, pp. 390-399, Spring, Bosten, Wuhan, China.

  • Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai (2008)
    Identitätsmanagement und Privatsphäre. Vertrauen und Kontrolle in Mobilen Contentumgebungen, In: Prozessgestaltung in der Medienproduktion. Neue Geschäftsmodelle und Technologien für Mobile Portale und HD Broadcast, GITO Verlag, Berlin, Germany.

  • Roßnagel, Heiko; Zibuschka, Jan (2008)
    Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen, In: Sicherheit 2008 - 4. Jahrestagung Fachbereich Sicherheit der Gesellschaft für Informatik , Alkassar, A. and Siekmann, J. (Eds.), Lecture Notes in Informatics (LNI), Saarbrücken, Germany.

  • Royer, Denis (2008)
    Ganzheitliche Bewertung von Enterprise Identity Management Systemen – Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterstützungsinstrument, In: Sicherheit 2008 - 4. Jahrestagung Fachbereich Sicherheit der Gesellschaft für Informatik , Alkassar, A. and Siekmann, J. (Eds.), Lecture Notes in Informatics (LNI), pp.449-460, Saarbrücken, Germany.
    [Find it]

  • Royer, Denis (2008)
    Enterprise Identity Management – What’s in it for Organisations?, In: Fischer-Huebner, S.; Duquenoy, P.; Zuccato, A.; Martucci, L. (eds.), Proceedings of the IFIP/FIDIS Summer School on "The Future of Identity in the Information Society", Karlstad, 4-8 August 2007, Springer, pp. 403-416, Karlstad, Sweden.
    [Find it]

  • Royer, Denis (2008)
    Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach, In: Weippl, E. R.; Quirchmayr, G.; Slay, J. (Eds.), Proceedings of the 3rd International Conference on Availability, Reliability and Security (“ARES 2008 – The International Dependability Conference”), IEEE Publishing, pp.779-786, Barcelona, Spain.
    [Find it]

  • Royer, Denis; Meints, Martin (2008)
    Planung und Bewertung von Enterprise Identity Managementsystemen, In: Datenschutz und Datensicherheit (DuD) (32:3), ISSN 0724-4371, pp.189–193.
    ISBN: 0724-4371
    [Find it]

  • Scherner, Tobias; Muntermann, Jan (2008)
    Sustainable Growth for the Pacific-Asia Tourism Industry: Addressing Natural Disasters and Business Opportunities with Mobile ICT, In: Proceedings of the 12th Pacific-Asia Conference on Information Systems (PACIS 2008), Suzhou, China.

  • Weiss, Stefan (2008)
    Privacy Threat Model for Data Portability in Social Network Applications, In: Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Ontario, Canada.

  • Weiss, Stefan (2008)
    Using the Concept of Topic Maps for Enhancing Information Privacy in Social Networking Applications, In: Ammar Alkassar, Jörg Siekmann (Eds.), Lecture Notes in Informatics (LNI), Gesellschaft für Informatik GI, pp.85-96, Saarbrücken, Germany; Sicherheit 2008 - Sicherheit, Schutz und Zuverlässigkeit, April 2-4, Saarbrücken, Germany.

  • Zibuschka, Jan; Roßnagel, Heiko (2008)
    Implementing Strong Authentication Interoperability with Legacy Systems, In: Policies and Research in Identity Management - First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), Rotterdam, Netherlands.

  • Albers, Andreas (2007)
    Allokation und Bepreisung kontextbezogener Kundenkontakte im Mobile Marketing, 8th International Conference Wirtschaftsinformatik (WI 2007), Karlsruhe, Germany.

  • Albers, Andreas (2007)
    An Electronic Market Framework for context-sensitive Mobile Consumer Profiles in the Marketing Domain, Proceedings of the 13th Americas Conference on Information Systems (AMCIS), Keystone, CO, USA.

  • Borcea-Pfitzmann, K.; Hansen, M.; Liesebach, Katja; Pfitzmann, A.; Steinbrecher, S.(2007)
    Managing One, Datenschutz und Datensicherheit, 9, 2007.

  • Borcea-Pfitzmann, K.; Liesebach, Katja (2007)
    The concept of workspaces - re-defined for eLearning, In: Advanced Technology for Learning (ATL) International Journal, Special Issue on Technology for Collaborative Learning (4:1).

  • Eicker, Stefan; Spies, Thorsten; Kahl, Christian (2007)
    Software Visualization in the Context of Service-Oriented Architectures, In: Proceedings of the 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis (Vissoft2007), Banff, Canada.

  • Eicker, Stefan; Spies, Thorsten; Kahl, Christian (2007)
    Softwarevisualisierung im Kontext serviceorientierter Architekturen, In: ICB Research Report No 13, Universität Duisburg-Essen, Essen, Germany.
    ISBN: 1860-2770
    [find it]

  • Fritsch, Lothar (2007)
    Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering, In: Journal of Theoretical and Applied E-Commerce research (2:3), pp. 1-17.

  • Kohlweiss, Markulf; Gedrojc, Bartek; Fritsch, Lothar; Preneel, Bart (2007)
    Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker, In: Proceedings of the 7th workshop on Privacy-enhancing technology, Ottawa, Canada.

  • König, Wolfgang; Fritsch, Lothar (2007)
    Innovationsförderung im öffentlichen Umfeld durch Public Private Partnerships - Das Beispiel der Satellitennavigation, In: Wirtschaftsinformatik 2007/2, pp.77-79, Frankfurt, Germany.
    [Download]

  • Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos (2007)
    Privacy-enhancing user-friendly Identity Management for Location Based Services using PRIME technology – A legal discussion, In: Cyberlaw Security & Private, The Second International Conference on Legal, Security and Privacy Issues in Information Technology (LSPI), Beijing, China.

  • Krontiris, Ioannis; Dimitriou, T. (2007)
    Secure Network Programming in Wireless Sensor Networks, In: Xiao, Yang; Pan, Yi (Eds.) “Security in Distributed and Networking Systems”, World Scientific Publishing Co.
    ISBN: 978-9812708076

  • Krontiris, Ioannis; Dimitriou, T.; Salajegheh, M.; Soroush, H. (2007)
    WSN Link-Layer Security Frameworks, In: Zhou, Joanying; Lopez, Javier (Eds.) “Wireless Sensors Networks Security”,IOS Press.
    ISBN: 978-1586038137
    Download

  • Muntermann, Jan (2007)
    Event-driven Mobile Financial Information Services – Design of an Intraday Decision Support System, In: Gabler / DUV.
    [Find it]

  • Muntermann, Jan; Güttler, André (2007)
    Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case, In: Journal of International Financial Markets, Institutions and Money (17:1), pp.1-24.

  • Nickerson, Robert C.; Varshney, Upkar; Muntermann, Jan; Isaac, Henri (2007)
    Towards a Taxonomy of Mobile Applications, In: Proceedings of the 13th Americas Conference on Information Systems (AMCIS 2007), Keystone, Colorado, USA.

  • Radmacher, Mike (2007)
    Elicitation of Profile Attributes by Transparent Communication, In: Proccedings of ACM Recommender Systems 2007, pp. 199-202, Minneapolis, Minnesota, USA.

  • Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai (2007)
    Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen, In: Proceedings of the 8th International Conference Wirtschaftsinformatik (WI), Karlsruhe, Germany.

  • Roßnagel, Heiko (2007)
    Sichere Mobile Finanzdienstleistungen, In: digma. Zeitschrift für Datenrecht und Informationssicherheit (7:1), pp.12-15.

  • Roßnagel, Heiko; Hinz, Oliver (2007)
    Zahlungsbereitschaft für elektronische Signaturen, In: in A. Oberweis, C. Weinhardt, H. Gimpel, A. Koschmider, V. Pankratius und B. Schnizler (Eds.), Wirtschaftsinformatik 2007 - eOrganisation: Service-, Prozess-, Market-Engineering, 8. Internationale Tagung Wirtschaftsinformatik , Universitätsverlag, Karlsruhe, Germany.

  • Roßnagel, Heiko; Zibuschka, Jan (2007)
    Integrating Qualified Electronic Signatures with Password Legacy Systems, In: Digital Evidence Journal (4:1), p.5-11, Pario Comm. Ltd..

  • Royer, Denis (2007)
    Enterprise Identity Management – What’s in it for Organisations?, In: Pre-Proceedings Third IFIP / FIDIS Summer School 2007, Karlstad, Sweden.
    [Find it]

  • Scherner, Tobias (2007)
    Enabling Efficient and Privacy-friendly Location-based Services with Standardized Intermediary Infrastructures, In: Forthcoming in the Proceedings of the 13th Americas Conference on Information Systems, Keystone, USA August 09th-12th 2007, Keystone, Colorado, USA.

  • Weiss, Stefan (2007)
    The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications, In: Post-Proceedings: The Future of Identity in the Information Society ; Third International Summer School organized by IFIP WG 9.2, 9.6/11.7, 11.6 in cooperation with FIDIS Network of Excellence, Karlstad, Sweden.
    [Find it]

  • Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai (2007)
    Privacy-Friendly LBS: A Prototype-supported Case Study, In: Proceedings of the 13th Americas Conference on Information Systems, 9-12 August 2007, Keystone, CO, USA.

  • Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai (2007)
    Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning, In: Proceedings of the 22nd IFIP TC-11 International Information Security Conference, 14-16 May 2007, Sandton, South Africa.

  • Zibuschka, Jan; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai (2007)
    Empowering LBS Users: Technical, Legal and Economic Aspects , In: Proceedings of the eChallenges conference 2007, 24-26 October 2007, The Hague, Netherlands.

  • Borcea-Pfitzmann, K.; Hansen, M.; Liesebach, Katja; Steinbrecher, S.; Pfitzmann, A. (2006)
    What User-Controlled Identity Management Should Learn from Communities, In: Technical Report (11:3), pp.119-128.

  • Deng, Mina; Fritsch, Lothar; Kursawe, Klaus (2006)
    Personal Rights Management - Taming camera-phones for individual privacy enforcement, In: Proceedings of the 6th workshop on Privacy-enhancing technology, Cambridge, United Kingdom.

  • Dimitriou, T.; Krontiris, Ioannis (2006)
    Secure In-Network Processing in Sensor Networks: In: Xiao, Yang “Security in Sensor Networks”, CRC Press.
    ISBN: 978-0849370588
    Download

  • Dimitriou, T.; Krontiris, Ioannis (2006)
    GRAViTy: Geographic Routing Around Voids, In: the International Journal of Pervasive Computing and Communications, Special Issue on “Key Technologies and Applications of Wireless Sensor and Body-area Networks”.
    Download

  • Dimitriou, T.; Krontiris, Ioannis; Nikakis, F. (2006)
    Fast and Scalable Key Establishment in Sensor Networks, In: Phoha, Shashi (Eds.); La Porta, Thomas F.; Griffin, Christopher “Sensor Network Operations”, pp.557-570, Wiley-IEEE Press.
    ISBN: 978-0471719762

  • Figge, Stefan; Theysohn, Sven (2006)
    Quantifizierung IKS-basierter Marktleistungen - Analyse eines werbefinanzierten Geschäftsmodells für den Mobile Commerce
    In: WIRTSCHAFTSINFORMATIK 48 (2), S. 96-106.
    Category: Publication in scientific journal [protected Download]
    Password protected due to former publication, please contact the author
    Reference No. 2006-62


  • Franz, E.; Liesebach, Katja; Borcea-Pfitzmann, K. (2006)
    Privacy-Aware User Interfaces within Collaborative Environments, In: CAI’06: Proceedings of Context in Advanced Interfaces – International Workshop in conjunction with AVI 2006, Venice, May 2006, pp. 45-48.

  • Fritsch, Lothar (2006)
    Der Rüstungswettlauf um das elektronische Geld, In: Geld oder Leben - vom historischen Postkutschenraub zum virtuellen Bankraub, Katalog zur Ausstellung des Museums für Kommunikation, Frankfurt, Germany.

  • Fritsch, Lothar; Roßnagel, Heiko (2006)
    Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht,
    In: Matthias Fluhr: Kontaktbehaftet oder kontaktlos: auf jeden Fall Sicherheit: Tagungsband OmniCard, Berlin, Germany.

  • Fritsch, Lothar; Scherner, Tobias; Rannenberg, Kai (2006)
    Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur, In: PIK - Praxis der Informationsverarbeitung und Kommunikation, Mannheim, Germany.

  • Muntermann, Jan; Milic Frayling, Natasa (2006)
    Enhancing Asynchronous User Communication with Cross Platform and Channel Agnostic Messaging Services, In: Proceedings of the 12th Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico.
    [Find it]

  • Muntermann, Jan; Roßnagel, Heiko (2006)
    Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures, In: Journal of Information System Security (JISSec) (2:1), pp.27-43.

  • Roßnagel, Heiko (2006)
    On Diffusion and Confusion - Why Electronic Signatures Have Failed, In: Proceedings of the 3rd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 06), Springer LNCS 4083, pp.71-80, Krakow, Poland.

  • Roßnagel, Heiko; Royer, Denis (2006)
    Wirtschaftlichkeit mobiler qualifizierter Signaturen im E-Government, In: C. Hochberger and R. Liskowsky (Eds.), Informatik 2006 - Informatik für Menschen - Band 2 - Beiträge der 36. Jahrestagung der Gesellschaft für Informatik, October 6th, Dresden, Germany; Lecture Notes in Informatics, pp.451-459., Dresden, Germany.

  • Roßnagel, Heiko; Scherner, Tobias (2006)
    Secure Mobile Notifications of Civilians in Case of a Disaster, In: Proceedings of the 10th IFIP Open Conference on Communication and Multimedia Security (IFIP CMS 06), Springer LNCS 4237, pp. 33-42, Heraklion, Crete, Greece.

  • Roßnagel, Heiko; Zibuschka, Jan (2006)
    Single Sign On mit Signaturen - Integration von elektronischen Signaturen und Passwortsystemen, In: Datenschutz und Datensicherheit (DuD) (30:12), p.773-777, Vieweg & Sohn, Wiesbaden, Germany.

  • Royer, Denis; Deuker, André (2006)
    Komplexe Kommunikation - Der Einsatz von TYPO3 für Forschungsprojekte, In: T3N: Magazin für Open Source und TYPO3, No.1, Hannover, Germany.
    [Find it]

  • Royer, Denis; Rannenberg, Kai (2006)
    Mobilität, mobile Technologie und Identität, In: Datenschutz und Datensicherheit (DuD) (30:9), pp. 571–575, ISSN 0724-4371.
    ISBN: 0724-4371
    [Find it]

  • Scherner, Tobias (2006)
    Privacy as an enabler for new communities - an example of a leisure-time community, In: 3rd FIDIS Doctoral Consortium: Identity Management & Mobility in Practice, Stockholm, Långholmen, Sweden.

  • Scherner, Tobias; Zibuschka, Jan; Rannenberg, Kai (2006)
    Präsentation: Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen, u. a. Ad-hoc Networking, In: DIN Workshop Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen, u.a. Ad-hoc Networking, Berlin, Germany.

  • Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai (2006)
    Towards a Unified Interface for Privacy Regulation-conformant Location-based Services, In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy.
    [Find it]

  • Albers, Andreas; Figge, Stefan; Hochstatter, Iris; Kaspar, Christian; et al. (2005)
    Mobile Anwendungen - Best Practices in der TIME-Branche, In: Hess, Thomas; Hagenhoff, Svenja; Hogrefe, Dieter; Linnhoff-Popien, Claudia; Rannenberg, Kai; Straube, Frank (Eds.) Universitätsverlag Göttingen, Göttingen, Germany.

  • Albers, Andreas; Figge, Stefan; Radmacher, Mike (2005)
    LOC3 - Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures, Proceedings of 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS'05), Munich, Germany.

  • Borcea, K.; Donker, H.; Franz, E.; Liesebach, Katja; Pfitzmann, A.; Wahrig, H. (2005)
    Intra-application Partitioning of Personal Data, In: Workshop Proceedings of PEP 2005, Edinburgh, United Kingdom.

  • Borcea-Pfitzmann, K.; Liesebach, Katja; Pfitzmann, A. (2005)
    Establishing a Privacy-Aware Collaborative eLearning Environment, In: Proceedings of the EADTU Annual Conference 10-11 Nov, Rome, Italy.

  • Borcea-Pfitzmann, K.; Liesebach, Katja; Wahrig, H. (2005)
    Das Workspace-Konzept - neu verpackt im eLearning!, In: Proceedings of the 2nd „Workshop Structured eLearning“, Pre-Conference zur DeLFI 2005 und GMW05, Sep 13-16, Rostock, Germany.

  • Deng, Mina; Fritsch, Lothar; Kursawe, Klaus (2005)
    Personal Rights Management - enabling privacy rights in digital online content, In: Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Lecture Notes on Computer Science (LNCS) 3677, Springer, Salzburg, Austria.

  • Figge, Stefan; Albers, Andreas (2005)
    Individualising M-Commerce Services by Semantic User Situation Modelling, In: Proceedings of the 7th International Conference Wirtschaftsinformatik 2005, Bamberg, Germany.

  • Fritsch, Lothar; Muntermann, Jan (2005)
    Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location Based Service-Angeboten, In: Proceedings der 5. Konferenz Mobile Commerce Technologien und Anwendungen, Lecture Notes on Informatics (LNI), Gesellschaft für Informatik GI, Augsburg, Germany.
    [Download]

  • Fritsch, Lothar; Rannenberg, Kai (2005)
    Mobile Goverment, In: Rechtshandbuch E-Government der Deutschen Gesellschaft f. Recht & Informatik, Verlag Otto Schmidt, Düsseldorf, Germany.

