Chair of Mobile Business & Multilateral Security

Publications

Monograph
  • Sebastian Pape. 2017. "Technische Bedingungen wirksamer Verschlüsselung", In: DGRI-Jahrbuch 2016, Eds. Walter Blocher, Dirk Heckmann, Herbert Zech, https://www.dgri.de/index.php/fuseaction/download/lrn_file/dgri_jahrbuch_2016.epub.
  • Tschersich, Markus. 2015. "Privacy by Default in the European Union Proposal for Data Protection Regulation", In: Schriften zum Mobile Commerce und zur Mobilkommunikation, Eds. Rannenberg, Kai, ISBN: 978-3-8300-8211-8, Verlag Dr. Kovac, Hamburg, Germay.
  • Gökhan Bal. 2015. "Improving the Effectiveness of Privacy Risk Communication in Smartphone App Ecosystems", ISBN: 978-3-8300-8609-3, pp. 280, https://verlagdrkovac.de/978-3-8300-8609-3.htm, Verlag Dr. Kovač.
  • Kahl, Christian . 2014. "You Create Attention to Attract Attention – Viral Marketing of Digital Music in Social Networks", In: Schriften zum Mobile Commerce und zur Mobilkommunikation, Eds. , Dr. Kovac, Hamburg, Germany.
  • Pape, Sebastian. 2014. "Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise", ISBN: 978-3-658-07115-8, http://www.springer.com/springer+vieweg/it+%26+informatik/datenbanken/book/978-3-658-07115-8, Springer Vieweg.
  • Sebastian Pape. 2013. "The Challenge of Authentication in Insecure Environments", Universität Kassel.
  • Weiss, Stefan . 2010. "An Information Architecture Framework for Enhancing Privacy in Social Network Applications", In: INTERNET - Praxis und Zukunftsanwendungen des Internets, Eds. , ISBN: 978-3-8300-4976-0, Dr. Kovac, Hamburg, Germany.
  • Hegen, Marvin . 2010. "Mobile Tagging: Potenziale von QR-Codes im Mobile Business", Diplomica, Hamburg, Deutschland.
  • Radmacher, Mike. 2010. "Transparente mobile Empfehlungssysteme: Gestaltung und Einfluss auf die Kundenbindung mobiler Dienste", In: Schriften zu Mobile Commerce und zur Mobilfunkkommunikation, Eds. Rannenberg, Kai, Dr. Kovac J., Hamburg, Germany.
  • Albers, Andreas . 2010. "Commercialisation of Context-sensitive Mobile Attention in Mobile Media Markets - Design Recommendations for Mobile Marketing Providers", In: Schriften zum Mobile Commerce und zum Mobilfunk, Eds. , Dr. Kovac, Hamburg, Germany.
  • Fritsch, Lothar . 2009. "Privatsphäre per Design", ISBN: 978-8-2497-0309-8, Eigenverlag, Oslo, Norway.
  • Krontiris, Ioannis . 2008. "Intrusion Prevention and Detection in Wireless Sensor Networks", Mannheim, Germany.
  • Deuker, André . 2008. "Mobile TV. Chancen und Herausforderungen für das Marketing der Zukunft", ISBN: 3836663007, Diplomica, Hamburg, Germany.
  • Pape, Sebastian. 2008. "Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem", ISBN: 978-3639043143, pp. 112, http://www.amazon.de/Sicherheitsmodelle-f%C3%BCr-Ajtai-Dwork-Kryptosystem-Untersuchungen-Kryptosystems/dp/3639043146/, Vdm Verlag Dr. Müller.
  • Kahl, Christian . 2007. "Dynamische Visualisierung serviceorientierter Architekturen", ISBN: 3836654083, Diplomica, Hamburg, Germany.
  • Liesebach, Katja . 2007. "Semantische Netze im eLearning: Kontext- und zielgruppenspezifische Repräsentation von Lernobjekten mit Hilfe semantischer Netze", ISBN: 3836453452, VDM Verlag Dr. Müller.
  • Figge, Stefan. 2006. "Innovatives Mobile Marketing - Kontextabhängige Kundenansprache mit Hilfe mobiler Portale.", Kovac, Hamburg, Germany.
  • Dimitriou, Tassos; Krontiris, Ioannis; Nikakis, Fotios. 2004. "Fast and Scalable Key Establishment in Sensor Networks".
