Author of the publication

Verkettung digitaler Identitäten

, and (Eds.) ULD -- Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein; Technische Universität Dresden, Professur Datenschutz und Datensicherheit, Kiel, (Oktober 2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals.. IDMAN, volume 396 of IFIP Advances in Information and Communication Technology, page 104-106. Springer, (2013)Identity Management Systems (IMS): Identification and Comparison Study, , , , and . (2003)Marrying Transparency Tools with User-Controlled Identity Management.. FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 199-220. Springer, (2007)Datenschutzaspekte von Identitätsmanagementsystemen - Recht und Praxis in Europa., , , and . Datenschutz und Datensicherheit, (2003)Transparenz der Verwaltung auch beim Einsatz von Algorithmen und Künstlicher Intelligenz.. Datenschutz und Datensicherheit, 42 (12): 733 (2018)Towards Displaying Privacy Information with Icons., , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 338-348. Springer, (2010)Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads., and . ACM Conference on Computer and Communications Security, page 1493-1494. ACM, (2013)Die Datenschutzrechtliche Verkehrssicherungspflicht., and . Datenschutz und Datensicherheit (dud), 48 (9): 561-565 (September 2024)Mehr Fortschritt wagen – durch Stärkung des Datenschutzes, Vorschläge zur Ausgestaltung des Koalitionsvertrags, , , , and . Fraunhofer ISI, Karlsruhe, (2022)Towards a privacy-preserving inspection process for authentication solutions with conditional identification., , and . Open Identity Summit, volume P-237 of LNI, page 85-96. GI, (2014)