  • Fritsch, Lothar; Roßnagel, Heiko; Schwenke, Matthias; Stadler, Tobias (2005)
    Die Pflicht zum Angebot anonym nutzbarer Dienste - Eine technische und rechtliche Zumutbarkeitsbetrachtung,
    In: Datenschutz und Datensicherheit (DuD) (29:10), pp.592-596, Wiesbaden, Germany.
    [Download]

  • Fritsch, Lothar; Scherner, Tobias (2005)
    Schutz der Privatsphäre wahren: Sichere Bevölkerungswarnung per Handy, In: WIK - Zeitschrift für Sicherheit in der Wirtschaft Nr.3, Ingelheim, Germany.


  • Fritsch, Lothar; Scherner, Tobias (2005)
    A Multilaterally Secure, Privacy-Friendly Location-based Service for Disaster Management and Civil Protection, In: Proceedings of the AICED/ICN 2005 (Springer Lecture Notes on Computer Science LNCS 3421 - pp. 1130-1137), Saint Gilles, La Réunion, France.
    [Find it]

  • Fritsch, Lothar; Stephan, Kerstin; Grohmann, Alexander (2005)
    Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle,
    In: Virtuelle Organisation und Neue Medien 2005 - Workshop "Gemeinschaften in neuen Medien" (GeNeMe), Dresden, Germany.
    [Download]

  • Hess, Thomas; Kaspar, Christian; Rauscher, Barbara; Figge, Stefan; et al., (2005)
    Technische Möglichkeiten und Akzeptanz mobiler Anwendungen - Eine interdisziplinäre Betrachtung
    In: WIRTSCHAFTSINFORMATIK 47 (1)
    Category: Publication in scientific journal [protected Download]
    Password protected due to former publication, please contact the author
    Reference No. 2005-57

  • Koelsch, Tobias; Fritsch, Lothar; Kohlweiss, Markulf; Kesdogan, Dogan (2005)
    Privacy for Profitable Location Based Services, In: Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing, Lecture Notes on Computer Science (LNCS 3450), pp.164-179, Springer, Boppard, Germany.
    [Find it]

  • Liesebach, Katja (2005)
    Kontext- und zielgruppenspezifische Repräsentation von Lernmaterialien mit Hilfe von semantischen Netzen, In: Proceedings of 3. Deutsche e-Learning Fachtagung Informatik der Gesellschaft für Informatik (DeLFI 2005) in conjunction with 10. Europäischen Jahrestagung der Gesellschaft für Medien in der Wissenschaft (GMW05), Sep 13-16, Rostock, Germany.

  • Lippmann, Silvia; Roßnagel, Heiko (2005)
    Geschäftsmodelle für signaturgesetzkonforme Trust Center, In: O.K. Ferstl, E.J. Sinz, S. Eckert, T. Isselhorst: Wirtschaftsinformatik 2005 - eEconomy, eGovernment, eSociety, Tagungsband der 7. internationalen Tagung Wirtschaftsinformatik, Physica Verlag, Bamberg, Germany.
    [Download]

  • Muntermann, Jan (2005)
    Automated Mobile Alerting Services - Towards A Level Playing Field in the Financial Community, In: Journal of Electronic Commerce Research (JECR) (6:3).
    [Find it]

  • Muntermann, Jan; Janssen, Lars (2005)
    Assessing Customers’ Value of Mobile Financial Information Services – Empirical-based Measures, In: Proceedings of the International Conference on Information Systems (ICIS 2005), Las Vegas, USA.

  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai (2005)
    Mobile Brokerage Infrastructures - Capabilities and Security Requirements, In: Proceedings of the 13th European Conference on Information Systems (ECIS 2005), 26-28 May 2005, Regensburg, Germany.
    [Find it]

  • Murmann, Tobias; Roßnagel, Heiko (2005)
    Sicherheitsanalyse von Betriebssystemen für Mobile Endgeräte, In: Hannes Federrath (Eds.): SICHERHEIT 2005, Sicherheit - Schutz und Zuverlässigkeit: Beiträge der 2.Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Lecture Notes on Informatics (LNI), pp.129-139, Regensburg, Germany.
    [Download]

  • Pisko, Evgenia; Rannenberg, Kai; Roßnagel, Heiko (2005)
    Trusted Computing in Mobile Platforms - Players, Usage Scenarios, and Interests, In: Datenschutz und Datensicherheit (DuD) (29:9), pp. 526-530.
    [Download]

  • Rannenberg, Kai; Albers, Andreas; Figge, Stefan; Radmacher, Mike; Roßnagel, Heiko (2005)
    Mobile Commerce – Forschungsfragen am Scheideweg der Mobilfunkgenerationen, In: Proceedings for 5. Konferenz Mobile Commerce Technologien und Anwendungen (MCTA05), 31. January - 2. February 2005, Augsburg, Germany.

  • Rannenberg, Kai; Schneider, Ingo; Figge, Stefan (2005)
    Mobile Systeme und Anwendungen - Editorial zum Schwerpunktheft, In: WIRTSCHAFTSINFORMATIK (47:1).

  • Roßnagel, Heiko; Fritsch, Lothar (2005)
    Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht,
    In: Hannes Federrath: SICHERHEIT 2005, Sicherheit - Schutz und Zuverlässigkeit: Beiträge der 2.Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Lecture Notes on Informatics (LNI), pp.315 - 327, Regensburg, Germany.
    [Download]

  • Roßnagel, Heiko; Murmann, Tobias (2005)
    How Secure are Current Mobile Operating Systems?, In: D. Chadwick, B. Preneel: Communications and Multimedia Security, Proceedings of the 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Windermere, United Kingdom.
    [Download]

  • Roßnagel, Heiko; Royer, Denis (2005)
    Profitability of Mobile Qualified Electronic Signatures, In: The Ninth Pacific Asia Conference on Information Systems, Bangkok, Thailand.
    [Find it]

  • Roßnagel, Heiko; Royer, Denis (2005)
    Investing in security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators? ,In: Proceedings of the Eleventh Americas Conference on Information Systems (AMCIS 2005), Omaha, Nebraska, USA.
    [Find it]

  • Roßnagel, Heiko; Royer, Denis (2005)
    Making Money with Mobile Qualified Electronic Signatures, In: S. Katsikas; J. Lopez; G. Pernul: Trust, Privacy, and Security in Digital Business. Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 05), Springer LNCS 3592, pp.110-118, Copenhagen, Denmark.
    [Find it]

  • Royer, Denis (2005)
    How to cope with complexity: The usage of Typo3 for Research Projects, In: Proceedings of the 1st International TYPO3 Conference, Karlsruhe, Germany.
    [Find it]

  • Scherner, Tobias; Fritsch, Lothar (2005)
    Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure, Economic, and Mobile Infrastructure,
    In: Proceedings of the Eleventh Americas Conference on Information Systems (AMCIS 2005), pp.1611-1619, Omaha, Nebraska, USA.

  • Figge, Stefan (2004)
    Situation-dependent services - a challenge for mobile network operators
    In: Journal of Business Research - Mobility and Markets: Emerging Outlines of M-Commerce. Volume 57, Issue 12, p. 1416-1422
    Category: Publication in scientific journal [Find it]
    Reference No. 2004-1

  • Figge, Stefan; Rannenberg, Kai (2004)
    Inviting New Players to the Multimedia M-Commerce - An approach to enhance the current M-Commerce business model with regard to emerging DVB-T networks, In: Lawrence, E.; Pernici, B.; Krogstie, J. (Eds.) Mobile Information Systems; Spinger, New York, USA.
    [Find it]

  • Fritsch, Lothar; Roßnagel, Heiko (2004)
    SIM-based Mobile Electronic Signatures: Enabling M-Business with Certification on Demand, In: Card Forum International (8:1), Lüneburg, Germany.
    [Download]

  • Günnewig, Dirk; Rannenberg, Kai; Sadeghi, Ahmad-Reza; Stüble, Christian (2004)
    Trusted Computing Platforms – Zur technischen und industriepolitischen Situation und Vorgehensweise, In: Christian Koenig, Andreas Neumann, Tobias Katzschmann: Trusted Computing – Technik, Recht und gesellschaftspolitische Implikationen vertrauenswürdiger Systemumgebungen, 2004, pp. 154-162, Verlag Recht und Wirtschaft GmbH, Heidelberg, Germany.
    ISBN: 3-8005-1341-2
    [Find it]

  • Lindner, Thomas; Fritsch, Lothar; Rannenberg, Kai (2004)
    Exploitation of Public and Private WiFi Coverage for New Business Models, In: Proceedings of the 4th IFIP Conference on E-Commerce, E-Business, and E-Government (I3E) 2004, IFIP 18th World Congress, 22-27 August 2004, Toulouse, France.
    [Find it]

  • Muntermann, Jan (2004)
    Notifying Investors in Time - A Mobile Information System Approach, In: Proceedings of the Tenth Americas Conference on Information Systems (AMCIS2004), New York, USA; also published under Deutsche Bank Research/eResearch - Window to e-Academia.
    [Find it]