  • Pape, Sebastian. 2004. "Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem", Lehrstuhl für Kryptographie und Computeralgebra, Fachbereich Informatik der Technischen Universität Darmstadt.
  • Rannenberg, Kai . 1998. "Zertifizierung mehrseitiger IT-Sicherheit – Kriterien und organisatorische Rahmenbedingungen", In: Reihe DuD-Fachbeiträge, ISBN: 3-528-05666-8, http://www.amazon.de/Zertifizierung-mehrseitiger-Sicherheit-Kai-Rannenberg/dp/3528056665/, Vieweg, Braunschweig, Germany.
 
Editorships
  • Stefan Schiffner, Jetzabel Serna, Demosthenes Ikonomou, Kai Rannenberg. 2016. "Privacy Technologies and Policy - 4th Annual Privacy Forum", ISBN: 978-3-319-44760-5, DOI:10.1007/978-3-319-44760-5, Springer International Publishing.
  • Kai Rannenberg, Jan Camenisch, Ahmad Sabouri (eds.). 2015. "Attribute-based Credentials for Trust: Identity in the Information Society", ISBN: 978-3-319-14438-2, Springer International Publishing.
  • Ahmad Sabouri (ed.). 2014. "D2.2 - Architecture for Attribute-based Credential Technologies - Final Version", ABC4Trust Deliverable to the EC.
  • Vivas, José Luis; Agudo, Isaac; Tschersich, Markus . 2011. "D3.1.2 Trust and Privacy Assurance for the Design Platform 2.".
  • Koschinat, Sascha; Bal, Gökhan; Weber, Christian; Rannenberg, Kai . 2011. "Privacy and Identity Management for Life", ISBN: 978-3-642-20317-6, http://dx.doi.org/10.1007/978-3-642-20317-6_23, Springer, Berlin Heidelberg, Germany.
  • Rannenberg, Kai; Varadharajan, Vijay;, Weber, Christian. 2010. "Security and Privacy – Silver Linings in the Cloud", ISBN: 978-3-642-15256-6, http://www.springer.com/computer/communication+networks/book/978-3-642-15256-6, Springer, Heidelberg, Germany.
  • Markus Bick, Stefan Eulgem, Elgar Fleisch, J. Felix Hampe, Birgitta König-Ries, Franz Lehner, Key Pousttchi, Kai Rannenberg. 2010. "Mobile und Ubiquitäre Informationssysteme", In: GI Edition Proceedings Band 163 Mobile und Ubiquitäre Informationssysteme, ISBN: 978-3-88579-257-4.
  • Rannenberg K, Royer D, Deuker A (eds). 2009. "The Future of Identity - Challenges and Opportunities", ISBN: 978-3-540-88480-4, http://www.springer.com/978-3-540-88480-4, Springer, Heidelberg, Germany.
  • Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg. 2007. "Advances in Information and Computer Security ", ISBN: 978-3-540-75651-4, DOI:10.1007/978-3-540-75651-4, http://www.springer.com/de/book/9783540756507, Springer-Verlag Berlin Heidelberg.
  • Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog. 2006. "Security and Privacy in Dynamic Environments", ISBN: 978-0-387-33406-6, DOI:10.1007/0-387-33406-8, http://www.springer.com/gp/book/9780387334059#otherversion=9781441941275, Springer US.
  • Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura. 2006. "Advances in Information and Computer Security", ISBN: 978-3-540-47700-6, DOI:10.1007/11908739, http://www.springer.com/de/book/9783540476993, Springer-Verlag Berlin Heidelberg.
  • J. Felix Hampe, Franz Lehner, Key Pousttchi, Kai Rannenberg, Klaus Turowski. 2005. "Mobile Business - Processes,Platforms,Payment", ISBN: 3-88579-388-1.
  • Grimm, Rüdiger; Keller, Hubert B., Rannenberg, Kai. 2003. "Informatik 2003 - Mit Sicherheit Informatik", In: Lecture Notes in Informatics, Bonn, Germany.
  • Dittrich, Klaus; König, Wolfgang; Oberweis, Andreas; Rannenberg, Kai , Wahlster, Wolfgang. 2003. "Informatik 2003 - Innovative Informatikanwendungen Band 1", In: Lecture Notes in Informatics, Bonn, Germany.
