Lothar Fritsch
Orcid: 0000-0002-0418-4121
According to our database1,
Lothar Fritsch
authored at least 65 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
1
1
1
1
2
1
2
1
1
1
2
1
5
4
6
2
1
5
1
3
1
3
2
1
1
4
1
7
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review.
IEEE Access, 2024
2023
Early Labour App: Developing a practice-based mobile health application for digital early labour support.
Int. J. Medical Informatics, September, 2023
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023
2022
Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks.
Proceedings of the Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022., 2022
Proceedings of the Nordic Artificial Intelligence Research and Development, 2022
Proceedings of the International Conference on Electronics, Information, and Communication, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2022
2021
A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps.
Empir. Softw. Eng., 2021
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
2020
App-generated digital identities extracted through Android permission-based data access - a survey of app privacy.
Proceedings of the Sicherheit 2020, Sicherheit, 2020
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics.
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020
PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020
2019
Proceedings of the IEEE International Conference on Software Architecture Companion, 2019
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019
2018
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018
2017
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Open Identity Summit 2017, 2017
Proceedings of the Open Identity Summit 2017, 2017
Partial Commitment - "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 43rd Euromicro Conference on Software Engineering and Advanced Applications, 2017
2014
Proceedings of the Computers Helping People with Special Needs, 2014
2013
Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Policies and Research in Identity Management, 2013
Proceedings of the Human-Computer Interaction. Users and Contexts of Use, 2013
2012
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the Constructing Ambient Intelligence, 2011
2010
Proceedings of the Privacy and Identity Management for Life, 2010
2009
Privatsphäre per Design: Privatsphäre respektierende Infrastrukturen für verteilte Mehrparteien-Geschäftsmodelle und Dienste.
PhD thesis, 2009
A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project.
Proceedings of the Eighth International Conference on Networks, 2009
2008
Towards a Research Road Map for the Management of Privacy Risks in Information Systems.
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Profiling the European Citizen, Cross-Disciplinary Perspectives, 2008
2007
Wirtschaftsinf., 2007
Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering.
J. Theor. Appl. Electron. Commer. Res., 2007
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services.
Prax. Inf.verarb. Kommun., 2006
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location-Based-Service-Angeboten.
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005
A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection.
Proceedings of the Networking, 2005
Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle.
Proceedings of the Virtuelle Organisation und Neue Medien 2005, Workshop GeNeMe 2005, 2005
Proceedings of the Communications and Multimedia Security, 2005
Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure, Economic, and Mobile Infastructure.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Proceedings of the Building The E-Service Society: E-Commerce, 2004
2003
M-Signaturen aus rechtlicher Sicht.
Datenschutz und Datensicherheit, 2003
2001
A secure, affordable infrastructure for electronic signature applications - Overview of a server based, user-friendly approach.
Datenschutz und Datensicherheit, 2001
2000
Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses.
Datenschutz und Datensicherheit, 2000
Security Certificates as a Tool for Measuring Efficiency and Creating Transparency - A Software Vendors View.
Datenschutz und Datensicherheit, 2000