  • Muntermann, Jan; Güttler, André (2004)
    Mobile Financial Information Services: Capabilities of Suitable Push Services, In: Proceedings of the Eighth Pacific-Asia Conference on Information Systems (PACIS 2004), July, Shanghai, China.
    [Find it]

  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai (2004)
    Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen, In: Jan von Knop, Wilhelm Haverkamp, Eike Jessen (Eds.) E-Science und GRID, Ad-hoc-Netze und Medienintegration; Proceedings der 18. DFN-Arbeitstagung über Kommunikationsnetze, 2-4 Juni 2004, Düsseldorf, P-55 in Lecture Notes in Informatics (LNI), pp. 361-376., GI, Bonn, Germany.
    [Find it]

  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai (2004)
    Mobile Financial Information Services, Security and Certification, In: Post-Proceedings of the CSES 2004 2nd International Workshop on Certification and Security in Inter-Organizational E- Services, IFIP 18th World Computer Congress 2004, August 26-27, 2004; Toulouse, France.
    [Find it]

  • Rannenberg, Kai (2004)
    Identity management in mobile cellular networks and related applications, Information Security Technical Report (9:1), pp. 77–85, Elsevier Sciences, ISSN 1363-4127.
    ISBN: 1363-4127
    [Find it]

  • Roßnagel, Heiko (2004)
    Enabling Mobile Qualified Electronic Signatures with Certification on Demand, In: Information Security Bulletin (9:6).
    [Download]

  • Roßnagel, Heiko (2004)
    Mobile Qualified Electronic Signatures for Secure Mobile Brokerage, In: Proceedings of the 4th International Cyprus Information Security Conference & Workshops, Nicosia, Cyprus, Turkey.
    [Download]

  • Roßnagel, Heiko (2004)
    Mobile Qualified Electronic Signatures and Certification on Demand, In: Proceedings of the 1st European PKI Workshop - Research and Applications, Springer LNCS 3093, Samos Island, Greece.
    [Download]

  • Amberg, Michael; Figge, Stefan; Wehrmann, Jens (2003)
    A Cooperation Model for Personalised and Situation Dependent Services in Mobile Networks
    In: Olivé, A.; Yoshikawa, M.; Yu, E.S. et al. (Eds.) Advanced Conceptual Modeling Techniques. Lecture Notes in Computer Science 2784; Springer, Berlin
    Category: Chapter in book Reference No. 2003-185

  • Figge, Stefan; Schrott, Gregor (2003)
    3G “ad” Work - 3G’S Breakthrough with mobile Advertising
    In: Proceedings of the 8th International Workshop on Mobile Multimedia Communications; München
    Category: Proceedings
    Reference No. 2003-60

    [Download]

  • Figge, Stefan; Schrott, Gregor; Muntermann, Jan; Rannenberg, Kai (2003)
    Expanding Mobile Commerce: Mobile Multimedia als Werbemedium der Zukunft, In: Hamburger Forum Medienökonomie Band 5: MultiMedia Mobil - Dienste und Inhalte über mobile Plattformen, Munich, Germany.
    ISBN: 3-88927-336-X
    [Find it]

  • Figge, Stefan; Schrott, Gregor; Muntermann, Jan; Rannenberg, Kai (2003)
    EARNING M-ONEY - A Situation based Approach for Mobile Business Models, In: Proceedings of the 11th European Conference on Information Systems (ECIS), 16-21 June 2003, Naples, Italy.
    [Find it]

  • Fritsch, Lothar (2003)
    Die T-Mobile-Stiftungsprofessur für Mobile Commerce und Mehrseitige Sicherheit an der Johann Wolfgang Goethe-Universität Frankfurt, In: Praxis der Informationsverarbeitung und Kommunikation (PIK), Ausgabe 02/03 Apr.-Jun., pp.114ff., K.G. Saur Verlag, München, Germany.
    [Download]

  • Fritsch, Lothar; Ranke, Johannes; Roßnagel, Heiko (2003)
    Qualified mobile electronic signatures: Possible, but worth a try?, In: Information Security Solutions Europe (ISSE) 2003 Conference, Vienna, Austria.
    [Download]

  • Fritsch, Lothar; Rannenberg, Kai (2003)
    Informationstechnische Voraussetzungen von E-Government am Beispiel des Katastrophenschutzes mittels Mobilkommunikation, In: Tagungsband zur Jahrstagung 2002 der Deutschen Gesellschaft für Recht und Informatik, Otto-Schmidt-Verlag, Cologne, Germany.
    [Find it]

  • Fritsch, Lothar; Weber, Christoph (2003)
    Volcanic Activity Report - Erta Ale: Frequent changes in the active crater morphology and lava lake level, In: Global Volcanism Program, Volcanic Activity Update 04/03 (BGVN 28:04); Smithsonian National Museum of Natural History, Washington D.C., USA.
    [Download]

  • Ranke, Johannes; Fritsch, Lothar; Roßnagel, Heiko (2003)
    M-Signaturen aus rechtlicher Sicht, In: Datenschutz und Datensicherheit (27:2), pp.95-100, Vieweg & Sohn, Wiesbaden, Germany.
    [Download]

  • Rannenberg, Kai (2003)
    Identity Management in Mobile Applications, In: Datenschutz und Datensicherheit (DuD) (27:9), pp.546-550, Vieweg & Sohn, Wiesbaden, Germany.

  • Rannenberg, Kai (2003)
    Sicherheit, In: in Wolfgang König u.a.: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik, 2. Auflage 2003, pp. 353-361, Frankfurt a.M., Germany.
    ISBN: 978-3-8171-1694-2

  • Rannenberg, Kai; Roßnagel, Heiko; Fritsch, Lothar (2003)
    Economics & IT Security Certification, In: 4th International Common Criteria Conference ICCC'2003, Stockholm, Sweden.

  • Roßnagel, Heiko (2003)
    Mobile/kabellose Netzwerke, In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik (2. Auflage), Frankfurt am Main, Germany.

  • Tiebel, O.; Liesebach, Katja; Mitschick, A. et al. (2003)
    DIPOL-Edit – a new system supporting the WWW-based delivery of course content at Dresden Medical Faculty, In: Proceedings of AMEE 2003, 31 Aug – 3 Sep: Relevance in Medical Education, University of Bern, Switzerland.

  • Amberg, Michael; Figge, Stefan; Wehrmann, Jörg (2002)
    COMPASS – Ein Kooperationsmodell für situationsabhängige mobile Dienst
    In: Mobile and Collaborative Business 2002, Proceedings zur Multikonferenz Wirtschaftsinformatik
    Category: Proceedings [protected Download]
    Password protected due to former publication, please contact the author
    Reference No. 2002-53


  • Figge, Stefan (2002)
    Die Open Mobile Architecture - Systemumgebung für mobile Dienste der nächsten Generation
    In: WIRTSCHAFTSINFORMATIK 44, S. 375-378
    Category: Publication in scientific journal [protected Download]
    Password protected due to former publication, please contact the author
    Reference No. 2002-51


  • Fritsch, Lothar (2002)
    A secure, economic infrastructure for signing of web based documents and financial affairs, In: CBL – Cyberbanking & Law, Ausgabe 2/2002.
    [Download]

  • Fuchß, Thomas; Fritsch, Lothar (2002)
    Effective Business Processes Online - A Platform for Secure Online Business Transactions with Electronic Signatures, In: Online 2002, Düsseldorf, Germany.
    [Download]

  • Kursawe, Klaus (2002)
    Optimistic Byzantine Agreement, SRDS 2002.


  • Kursawe, Klaus; Albers, S.; Schuierer, S. (2002)
    Exploring Onknown Environments with Obstacles, In: Algorithmica (32:1), pp.123-143.

  • Kursawe, Klaus; Cachin, C.; Lysyanskaya, A.; Strobl, Reto (2002)
    Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. In: ACM CCS 2002.


  • Rannenberg, Kai (2002)
    Interview: Werbefreie Identität gewünscht, In: MARKET Magazin für Online-Marketing und E-Commerce Ausgabe 05/02; Munich, Germany.

  • Rannenberg, Kai (2002)
    CamWebSIM and Friends: Steps towards Personal Security, In: Viktor Seige et al.: The Trends and Challenges of Modern Financial Services - Proceedings of the Information Security Summit, pp. 173 - 176, Tate International, Prague, Czech Republic.
    [Find it]

  • Figge, Stefan; Schoedel, Sven (2001)
    Architekturen für mobile Geschäfte
    In: Computerwoche Extra 8/01, S. 8-10
    Category: Publication in journal Reference No. 2001-63


  • Fox, Dirk; Fritsch, Lothar; Giessmann, Ernst G. (2001)
    Vertrauen, In: Workshop "Vertrauen" auf "Vertrauenswürdige Informationssysteme VIS 2001", Kiel, Germany.

