Publications
40 found
Show per page
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/msec.2024.3363829
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings. Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.), 10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article]. Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need? ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021. Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers & Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An Agile Enterprise Architecture Approach to Managing Information Security Risks. Reisinger, Thomas, ACM Comput. Surv., 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication. Lecture Notes in Computer Science. Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.), Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022). Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1). Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1). Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/tdsc.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs. Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 1–26. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a Hundred Good Symptoms: Why Good Security Can Still Fail - a Literature Review and Analysis. ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric Sensor for pH Monitoring of Liquid Samples Using Bubble Wrap and Mobile Phone Camera. https://doi.org/10.1109/fleps49123.2020.9239445
, & Shakeel, Hamza. (2020, January 1). Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines. Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A Novel Principle to Validate Digital Forensic Models. Www `20. https://doi.org/10.1145/3366424.3383116
. (2020, January 1). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research. Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1). Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, January 1). Behavior-Based Outlier Detection for Network Access Control Systems. Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/tmc.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication. Eckhoff, David, & IEEE Communications Surveys & Tutorials, 20(1), 489–516. https://doi.org/10.1109/comst.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges and Solutions. Privacy Risk Assessment: From Art to Science, by Metrics. LNCS 11025. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018). ACM Comput. Surv., 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2018). Technical Privacy Metrics: A Systematic Survey. Zhao, Yuchen, & POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. https://doi.org/10.1145/3196494.3201586
. (2018, January 1). ACM Trans. Priv. Secur., 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics. Measuring Privacy in Vehicular Networks. https://doi.org/10.1109/lcn.2017.33
. (2017, January 1). Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social Internet of Vehicles for Smart Cities. Tailor, Neel, He, Ying, & Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. https://doi.org/10.1145/2939918.2942420
. (2016, January 1). ACM Transactions on Computing Education (TOCE), 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and Performance in Computer Science. User Interface Design for Privacy Awareness in eHealth Technologies. https://doi.org/10.1109/ccnc.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016, January 1). Genomic Privacy Metrics: A Systematic Comparison. https://doi.org/10.1109/spw.2015.15
. (2015, January 1). Privacy Assessment in Vehicular Networks Using Simulation. https://doi.org/10.1109/wsc.2014.7020152
, & Eckhoff, David. (2014, January 1). A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).