Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Über die Notwendigkeit genormter kryptographischer Verfahren, , and . Datenschutz und Datensicherung, 11 (6): 293--299 (June 1987)Systematisierung und Modellierung von Mixen., , and . Verläßliche IT-Systeme, Vieweg+Teubner Verlag, (1997)Digital Payment Systems Enabling Security and Unobservability, and . Computers & Security, 8 (5): 399--416 (1989)Sicherheit in Datennetzen. (2000)Value exchange systems enabling security and unobservability, and . (1990)Networks without user observability., and . Comput. Secur., 6 (2): 158-166 (1987)Die Rolle der Datenschutzbeauftragten bei der Aushandlung von mehrseitiger Sicherheit, and . "`Der neue Datenschutz"' -- Datenschutz in der Informationsgesellschaft von morgen, Hermann Luchterhand Verlag, Neuwied, Kriftel, (1998)Anonymity, Unobservability, and Pseudonymity -- A Proposal for Terminology, and . Designing Privacy Enhancing Technologies, 2009, page 1--9. Springer, (2001)Privacy-Aware eLearning: Why and How, , , , and . Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2005, page 1466--1472. Chesapeake, VA, AACE, (June 2005)Über die Modellierung steganographischer Systeme., , , , , and . Verläßliche IT-Systeme, Vieweg+Teubner Verlag, (1997)