  • Fritsch, Lothar (2001)
    Sicherheit im M-Commerce, In: Sonderbeilage Bankfinanzsysteme der geldinstitute - eBanking, IT-Lösungen und Banktechnik.
    [Download]

  • Fritsch, Lothar (2001)
    A secure, affordable infrastructure for electronic signature applications, In: Datenschutz und Datensicherheit 9/2001, pp.532ff..
    [Download]

  • Fuchß, Thomas; Fritsch, Lothar (2001)
    Endgeräte für den M-Commerce: Defizite und Aussichten, In: KES, Zeitschrift für Kommunikations- und EDV-Sicherheit, Ausgabe 1/2001, pp6ff..
    [Download]

  • Fuchß, Thomas; Fritsch, Lothar (2001)
    Sicherheit im Mobile Banking, In: Mobile Computer & Kommunikation 10/2001, pp.66f..
    [Download]

  • Rannenberg, Kai; Iachello, Giovanni (2001)
    Protection Profiles for Remailer Mixes, In: Hannes Federrath (Eds.) Designing Privacy Enhancing Technologies - Post-Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, 25-26 July 2000, pp. 181-230, Berkeley, CA, USA.
    [Find it]

  • Fritsch, Lothar; Fuchß, Thomas (2000)
    Erfahrungen eines Softwarehauses in Deutschland mit der ITSEC E4/Hoch-Zertifizierung – Ist bewiesene Sicherheit bezahlbar?, In: Workshop Sicherheit und E-Commerce (WSSEC) 2000, Darmstadt, Germany.

  • Fritsch, Lothar; Fuchß, Thomas (2000)
    Experience with E4/High evaluation, In: Infosec 2000, Paris, France.


  • Fuchß, Thomas; Fritsch, Lothar (2000)
    M-Commerce Security, In: Information Security Solutions Europe ISSE 2000, Barcelona, Spain.

  • Fuchß, Thomas; Fritsch, Lothar (2000)
    Security Certificates as a tool for reliably software engineering, In: Datenschutz und Datensicherheit 9/2000, pp.514ff..

  • Fuchß, Thomas; Fritsch, Lothar (2000)
    Erfahrungen mit der ITSEC E4/Hoch-Zertifizierung, In: Datenschutz und Datensicherheit 10/2000, pp.583ff..
    [Download]

  • Rannenberg, Kai (2000)
    Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet, In: Wirtschaftsinformatik (42:6).

  • Rannenberg, Kai (2000)
    Electronic Commerce und Mehrseitige Sicherheit - Baustellen, Fortschritte und Perspektiven, In: Informatik Forschung und Entwicklung (IFE) (15:4), pp.193-206.

  • Rannenberg, Kai (2000)
    Multilateral Security - Why and How? In: Proceedings of the 23rd National Information System Security Conference, 16-19 October 2000, pp.520, Baltimore, Maryland, USA.

  • Rannenberg, Kai (2000)
    How much negotiation and detail can users handle? In: Frédéric Cuppens et al.: Computer security: Proceedings of the 6th European Symposium on Research in Computer Security, 4-6 October 2000, pp. 37-54 Toulouse, France; Lecture Notes in Computer Science 1895, Springer; Berlin, Heidelberg, New York, ...
    [Find it]

  • Rannenberg, Kai (2000)
    Multilateral Security - A concept and examples for balanced security, In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000, 19-21 September 2000, pp. 151-162, ACM Press, Cork, Ireland.
    ISBN: 1-58113-260-3
    [Find it]

  • Rannenberg, Kai (2000)
    IT Security Certification and Criteria - Progress, Problems and Perspectives, In: Sihan Qing, Jan H.P.Eloff: Information Security for Global Information Infrastructures; Proceedings of the 16th Annual Working Conference on Information Security, pp. 1-10.

  • Rannenberg, Kai; Iachello, Giovanni (2000)
    Protection Profiles for Remailer Mixes - Do the new Evaluation Criteria help?, In: Proceedings of the 16th Annual Computer Security Applications Conference, 11-15 December 2000, pp.107-118, IEEE CS Press, New Orleans, Louisiana, USA.
    ISBN: 0-7695-0859-6
    [Find it]

  • Bertsch, Andreas; Rannenberg, Kai (1999)
    Lean Infrastructures for Sustainable Digital Signatures, In: Simone Fischer-Hübner, Gerald Quirchmayr, Louise Yngström: User Identification and Privacy Protection – Applications in Public Administration & Electronic Commerce; Proceedings of the Joint IFIP WG 8.5 and WG 9.6 Working Conference, 14-15 June 1999, pp.173-189.

  • Bertsch, Andreas; Rannenberg, Kai; Bunz, Herbert (1999)
    Nachhaltige Überprüfbarkeit digitaler Signaturen, In: Patrick Horster: Sicherheitsinfrastrukturen, pp.39-50, Verlag Vieweg, Braunschweig, Germany.
    ISBN: 3-528-05709-2

  • Bludau, Hans-Bernd; Rannenberg, Kai (1999)
    Das Erfahrungsfeld im "Erreichbarkeitsmanagement" im Kontext mehrseitiger Sicherheit – Simulationsstudien als didaktisches Instrument, In: Bundesamt für Sicherheit in der Informationstechnik: Zur Didaktik der IT-Sicherheit, pp.173-188, SecuMedia-Verlag, Ingelheim, Germany.
    ISBN: 3-922746-33-0

  • Jendricke, Uwe; Rannenberg, Kai (1999)
    A MixDemonstrator for teaching Security in the Virtual University, In: Louise Yngström, Simone Fischer-Hübner: WISE 1; Proceedings of the IFIP TC 11 WG 11.8 First World Conference on Information Security Education: 17-19 June 1999, pp. 83-96, DSV publishers on behalf of IFIP, Kista, Sweden.
    ISBN: 91-7153-910-7

  • Kursawe, Klaus; Albers, S.; Schuierer, S. (1999)
    Exploring Onknown Environments with Obstacles, SODA 1999.

  • Mueller, Guenter; Rannenberg, Kai (1999)
    Multilateral Security – Empowering Users, Enabling Aplications – The Ladenburger Kolleg „Security in Communication Technology“, In: Günter Müller, Kai Rannenberg: Multilateral Security in Communications – Technology, Infrastructure, Economy, pp.563-570, Addison-Wesley-Longman, München, Germany; Reading, Massachusetts, USA.
    ISBN: 3-8273-1360-0

  • Mueller, Guenter; Rannenberg, Kai (1999)
    Security for Global Communications, In: Günter Müller, Kai Rannenberg: Multilateral Security in Communications – Technology, Infrastructure, Economy, pp. 11-17, Addison-Wesley-Longman, München, Germany; Reading ,Massachusetts, USA.
    ISBN: 3-8273-1360-0

  • Mueller, Guenter; Rannenberg, Kai (1999)
    Sicherheit in der Informations- und Kommunikationstechnik – Ein neues DFG-Schwerpunktprogramm, In: Informatik Forschung und Entwicklung (IFE) (14:1), pp.46-48.

  • Mueller, Guenter; Rannenberg, Kai (1999)
    DFG-Schwerpunktprogramm In: Praxis der Informationsverarbeitung und Kommunikation (PIK) (22:1), pp. 61-62.

  • Rannenberg, Kai (1999)
    Sicherung internetbasierter Unternehmenskommunikation, In: Praxis der Wirtschaftsinformatik (HMD) (36:209), pp.53-66.

  • Rannenberg, Kai (1999)
    IT-Sicherheitszertifizierung – Garantie für Sicherheit?, In: Praxis der Informationsverarbeitung und Kommunikation (PIK) (22:3), pp.154-161.

  • Rannenberg, Kai (1999)
    Sicherheit, auch das noch!?!, In: Praxis der Informationsverarbeitung und Kommunikation (PIK) (22:3), pp.138-139.

  • Rannenberg, Kai (1999)
    What can IT Security Certification do for Multilateral Security? In: Günter Müller, Kai Rannenberg: Multilateral Security in Communications – Technology, Infrastructure, Economy, pp.515-530, Addison-Wesley-Longman, München, Germany; Reading (Massachusetts), USA.
    ISBN: 3-8273-1360-0

  • Rannenberg, Kai; Fox, Dirk (1999)
    Privacy Points In: Datenschutz und Datensicherheit (DuD) (23:2), pp. 99.

  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter (1999)
    IT Security and Multilateral Security In: Günter Müller, Kai Rannenberg: Multilateral Security in Communications – Technology, Infrastructure, Economy, pp. 21-29, Addison-Wesley-Longman, München, Germany; Reading ,Massachusetts, USA.
    ISBN: 3-8273-1360-0

  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter (1999)
    Mehrseitige Sicherheit in der Telekommunikation, In: Alexander Roßnagel, Reinhold Haux, Wolfgang Herzog: Mobile und sichere Kommunikation im Gesundheitswesen, pp.35-44, Verlag Vieweg, Braunschweig, Germany.
    ISBN: 3-528-05690-8

  • Damker, Herbert; Pordesch, Ulrich; Rannenberg, Kai; Schneider, Michael (1998)
    Aushandlung mehrseitiger Sichrheit: der Erreichbarkeits- und Sicherheitsmanager, In: Günter Müller, Kurt-Hermann Stapf: Mehrseitige Sicherheit in der Kommunikationstechnik – Erwartung, Akzeptanz, Nutzung, pp.29-42, Addison-Wesley-Longman, Bonn, Germany.
    ISBN: 3-8273-1355-0

  • Fox, Dirk; Rannenberg, Kai (1998)
    Zertifikate – Gütesiegel oder Feigenblatt?, In: Datenschutz und Datensicherheit (DuD) (22:4), pp.186.

