Author of the publication

Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.

, , , , , and . Sicherheit, volume P-281 of LNI, page 17-28. Gesellschaft für Informatik e.V., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clockwork: Tracking Remote Timing Attacks., , , and . CSF, page 350-365. IEEE, (2020)SecWasm: Information Flow Control for WebAssembly., , , and . SAS, volume 13790 of Lecture Notes in Computer Science, page 74-103. Springer, (2022)Prudent Design Principles for Information Flow Control., , and . PLAS@CCS, page 17-23. ACM, (2018)Automatic Annotation of Confidential Data in Java Code., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 146-161. Springer, (2021)Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps., , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 19-37. Springer, (2018)