Olga Kieselmann

According to our database1, Olga Kieselmann authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comparing Nudges and Deceptive Patterns at a Technical Level.
Proceedings of the Workshop Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices (DDPCHI 2024) co-located with the CHI Conference on Human Factors in Computing Systems (CHI 2024), 2024

2018
Data Revocation on the Internet.
PhD thesis, 2018

Löschen im Internet - rechtlich gefordert und technisch möglich!
Datenschutz und Datensicherheit, 2018

A Decentralized Resilient Short-Term Cache for Messaging.
Proceedings of the Distributed Applications and Interoperable Systems, 2018

2017
Evaluating Connection Resilience for the Overlay Network Kademlia.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
k-rAC - a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables.
CoRR, 2016

Evaluating Connection Resilience for Self-Organized Distributed Cyber-Physical Systems.
CoRR, 2016

Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems.
Proceedings of the 10th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2016

2015
"Löschen" im Internet.
Datenschutz und Datensicherheit, 2015

Simulating Cheated Results Dissemination for Volunteer Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A Novel Approach to Data Revocation on the Internet.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
CrypTool 2.0.
Datenschutz und Datensicherheit, 2014

Ranking Cryptographic Algorithms.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

System Evaluation Evaluation.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

2013
Recht auf Vergessen im Internet.
Datenschutz und Datensicherheit, 2013


  Loading...