  • Dittrich, Klaus; König, Wolfgang; Oberweis, Andreas; Rannenberg, Kai , Wahlster, Wolfgang. 2003. "Informatik 2003 - Innovative Informatikanwendungen Band 2", In: Lecture Notes in Informatics, Bonn, Germany.
  • "Asynchronous Group Communication", RPPDS.

 

Refereed Publications
  • Schmitz, Christopher; Schmid, Michael; Harborth, David; Pape, Sebastian. 2021. "Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities", Computers & Security, Vol. (108), Elsevier.
  • David Harborth and Sebastian Pape. 2020. "How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory", Behaviour & Information Technology, (39:12), pp. 1276-1296, DOI:10.1080/0144929X.2019.1662486, https://www.pape.science/files/publications/HP19bit.pdf, Taylor & Francis.
  • David Harborth and Sebastian Pape. 2020. "How Privacy Concerns, Trust and Risk Beliefs and Privacy Literacy Influence Users’ Intentions to Use Privacy-Enhancing Technologies - The Case of Tor", ACM SIGMIS The DATA BASE for Advances in Information Systems, (51:1), pp. 51-69, DOI:https://doi.org/10.1145/3380799.3380805, ACM.
  • Schmitz, Christopher; Pape, Sebastian. 2020. "LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security", Computers & Security, Vol. (90), Elsevier.
  • Harborth, D.; Pape, S. and Rannenberg, K.. 2020. "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym", Proceedings on Privacy Enhancing Technologies (PoPETs) (forthcoming).
  • Majid Hatamian. 2020. " Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers ", IEEE Access, (8:), pp.  35429 - 35445, https://ieeexplore.ieee.org/document/9001128, IEEE.
  • Pape, Sebastian; Schmitz, Christopher; Kipker, Dennis-Kenji; Sekulla, André. 2020. "On the Use of Information Security Management Systems by German Energy Providers", In: Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (ICCIP 2020), Arlington, Virginia, USA.
  • Schmitz, Christopher; Sekulla, André; Pape, Sebastian. 2020. "Asset-Centric Analysis and Visualisation of Attack Trees", In: Proceedings of the 7th International Workshop on Graphical Models for Security (GraMSec 2020), Boston, Massachusetts, USA.
  • David Harborth and Sebastian Pape. 2020. "Empirically Investigating Extraneous Influences on the "APCO" Model-Childhood Brand Nostalgia and the Positivity Bias", Future Internet, (12:12), pp. 220, DOI:10.3390/fi12120220.
  • Veseli, F., Serna-Olvera, J., Pulls, T. and Rannenberg, K. 2019. "Engineering Privacy by Design – Lessons from the Design and Implementation of an Identity Wallet Platform", SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing , ISBN: 978-1-4503-5933-7, pp. 1475-1483 , DOI:https://doi.org/10.1145/3297280.3297429, ACM New York, NY, USA ©2019.
  • Harborth, D., Hatamian, M., Tesfay, W., Rannenberg, K.. 2019. "A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications", Hawaii International Conference on System Sciences (HICSS), pp. 5029-5038, Maui, Hawaii.
  • David Harborth and Sebastian Pape. 2019. "How Privacy Concerns and Trust and Risk Beliefs Influence Users’ Intentions to Use Privacy-Enhancing Technologies - The Case of Tor", Hawaii International Conference on System Sciences (HICSS), pp. 4851-4860, Maui, Hawaii.
  • David Harborth. 2019. "Unfolding Concerns about Augmented Reality Technologies: A Qualitative Analysis of User Perceptions", International Conference on Wirtschaftsinformatik (WI 2019), pp. 1262-1276, Siegen, Germany.
  • Harborth, D., Cai, X., Pape, S.. 2019. "Why Do People Pay for Privacy- Enhancing Technologies? The Case of Tor and JonDonym", ICT Systems Security and Privacy Protection. SEC 2019. IFIP Advances in Information and Communication Technology, vol 562, pp. 253-267, DOI:https://doi.org/10.1007/978-3-030-22312-0_18, Springer, Cham, Lisbon, Portugal.
  • Hamm, P., Harborth, D., Pape, S. 2019. "Analysis of User Evaluations in Security Research", 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019), held in conjunction with the 14th International Conference on Availability, Reliability and Security (ARES), Canterbury, UK.