  • Rannenberg, Kai (1998)
    Kriterien und Zertifizierung mehrseitiger IT-Sicherheit, In: Gesellschaft für Informatik (Nominierungsausschuß): Ausgezeichnete Informatikdissertationen 1997, pp.98-117, Teubner, Stuttgart, Germany.
    ISBN: 3-519-02647-3
    [Find it]

  • Rannenberg, Kai (1998)
    Datenschutz als Innovationsmotor statt als Technikfeind, In: Helmut Bäumler: Der neue Datenschutz - Datenschutz in der Informationsgesellschaft von morgen, pp.190-205, Neuwied, Germany.
    ISBN: 3-472-03284-7

  • Rannenberg, Kai (1998)
    Sicherheitszertifizierung, In: Datenschutz und Datensicherheit (DuD) (22:4), pp.190-192.

  • Rannenberg, Kai; Müller, Günter; Schmitt, Thomas (1998)
    „Mehrseitige Sicherheit“ vor der Probe aufs Exempel – Erste Phase des Kollegs „Sicherheit in der Kommunikationstechnik“ abgeschlossen, In: TA-Datenbank-Nachrichten (7:1), pp.75-80.

  • Mueller, Guenter; Rannenberg, Kai (1997)
    Das Ladenburger Kolleg – Sicherheit in der Kommunikationstechnik, In: BSI-Forum 5.Jg., In: Zeitschrift für Kommunikations- und EDV-Sicherheit (KES) (13:6), pp.54-56.

  • Mueller, Guenter; Rannenberg, Kai (1997)
    Mehrseitige Sicherheit – Nutzer stärken, Anwendungen ermöglichen – Das Ladenburger Kolleg, In: Günter Müller, Andreas Pfitzmann: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, pp.565-572, Addison-Wesley-Longman, Bonn, Germany.
    ISBN: 3-8273-1116-0

  • Rannenberg, Kai (1997)
    Tragen Zertifizierung und Evaluationskriterien zu mehrseitiger Sicherheit bei?, In: Günter Müller, Andreas Pfitzmann: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, pp.527-562, Addison-Wesley-Longman, Bonn, Germany.
    ISBN: 3-8273-1116-0

  • Rannenberg, Kai; Mueller, Guenter (1997)
    Mehrseitige Sicherheit – Nutzer stärken, Anwendungen ermöglichen, In: FIFF-Kommunikation (14:3), pp.29-31.

  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter (1997)
    Sicherheit, insbesondere mehrseitige IT-Sicherheit, In: Günter Müller, Andreas Pfitzmann: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, pp.21-29, Addison-Wesley-Longman, Bonn, Germany.
    ISBN: 3-8273-1116-0

  • Reichenbach, Martin; Damker, Herbert; Federrath, Hannes; Rannenberg, Kai (1997)
    Individual Management of Personal Reachability in Mobile Communication, In: Louise Yngström, Jan Carlsen: Information Security in Research and Business; Proceedings of the IFIP TC11 13th International Information Security Conference (SEC '97): 14-16 May 1997 Copenhagen, pp. 163-174, Chapman & Hall, London, United Kingdom.
    ISBN: 0-412-8178-02
    [Find it]

  • Sobirey, Michael; Fischer-Huebner, Simone; Rannenberg, Kai (1997)
    Pseudonymous Audit for Privacy Enhanced Intrusion Detection, In: Louise Yngström, Jan Carlsen: Information Security in Research and Business; Proceedings of the IFIP TC11 13th International Information Security Conference (SEC '97): 14-16 May 97 Copenhagen, pp.151-163, Chapman & Hall, London, United Kingdom.
    ISBN: 0-412-8178-02
    [Find it]

  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter (1996)
    Sicherheit, insbesondere mehrseitige IT-Sicherheit, In: Informationstechnik und Technische Informatik (it+ti) (38:4), pp.7-10.
    [Find it]

  • Damker, Herbert; Rannenberg, Kai; Mueller, Guenter (1995)
    Erreichbarkeitsmanagement und mehrseitige Sicherheit aus Benutzersicht, In: Bundesamt für Sicherheit in der Informationstechnik (Eds.) Fachvorträge 4. Deutscher IT-Sicherheitskongreß 8.-11. Mai 1995, BSI-Publikation 7165, Bonn, Germany.
    [Find it]

  • Rannenberg, Kai (1995)
    Normfähigkeit von Test- und Bewertungsmethoden, In: Datenschutz-Berater (19:6), pp.19.

  • Rannenberg, Kai (1995)
    Evaluationskriterien zur IT-Sicherheit – Entwicklungen und Perspektiven in der Normung und außerhalb, In: Eingeladener Beitrag für: Verläßliche IT-Systeme VIS'95; Proceedings der Tagung vom 5-7 April 1999, pp. 45 - 68, H.H. Brüggemann, W. Gerhardt-Häckl, Reihe DuD-Fachbeiträge, Vieweg, Braunschweig, Germany.
    ISBN: 3-528-05483-2
    [Find it]

  • Rannenberg, Kai; Damker, Herbert; Langenheder, Werner; Mueller, Guenter. In: Kubicek, Müller, Neumann, Raubold, Roßnagel (1995)
    Mehrseitige Sicherheit als integrale Eigenschaft von Kommunikationstechnik – Kolleg, In: Jahrbuch „Telekommunikation & Gesellschaft“ 1995, R. v. Decker's Verlag, Heidelberg, Germany.

  • Mueller, Guenter; Rannenberg, Kai (1994)
    Sicherheit in der Kommunikationstechnik – zu Aufgabe und Struktur eines Kollegs, In: K. H. Lindackers: Sicherheit von Technik – Ladenburger Kolleg 1988-1993, pp.183-189, Verlag TÜV Rheinland GmbH, Cologne, Germany.
    ISBN: 3-8249-0224-9

  • Mueller, Guenter; Rannenberg, Kai; Damker, Herbert (1994)
    Kolleg "Sicherheit in der Kommunikationstechnik" eingerichtet, In: Praxis der Informationsverarbeitung und Kommunikation (17:4), pp.255-257.

  • Rannenberg, Kai (1994)
    GI und Studierende, In: Informatik-Spektrum (17:4), pp.219.

  • Rannenberg, Kai (1994)
    Version 1.0 des Evaluationshandbuches ITSEM, In: Datenschutz-Berater (18:5), pp.5-6.

  • Rannenberg, Kai (1994)
    Recent Development in Information Technology Security Evaluation – The Need for Evaluation Criteria for multilateral Security, In: R. Sizer, L. Yngström, H. Kaspersen ,S. Fischer-Hübner: Security and Control of Information Technology in Society – Proceedings of the IFIP TC9/WG 9.6 Working Conference, 12-17 August 1993, onboard M/S Ilich and ashore at St. Petersburg, Russia, North-Holland Publishers, Amsterdam 1994.
    ISBN: 0-444-81831-6
    [Find it]

  • Pfitzmann, Andreas; Rannenberg, Kai (1993)
    Staatliche Initiativen und Dokumente zur IT-Sicherheit – Eine kritische Würdigung, In: Computer und Recht (9:3), pp.170-179.
    [Find it]

  • Rannenberg, Kai (1993)
    The 15th National Computer Security Conference - Security made out of Building Blocks, In: The Computer Law and Security Report (9:3), pp.143-144.

  • Rannenberg, Kai (1993)
    Die USA präsentieren den Orange-Book-Nachfolger, In: Datenschutz-Berater (17:5), pp.8-10.

  • Gehrke, Michael; Pfitzmann, Andreas; Rannenberg, Kai (1992)
    Information Technology Security Evaluation Criteria – a Contribution to Vulnerability?, In: R. Aiken: Education and Society – Information Processing 92 – Proceedings of the IFIP 12th World Computer Congress Madrid, Spain, 7-11 Sept. 1992, Volume II, pp.579-587, North-Holland.
    [Find it]

  • Rannenberg, Kai (1992)
    Tagungsbericht: 15. National Computer Security Conference, In: Datenschutz-Berater (16:12), pp.13-15.

  • Rannenberg, Kai (1992)
    Evaluierung, Zertifizierung, Akkreditierung, In: Datenschutz und Datensicherung (DuD) (16:5), pp.250-251.

  • Meyer, Martin; Rannenberg, Kai (1991)
    Eine Bewertung der „Information Technology Security Evaluation Criteria“, In: Andreas Pfitzmann, Eckart Raubold: Proc. Verläßliche Informationssysteme (VIS'91), März 1991, Darmstadt; Informatik-Fachberichte 271, pp.243-258, Springer-Verlag, Heidelberg, Germany; auch erschienen in: Datenschutz und Datensicherung (DuD) (15:3), Darmstadt, Germany.

