Publications
40 found
Show per page
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/MSEC.2024.3363829
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/MSEC.2024.3363829
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks.
Reisinger, Thomas, ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Reisinger, Thomas, ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Lecture Notes in Computer Science: Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Lecture Notes in Computer Science: Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/TDSC.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/TDSC.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. https://doi.org/10.1109/FLEPS49123.2020.9239445
, & Shakeel, Hamza. (2020, August 16).
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. https://doi.org/10.1109/FLEPS49123.2020.9239445
, & Shakeel, Hamza. (2020, August 16).
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A novel principle to validate digital forensic models.
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A novel principle to validate digital forensic models.
Www `20, 315–316. https://doi.org/10.1145/3366424.3383116
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Www `20, 315–316. https://doi.org/10.1145/3366424.3383116
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, January 1). Behavior-Based Outlier Detection for Network Access Control Systems.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, January 1). Behavior-Based Outlier Detection for Network Access Control Systems.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/tmc.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/tmc.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Eckhoff, David, & IEEE Communications Surveys & Tutorials, 20(1), 489–516. https://doi.org/10.1109/comst.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges and Solutions.
Eckhoff, David, & IEEE Communications Surveys & Tutorials, 20(1), 489–516. https://doi.org/10.1109/comst.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges and Solutions.
Privacy Risk Assessment: From Art to Science, by Metrics. LNCS 11025. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018).
Privacy Risk Assessment: From Art to Science, by Metrics. LNCS 11025. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018).
ACM Comput. Surv., 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2018). Technical Privacy Metrics: A Systematic Survey.
ACM Comput. Surv., 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2018). Technical Privacy Metrics: A Systematic Survey.
Zhao, Yuchen, & POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. https://doi.org/10.1145/3196494.3201586
. (2018, January 1).
Zhao, Yuchen, & POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. https://doi.org/10.1145/3196494.3201586
. (2018, January 1).
ACM Trans. Priv. Secur., 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
ACM Trans. Priv. Secur., 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
Measuring Privacy in Vehicular Networks. https://doi.org/10.1109/lcn.2017.33
. (2017, January 1).
Measuring Privacy in Vehicular Networks. https://doi.org/10.1109/lcn.2017.33
. (2017, January 1).
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social Internet of Vehicles for Smart Cities.
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social Internet of Vehicles for Smart Cities.
Tailor, Neel, He, Ying, & Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. https://doi.org/10.1145/2939918.2942420
. (2016, January 1).
Tailor, Neel, He, Ying, & Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. https://doi.org/10.1145/2939918.2942420
. (2016, January 1).
ACM Transactions on Computing Education (TOCE), 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and Performance in Computer Science.
ACM Transactions on Computing Education (TOCE), 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and Performance in Computer Science.
User Interface Design for Privacy Awareness in eHealth Technologies. https://doi.org/10.1109/ccnc.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016, January 1).
User Interface Design for Privacy Awareness in eHealth Technologies. https://doi.org/10.1109/ccnc.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016, January 1).
Genomic Privacy Metrics: A Systematic Comparison. https://doi.org/10.1109/spw.2015.15
. (2015, January 1).
Genomic Privacy Metrics: A Systematic Comparison. https://doi.org/10.1109/spw.2015.15
. (2015, January 1).
Privacy Assessment in Vehicular Networks Using Simulation. https://doi.org/10.1109/wsc.2014.7020152
, & Eckhoff, David. (2014, January 1).
Privacy Assessment in Vehicular Networks Using Simulation. https://doi.org/10.1109/wsc.2014.7020152
, & Eckhoff, David. (2014, January 1).
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).