Kai Rannenberg
Affiliations:- Johann Wolfgang Goethe-Universität Frankfurt am Main, Germany
According to our database1,
Kai Rannenberg
authored at least 96 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on m-chair.de
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
2021
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021
2020
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
Proc. Priv. Enhancing Technol., 2020
2019
Mob. Networks Appl., 2019
Comput. Secur., 2019
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019
2018
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
Proceedings of the Sicherheit 2018, 2018
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.
Proceedings of the Sicherheit 2018, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten.
New Media Soc., 2017
CoRR, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the Exploring Services Science - 8th International Conference, 2017
2016
Dagstuhl Reports, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
2015
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns.
Comput. Secur., 2015
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
Inform. Spektrum, 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014
Vorwort.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014
2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials.
J. Syst. Softw., 2011
ISO/IEC standardization of identity management and privacy technologies - Making IT Security and Biometrics contribute to better Identity Management and Privacy.
Datenschutz und Datensicherheit, 2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
Enhanced Privacy and Identity Management for Community Services - Demo of the PICOS Project.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
2009
Proceedings of the Future of Identity in the Information Society, 2009
Proceedings of the Future of Identity in the Information Society, 2009
2008
2007
IEEE Secur. Priv., 2007
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services.
Prax. Inf.verarb. Kommun., 2006
Datenschutz und Datensicherheit, 2006
2005
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the 13th European Conference on Information Systems, 2005
2004
Inf. Secur. Tech. Rep., 2004
Inviting New Players To The Multimedia M-Commerce Arena: An approach to enhance the current m-Commerce business model with regard to emerging DVB-T networks.
Proceedings of the Mobile Information Systems, 2004
Proceedings of the Building The E-Service Society: E-Commerce, 2004
Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004
2003
Identity management in mobile applications - Unobtrusive but already effective.
Datenschutz und Datensicherheit, 2003
Vorwort.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
Mobile Benutzer - Mobiles Wissen - Mobiles Internet.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003
Vorwort der Herausgeber.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003
Proceedings of the 11th European Conference on Information Systems, 2003
2000
Wirtschaftsinf., 2000
Electronic Commerce und Mehrseitige Sicherheit: Baustellen, Fortschritte und Perspektiven.
Inform. Forsch. Entwickl., 2000
IT Security Certification and Criteria. Progress, Problems and Perspectives.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications.
Proceedings of the Computer Security, 2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Prax. Inf.verarb. Kommun., 1999
Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm.
Inform. Forsch. Entwickl., 1999
Privacy Points.
Datenschutz und Datensicherheit, 1999
1998
Zertifizierung mehrseitiger IT-Sicherheit - Kriterien und organisatorische Rahmenbedingungen.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05666-7, 1998
1997
Pseudonymous audit for privacy enhanced intrusion detection.
Proceedings of the Information Security in Research and Business, 1997
Individual management of personal reachability in mobile communication.
Proceedings of the Information Security in Research and Business, 1997
Kriterien und Zertifizierung mehrseitiger IT-Sicherheit - eine Untersuchung der technischen Grundlagen und der organisatorischen Rahmenbedingungen.
PhD thesis, 1997
1996
Informationstechnik Tech. Inform., 1996
1995
Evaluationskriterien zur IT-Sicherheit - Entwicklung und Perspektiven in der Normung und außerhalb.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
1993
Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security.
Proceedings of the Security and Control of Information Technology in Society, 1993
1992
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
Proceedings of the Education and Society, 1992
1991
Proceedings of the VIS'91, 1991