Author of the publication

What's in a name: the conflicting views of pseudonymisation under eIDAS and the General Data Protection Regulation.

, , and . Open Identity Summit, volume P-264 of LNI, page 167-174. GI, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Configurable Privacy Requirements Elicitation in Cyber-Physical Systems., , , , , , and . UMAP (Adjunct Publication), page 109-119. ACM, (2022)A taxonomy of explanations to support Explainability-by-Design., , , and . CoRR, (2022)Addressing Regulatory Requirements on Explanations for Automated Decisions with Provenance - A Case Study., , , , and . Digit. Gov. Res. Pract., 2 (2): 16e:1-16e:14 (2021)Explainability-by-Design: A Methodology to Support Explanations in Decision-Making Systems., , , , and . CoRR, (2022)Provisioning Security in a Next Generation Mobility as a Service System., , , , , , and . IoTBDS, page 166-173. SCITEPRESS, (2022)The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify., , and . Comput. Law Secur. Rev., 34 (4): 784-805 (2018)The dual function of explanations: Why it is useful to compute explanations., , , , , and . Comput. Law Secur. Rev., (2021)Explanations for AI: Computable or Not?, , , , , and . WebSci (Companion), page 77. ACM, (2020)Data Protection by Design for Cross-Border Electronic Identification: Does the eIDAS Interoperability Framework Need to Be Modernised?, , and . Privacy and Identity Management, volume 547 of IFIP Advances in Information and Communication Technology, page 255-274. Springer, (2018)