  • Rannenberg, Kai (1991)
    IT-Sicherheit – Bewertungskriterien, In: Computer und Recht (7:11), pp.699-701.

  • Rannenberg, Kai (1991)
    "IT-Sicherheit – Bewertungskriterien" auf der VIS, In: Informatik-Spektrum (14:4), pp.235-236.

  • Rannenberg, Kai (1991)
    GI-Fachgruppe VIS zu den ITSEC-Plänen, In: KES – Zeitschrift für Kommunikations- und EDV-Sicherheit (7:4), pp.261-263.

  • Rannenberg, Kai (1991)
    Diskussion "IT-Sicherheit – Bewertungskriterien" auf der VIS, In: Datenschutz und Datensicherung (DuD) (15:5), pp.267-269.

  • Rienhoff, O.; Lutterbeck, Bernd; Retter, K.; Rannenberg, Kai; Reinecke, Elke (1991)
    Rechtsunsicherheiten bei der digitalen Bildverarbeitung und Archivierung, In: H. E. Riemann, J. Kollath, O. Rienhoff: Digitale Radiographie, Referate und Vorträge – 4. Frankfurter Gespräche über Digitale Radiographe vom 10. bis 13. Oktober 1990 in Bad Nauheim, pp.159-164, Schnetztor Verlag, Konstanz, Germany.
    ISBN: 3-87018-081-1

  • Brandenburg, Uwe-Wolfgang; Rannenberg, Kai (1990)
    Viren und Würmer. In: Automatisierungstechnische Praxis (atp) (32:10), pp.500-508.

[Top]


Working Papers

  • Fatbardh Veseli
    An evaluation of the efficiency of Privacy-ABC technologies.

  • Towards the acceptance of Privacy-ABC technologies - challenges and opportunities (2014)
    Submitted to the 9th International IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, Patras, Greece, 2014.

  • Deuker, A., Albers, A., Rosenkranz, C. (2012).
    "All Friends Are Equal – Some Even More: An Investigation of Privacy Protection Among Facebook Users," Proceedings > Proceedings of JAIS Theory Development Workshop . Sprouts: Working Papers on Information Systems, 12(17).
    http://sprouts.aisnet.org/12-17

  • Leitold, Herbert; Zwattendorfer, Bernd; Andersson, Thomas; Leontaridis, Lefteris; Lindholm, Pasi; Yang, Shuzhe (2012)
    D5.2 - White Paper on the establishment of an INDI Operator Market across the EU, In: GINI Deliverable.


  • Van Alsenoy, B.; Lievens, E.; Janssen, K.; Dumortier, J.; Rannenberg, K.; Yang, S.; Andersson, T.; Abbas, Q.; Leitold, H.; Zwattendorfer, S. (2012)
    D3.2 - A Regulatory Framework for INDI Operators, In: GINI Deliverable.

  • Zwattendorfer, Bernd; Leitold, Herbert; Yang, Shuzhe; Andersson, Thomas; Leontaridis, Lefteris; Lindholm, Pasi (2012)
    D5.1 - A longer-term research and implementation roadmap towards a fully user-centric INDI ecosystem, In: GINI Deliverable.


  • Bal, Gökhan (Eds.); Koschinat, Sascha; Wolos, Lars (2009)
    Catalogue of Identity Management Functions, Working Paper.

  • Bal, Gökhan; Hegen, Marvin; Koschinat, Sascha; Weber, Christian; Wolos, Lars (2009)
    Study on IdM related Data Assets on the basis of current IdM Player’s Data-Handling, In: M-Chair: Working Paper.

  • Royer, Denis; Yang, Shuzhe (2009)
    D3.17: Identity Management Systems – recent developments. In: FIDIS Deliverable (contributor), Frankfurt, Germany.
    [Find it]

  • Liesebach, Katja; Scherner, Tobias (Eds.) (2008)
    D2.4 Requirements, Public Deliverable of EU Project PICOS, November 2008.
    [Find it]

  • Royer, Denis (2008)
    D11.3: Economic aspects of mobility and identity, In: FIDIS Deliverables (editor and contributor), Frankfurt am Main, Germany.
    [Find it]

  • Tschersich, Markus; Spies, Thorsten; Eicker, Stefan (2008)
    Einsatz von Multi-Touch beim Softwaredesign am Beispiel der CRC Card-Methode, In: ICB-Research Report No.25, Essen, Germany.
    ISBN: ISSN 1860-2770 (Print)
    [Find it]

  • Liesebach, Katja; Donker, H. (Eds.) (2007)
    D13.1.d – Advanced Tutorial (for developers, decision makers and privacy commissioners, Public PRIME Deliverable, February 2007.
    Advanced Tutorial (for developers, decision makers and privacy commissioners)

  • Scherner, Tobias; Fritsch, Lothar (2007)
    Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process, In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Frankfurt, Germany.

  • Donker, H.; Liesebach, Katja; Borcea-Pfitzmann, K. (Eds.) (2006)
    D13.1.c – General Public Tutorial, Public PRIME Deliverable, March 2006.
    PRIME General Public Tutorial

  • Fritsch, Lothar (2006)
    Mind your Step! How Profiling Location reveals your Identity - and how you prepare for it, In: 2nd FIDIS Doctoral Consortium, IST FIDIS Network of Excellence, Fira, Santorin, Greece.
    [Download]

  • Royer, Denis (2006)
    D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity, In: FIDIS Deliverables (editor and contributor), Frankfurt am Main, Germany.
    [Find it]

  • Figge, Stefan (2005)
    The Potentials of Mobile Commerce - An Economics Perspective
    In: Working Paper; Frankfurt am Main
    Category: Miscellaneous [Download]
    Reference No. 2005-198


  • Fritsch, Lothar (2005)
    Economic Location-Based Services, Privacy and the Relationship to Identity, In: 1st FIDIS Doctoral Consortium, IST FIDIS Network of Excellence, Riezlern, Austria.

  • Fritsch, Lothar (2005)
    WiFi hot spot superdistribution : a profit scheme for WiFi access distribution, In: Research Report in den Hochschulpublikationen der Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.
    [Download]

  • Fritsch, Lothar; Kursawe, Klaus (2005)
    Personal Rights Management (PRM): Enabling Privacy Rights in Digital Online Media Content,
    In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.

  • Hahn, Patrick; Fritsch, Lothar (2005)
    Studie zur Akzeptanzanalyse von Location-based Services, In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.
    [Find it]

  • Klobucar, T.; Borcea, K.; Jerman-Blažic, B.; Liesebach, Katja (2005)
    Privacy and Data Protection in Corporate e-Learning, PROLEARN Deliverable D1.5..

  • Koelsch, Tobias; Fritsch, Lothar; Kohlweiss, Markulf; Kesdogan, Dogan (2005)
    Mit IDM und Mittler zu mehr Privatsphäre in LBS,
    In: Forschungsbericht zum 2.Fachgespräch Ortsbezogene Anwendungen und Dienste, Stuttgart, Germany.
    [Download]

  • Muntermann, Jan (2005)
    Automated ANN Alerts : One Step Ahead with Mobile Support, In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.
    [Download]

  • Muntermann, Jan; Güttler, André (2005)
    Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case, In: Working Paper Series: Finance and Accounting Goethe-University Frankfurt/Main Nr. 145.

  • Roßnagel, Heiko; Kalbe, Thomas; Zikesch, Felix (2004)
    SmartBlaster - a realtime multiplayer game for mobile ad-hoc networks, In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.
    [Find it]

  • Albers, Andreas; Figge, Stefan (2003)
    Lizenzvergabe für DVB-T in Deutschland, Goethe Universität Frankfurt, Frankfurt, Germany.

  • Figge, Stefan; Rossnagel, Heiko; Muntermann, Jan; Albers, Andreas; Fritsch Lothar; Rannenberg, Kai (2003)
    Standardisierung im Mobilfunk und Mobile Commerce, Goethe Universität Frankfurt, Frankfurt, Germany.

  • Fritsch, Lothar; Schunter, Matthias (1998)
    A design pattern for implementing robust protocol machines in Java, In: SEMPER Activity Report 433UDO022, Saarbrücken, Germany.
    [Download]

  • Rannenberg, Kai (1995)
    IT-Sicherheitsevaluationskriterien – Sicherheit mit Gütesiegel?, In: Vorbereitung und Einsatz sicherer IT-Systeme – Studierendentutorium zur Tagung "Verlässliche IT-Systeme VIS'95", Proceedings des Tutoriums am 4 April 1995; Interner Bericht 1/95; Lehrstuhl Datenbank- und Info-Syst., pp.2-12, FB Informatik, Uni Rostock, Germany.