  • M. Hatamian. 2019. "Hard to understand, easy to ignore: an automated approach to predict mobile app permission requests: student research abstract", In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (ACM SAC), Limassol, Cyprus.
  • M. Hatamian, J. Serna, and K. Rannenberg. 2019. "Revealing the Unrevealed: Mining Smartphone Users Privacy Perception on App Markets", Computers & Security, (83:), Elsevier.
  • M. Hatamian, S. Paper, and K. Rannenberg. 2019. "ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment.", 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2019), Lisbon, Portugal.
  • M. Hatamian, N. Momen, L. Fritsch, and K. Rannenberg. 2019. "A Multilateral Privacy Impact Analysis Method for Android Apps", Annual Privacy Forum (APF 2019), Rome, Italy.
  • N. Momen, M. Hatamian, and L Fritsch. 2019. "Did App Privacy Improve after the GDPR?", IEEE Security & Privacyhttps://ieeexplore.ieee.org/document/8845749.
  • A Ghanbarian, G Ghiasi, R Safabakhsh, N Arastouie. 2019. "Writer Identification with n-tuple direction feature from contour", IET Image Processing.
  • N Arastouie, M Sabaei, B Bakhshi. 2019. "Near‐optimal online routing in opportunistic networks", International Journal of Communication Systems, (32:3).
  • Welderufael B. Tesfay, Jetzabel Serna, Kai Rannenberg. 2019. "PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts. ", In proceedings of The Sixth International Conference on Social Networks Analysis, Management and Security. Granada, Spain., IEEE.
  • Bracamonte, Vanessa; Hidano, Seira; Tesfay, Welderufael B; and Kiyomoto, Shinsaku. . 2019. "Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users", DOI:10.5220/0007378403700377, Prague, Czech Republic..
  • Tesfay, Welderufael B., Nastouli, Dimitra, Stamatiou, Yannis C., Serna, Jetzabel. 2019. "pQUANT: A User-centered Privacy Risk Analysis Framework", In Proceedings of the 14th International Conference on Risk and Security of Internet and Systems (CRiSIS). Hammamet, Tunisia, Springer.
  • Pape, S. and Rannenberg, K.. 2019. "Applying Privacy Patterns to the Internet of Things' (IoT) Architecture", Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, (24:3), pp. 925-933, DOI:10.1007/s11036-018-1148-2, https://doi.org/10.1007/s11036-018-1148-2.
  • Goeke, L.; Quintanar, A.; Beckers, K. and Pape, S.. 2019. "PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks", In: Computer Security - ESORICS 2019 International Workshops, MSTEC 2019, Luxemburg, September 26-27, 2019, Revised Selected Papershttps://www.pape.science/files/publications/GQBP19mstec.pdf.
  • Schmid, M.; Akarkach, K. and Pape, S.. 2019. "Comparison of different aggregated information security control maturities from {AHP} ranked companies (Extended abstract)", In: Preproceedings of IFIP Summer School on Privacy and Identity Management - Data for Better Living: AI and Privacy 2019 (IFIPSC2019).
  • Hamm, P.; Harborth, D. and Pape, S.. 2019. "A Systematic Analysis of User Evaluations in Security Research", In: Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019https://doi.org/10.1145/3339252.3340339, ACM.
  • Harborth, D. and Pape, S.. 2019. "Investigating Privacy Concerns related to Mobile Augmented Reality Applications", In: Proceedings of the 40th International Conference on Information Systems ICIS 2019, Munich, Germany, December 13-15, 2019https://aisel.aisnet.org/icis2019/cyber\_security\_privacy\_ethics\_IS/cyber\_security\_privacy/30.
  • Stankovic, J. and Pape, S.. 2019. "An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security", In: Computer Security - ESORICS 2019 International Workshops, SPOSE 2019, Luxemburg, September 26-27, 2019, Revised Selected Papershttps://www.pape.science/files/publications/PS19spose.pdf.
  • Schmid, M. and Pape, S.. 2019. "A structured comparison of the corporate information security", In: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pp. 223-237, DOI:10.1007/978-3-030-22312-0\_16, https://doi.org/10.1007/978-3-030-22312-0\_16.
  • Sekulla, André; Schmitz, Christopher; Pape, Sebastian; Pipek, Voklmar. 2019. "Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur", In: Human Practice. Digital Ecologies. Our Future. Proceedings of the 14th International Conference on Wirtschaftsinformatik (WI 2019), 2019, Siegen, Germany.
