Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SITA principle for location privacy - Conceptual model and architecture., , and . PRISMS, page 1-8. IEEE, (2013)Towards a New Classification of Location Privacy Methods in Pervasive Computing., and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 150-161. Springer, (2011)Architectural mismatch issues in identity management deployment.. ECSA Companion Volume, page 31-33. ACM, (2010)Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks., , and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-118. Springer, (2012)Identity Management Mismatch Challenges in the Danish Municipality Administration System., and . ECSA, volume 6285 of Lecture Notes in Computer Science, page 476-479. Springer, (2010)Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI., , , , and . CHI, page 1125-1134. ACM, (2015)Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations.. ARES, page 130:1-130:8. ACM, (2021)Personal informatics for non-geeks: lessons learned from ordinary people., , , , and . UbiComp Adjunct, page 683-686. ACM, (2014)