  • Rannenberg, Kai (1989)
    Untersuchung von Sicherheitsdiensten und ihre Integration in das ISO-OSI-Referenzmodell auf der Grundlage eines pragmatisch orientierten Sicherheitsmodells, In: Forschungsberichte des Fachbereichs Informatik 1989/18, Technische Universität Berlin, Berlin, Germany.

  • Rannenberg, Kai (1988)
    Technischer Datenschutz in CIM-Systemen und anderen verteilten Anwendungen, In: Forschungsberichte des Fachbereichs Informatik 1988/16, Technische Universität Berlin, Berlin, Germany.

[Top]


Others

  • Cornelius, Britta, Dr.; Radmacher, Mike, Dr.; Kleinhans, Christian, Dr. (2011)
    Always On - Wie der Einzelhandel die vielfältigen Möglichkeiten
    des mobilen Internets für sich nutzen kann, Detecon Management Report 2Q 2011, Bonn, Deutschland


  • Radmacher, Mike, Dr.; Rieger, Volker, Dr.; Wellmann, Alexander; Upmeyer, Ralf (2011)
    InCar 2032 - Herausforderungen und Möglichkeiten, Detecon Management Report 1Q 2011, Bonn, Deutschland.

  • Radmacher, Mike, Dr.; Ismailov, Ruslan; Tempich, Christoph, Dr. (2010)
    Speaking the language of the future - Mobile network operators worldwide are entering the Machine-to-Machine communication business, Detecon Management Report 3Q 2010, Bonn, Deutschland

  • Radmacher, Mike, Dr.; Slamka, Christian, Dr.; Collier de Mendonca, Joao; Jaster, Bernd (2010)
    Wer klaut in der Cloud? - Chancen und Risiken des Cloud Computings, Detecon Opinion Paper 2010, Bonn, Deutschland

  • Radmacher, Mike, Dr.; Stefan Kistler (2010)
    „Ich geh’ jetzt mal duschen…“ - Wie Mobilbetreiber mit ihren Kernkompetenzen Social Communities als Erlösquellen erschließen, Detecon Management Report 4Q 2010, Bonn, Deutschland

  • Fritsch, Lothar (2006)
    Personalisierte Mobilität (Interview), In: Interview im E-Commerce-Magazin 2/2006, Vaterstetten, Germany.

    [Download]

  • Royer, Denis (2006)
    Mobile 2.0 - Challenges of Mobile Work & Life, In: 3rd FIDIS Doctoral Consortium: Identity Management & Mobility in Practice, Stockholm, Långholmen, Sweden.

  • Zibuschka, Jan (2006)
    A Mobile Single Sign-On System, In: 3rd FIDIS Doctoral Consortium: Identity Management & Mobility in Practice, Stockholm, Långholmen, Sweden.

  • Fritsch, Lothar (2005)
    Vulkane erleben - Basiswissen für Draußen, In: Reihe Outdoor-Basixx, Conrad-Stein-Verlag, Welver, Germany.

    [Download]

  • Fritsch, Lothar (2004)
    Und Größe zählt doch, In: Card-Forum Deutschland 12/2003-1/2004, Lüneburg, Germany.
    [Download]

  • Fritsch, Lothar (2004)
    Kaffeesternchen und Börsenpoltern, In: Card-Forum Deutschland 12/2003-1/2004, Lüneburg, Germany.
    [Download]

  • Roßnagel, Heiko (2003)
    Betriebssysteme, In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik (2.Auflage), Frankfurt am Main, Germany.

  • Kursawe, Klaus; Shoup, V. (2002)
    Optimistic Asynchronous Atomic Broadcast
    [Find it]

  • Kursawe, Klaus; Cachin, C.; Petzold, F.; Shoup, V. (2001)
    Secure and Efficient Asynchronous Broadcast Protocols, Crypto 2001.
    [Find it]

  • Kursawe, Klaus; Cachin, C.; Shoup, V. (2000)
    Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography, PODC 2000.
    [Find it]

[Top]


Scientific Expertises

  • Albers, Andreas (2012)
    Datenzentrische Geschäftsmodelle im Mobile Business - Herausforderungen im Konflikt zwischen Unternehmenszielen und Datenschutz für mobile Nutzer, Interview - Das Magazin für kompetente & innovative Unternehmen, 01/2013.

  • Albers, Andreas (2012)
    Datenschutz - Kosten oder potentieller Wettbewerbsvorteil für Unternehmen?, Interview - Das Magazin für kompetente & innovative Unternehmen, 03/2012.

  • Albers, Andreas; Duschinski, Hannes (2012)
    Smart Agents – wie digitale Stellvertreter Kunden erobern (Teil 2/2), Innovation Management, No. 1, Feb. 2012.

  • Albers, Andreas; Duschinski, Hannes (2011)
    Smart Agents – wie digitale Stellvertreter Kunden erobern (Teil 1/2), Innovation Management, No. 10, Dec. 2011.

  • Duschinski, Hannes; Albers, Andreas, Deuker, André; Aumann, Clemens (2011)
    'Tis More Blessed to Receive than to Search, In: Detecon Management Report - The Magazine for Management & Technology, 3/2011, S. 8-17.

  • Albers, Andreas; Wolos Lars; Rannenberg, Kai (2010)
    Towards Telco enabled Online and Mobile Payments, Technology Radar II/2010, Deutsche Telekom Technology Radar, Berlin, Germany.

  • Krontiris, Ioannis (2010)
    Towards Open-world Urban Sensing Applications, In: the Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen? (CIoT 2010), Helsinki, Finland.
    Download

  • Krontiris, Ioannis; Benenson, Z.; Giannetsos, Th.; Freiling, F. C.; Dimitriou, T. (2009)
    Cooperative Intrusion Detection in Wireless Sensor Networks,
    In: the 6th European Conference on Wireless Sensor Networks (EWSN ’09), Cork, Ireland.
    Download

  • Albers, Andreas; Figge, Stefan (2008)
    Mobile Werbung: Wie sich Aufmerksamkeit vermarkten lässt, Teletalk - Kundendialog für Profis (06/2008), Hannover, Germany.

  • Krontiris, Ioannis (2008)
    Security in Wireless Sensor Networks, In: Ph.D. Forum on Pervasive Computing and Communications organized by IEEE PerCom 2008 and sponsored by Google.

  • Krontiris, Ioannis (2008)
    Intrusion Prevention and Detection in Wireless Sensor Networks, In: PhD Forum of the 6th ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 08), Breckenridge, Colorado, USA.

  • Krontiris, Ioannis; Dimitriou, T. (2008)
    Security Issues in Biomedical Sensor Networks, In: ISABEL ’08: First International Symposium on Applied Sciences in Bio-Medical and Communication Technologies, October 25-28, Aalborg, Denmark.
    Download

  • Krontiris, Ioannis; Dimitriou, T. (2008)
    Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side, In: SecPriWiMob ’08: First International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, October 12-14, Avignon, France.
    Download

  • Krontiris, Ioannis; Dimitriou, T.; Giannets, T. (2008)
    osLIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks, In: Fourth International Conference on Security and Privacy for Communication Networks, September 22-25, Istanbul, Turkey.
    Download

  • Krontiris, Ioannis; Dimitriou, T.; Freiling, F.C. (2007)
    Towards Intrusion Detection in Wireless Sensor Networks, In: 13th European Wireless Conference, April, Paris, France.
    Download

  • Krontiris, Ioannis; Dimitriou, T.; Giannetsos, T.; Mpasoukos, M. (2007)
    Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks, In: 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors 07), July, Wroclaw, Poland.
    Download

  • Dimitriou, T.; Krontiris, Ioannis (2006)
    Authenticated In-Network Programming for Wireless Sensor Networks, In: 5th International Conference on AD-HOC Networks & Wireless (AdHocNow) 2006, August, Ottawa, Canada.
    Download

  • Dimitriou, T.; Krontiris, Ioannis (2006)
    A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks, In: The ACM REALWSN’06 Workshop on Real-World Wireless Sensor Networks, June, Uppsala, Sweden.
    Download

  • Salajegheh, M.; Soroush, H.; Thomos, A.; Dimitriou, T.; Krontiris, Ioannis (2006)
    Sense A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command, In: the ACM REALWSN’06 Workshop on Real-World Wireless Sensor Networks, June, Uppsala, Sweden.

  • Dimitriou, T.; Krontiris, Ioannis (2005)
    Autonomic Communication Security in Sensor Networks, In: 2nd International Workshop on Autonomic Communication (WAC).

  • Dimitriou, T.; Krontiris, Ioannis (2005)
    A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks, In: 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks, WMAN 05.
    Download

  • Dimitriou, T.; Krontiris, Ioannis; Nikakis, F. (2004)
    SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks, In: Third IFIP-TC6 Networking Conference (Networking 2004), Athens, Greece.

  • Müller, Günter; Rannenberg, Kai; Jendricke, Uwe (1998)
    Der Stellenwert von Datenschutz in der Standardisierung von IT-Sicherheit, In: Gutachten für die Akademie für Technikfolgenabschätzung Baden-Württemberg, Germany.

[Top]