Publications
40 found
Show per page
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/msec.2024.3363829
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/msec.2024.3363829
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers & Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An Agile Enterprise Architecture Approach to Managing Information Security Risks.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers & Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An Agile Enterprise Architecture Approach to Managing Information Security Risks.
Reisinger, Thomas, ACM Comput. Surv., 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Reisinger, Thomas, ACM Comput. Surv., 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Lecture Notes in Computer Science. Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Lecture Notes in Computer Science. Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/tdsc.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/tdsc.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 1–26. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a Hundred Good Symptoms: Why Good Security Can Still Fail - a Literature Review and Analysis.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 1–26. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a Hundred Good Symptoms: Why Good Security Can Still Fail - a Literature Review and Analysis.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric Sensor for pH Monitoring of Liquid Samples Using Bubble Wrap and Mobile Phone Camera. https://doi.org/10.1109/fleps49123.2020.9239445
, & Shakeel, Hamza. (2020, January 1).
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric Sensor for pH Monitoring of Liquid Samples Using Bubble Wrap and Mobile Phone Camera. https://doi.org/10.1109/fleps49123.2020.9239445
, & Shakeel, Hamza. (2020, January 1).
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A Novel Principle to Validate Digital Forensic Models.
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A Novel Principle to Validate Digital Forensic Models.
Www `20. https://doi.org/10.1145/3366424.3383116
. (2020, January 1). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Www `20. https://doi.org/10.1145/3366424.3383116
. (2020, January 1). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, January 1). Behavior-Based Outlier Detection for Network Access Control Systems.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, January 1). Behavior-Based Outlier Detection for Network Access Control Systems.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/tmc.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/tmc.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Eckhoff, David, & IEEE Communications Surveys & Tutorials, 20(1), 489–516. https://doi.org/10.1109/comst.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges and Solutions.
Eckhoff, David, & IEEE Communications Surveys & Tutorials, 20(1), 489–516. https://doi.org/10.1109/comst.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges and Solutions.
Privacy Risk Assessment: From Art to Science, by Metrics. LNCS 11025. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018).
Privacy Risk Assessment: From Art to Science, by Metrics. LNCS 11025. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018).
ACM Comput. Surv., 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2018). Technical Privacy Metrics: A Systematic Survey.
ACM Comput. Surv., 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2018). Technical Privacy Metrics: A Systematic Survey.
Zhao, Yuchen, & POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. https://doi.org/10.1145/3196494.3201586
. (2018, January 1).
Zhao, Yuchen, & POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. https://doi.org/10.1145/3196494.3201586
. (2018, January 1).
ACM Trans. Priv. Secur., 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
ACM Trans. Priv. Secur., 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
Measuring Privacy in Vehicular Networks. https://doi.org/10.1109/lcn.2017.33
. (2017, January 1).
Measuring Privacy in Vehicular Networks. https://doi.org/10.1109/lcn.2017.33
. (2017, January 1).
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social Internet of Vehicles for Smart Cities.
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social Internet of Vehicles for Smart Cities.
Tailor, Neel, He, Ying, & Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. https://doi.org/10.1145/2939918.2942420
. (2016, January 1).
Tailor, Neel, He, Ying, & Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. https://doi.org/10.1145/2939918.2942420
. (2016, January 1).
ACM Transactions on Computing Education (TOCE), 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and Performance in Computer Science.
ACM Transactions on Computing Education (TOCE), 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and Performance in Computer Science.
User Interface Design for Privacy Awareness in eHealth Technologies. https://doi.org/10.1109/ccnc.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016, January 1).
User Interface Design for Privacy Awareness in eHealth Technologies. https://doi.org/10.1109/ccnc.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016, January 1).
Genomic Privacy Metrics: A Systematic Comparison. https://doi.org/10.1109/spw.2015.15
. (2015, January 1).
Genomic Privacy Metrics: A Systematic Comparison. https://doi.org/10.1109/spw.2015.15
. (2015, January 1).
Privacy Assessment in Vehicular Networks Using Simulation. https://doi.org/10.1109/wsc.2014.7020152
, & Eckhoff, David. (2014, January 1).
Privacy Assessment in Vehicular Networks Using Simulation. https://doi.org/10.1109/wsc.2014.7020152
, & Eckhoff, David. (2014, January 1).
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).