  • Harborth, D., Braun, M., Grosz, A., Pape, S., & Rannenberg, K.. 2018. "Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext", Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 13-26, Gesellschaft für Informatik e.V., Konstanz.
  • David Harborth, Sebastian Pape. 2018. "Privacy Concerns and Behavior of Pokémon Go Players in Germany", Privacy and Identity Management. The Smart Revolution. Privacy and Identity 2017. IFIP Advances in Information and Communication Technology, vol 526, pp. 314-329, DOI:https://doi.org/10.1007/978-3-319-92925-5_21, Springer, Cham.
  • Sebastian Pape, Daniel Tasche Iulia Bastys, Akos Grosz, Joerg Laessig, Kai Rannenberg. 2018. "Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping", To appear In: Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik e.V..
  • Dennis-Kenji Kipker, Sebastian Pape, Kristian Beckers. 2018. "Juristische Bewertung eines Social-Engineering-Abwehr Trainings", To appear In: ITS|Kritis Rahmenwerk.
  • Schmitz, Christopher; Sekulla, André; Pape, Sebastian; Pipek, Volkmar; Rannenberg Kai. 2018. "Easing the Burden of Security Self-Assessments", In: Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland.
  • David Harborth and Sebastian Pape. 2018. "JonDonym Users’ Information Privacy Concerns", 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection, pp. 170-184, DOI:https://doi.org/10.1007/978-3-319-99828-2_13, Springer, Cham.
  • Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna. 2018. "PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation", IWSPA @ CODASPY , ACM.
  • Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna. 2018. "I Read but Don’t Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR", Proceedings of WWW '18 Companion of the The Web Conference 2018 on The Web Conference 2018, ACM.
  • Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter and Sebastian Pape . 2018. "Assessing Privacy Policies of Internet of Things Services", 33rd International Conference on ICT Systems Security and Privacy Protection -- IFIP SEC 2018, Springer.
  • David Harborth and Sebastian Pape. 2018. "Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust", Twenty-fourth Americas Conference on Information Systems, New Orleans, 2018.
  • M. Hatamian, A. Kitkowska, J. Korunovska and S. Kirrane. 2018. "It’s shocking!”: Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser", 32nd Annual Conference on Data and Applications Security and Privacy (DBSec)https://m-chair.de/images/documents/publications/Hatamian/Its_shocking_Analysing_the_Impact_and_Reactions_to_the_A3_Android_Apps_Behaviour_Analyser.pdf, Bergamo, Italy.
  • Vanessa Kohn and David Harborth. 2018. "Augmented Reality – A Game Changing Technology For Manufacturing Processes?", Twenty-Sixth European Conference on Information Systems (ECIS2018), Portsmouth, UK.
  • Dan Ionita, Jaap Gordijn, Ahmed Seid Yesuf, Roel Wieringa. 2018. "Quantitative, Value-driven Risk Analysis of e-Services", AAA Journal of Information Systemshttps://www.researchgate.net/publication/325611131_Quantitative_Value-driven_Risk_Analysis_of_e-Services.
  • Ahmed Seid Yesuf. 2018. "MP-RA: Towards a Model-driven and Pattern-based Risk Analysis of e-service Fraud", Services 2018https://www.researchgate.net/publication/325651756_MP-RA_Towards_a_Model-driven_and_Pattern-based_Risk_Analysis_of_e-service_Fraud.
  • Jose Maria de Fuentes, Lorena Gonzalez-Manzano, Agusti Solanas, Fatbardh Veseli. 2018. "Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities", Computer, (51:7), pp. 44-53, DOI:10.1109/MC.2018.3011042, https://www.computer.org/csdl/mags/co/2018/07/mco2018070044-abs.html, IEEE.
  • Ahmed Seid Yesuf, Christian W Probst. 2018. "Estimating the Risk of Fraud against E-services", Accepted in: NordSec 2018https://www.researchgate.net/publication/327623314_Estimating_the_Risk_of_Fraud_against_E-services.
  • N Arastouie, M Sabaei. 2018. "Self-adaptive risk-aware routing in opportunistic network", The Journal of Supercomputing, (74:6).
  • N. Arastouie. 2018. "Setting up CSIRT and SOC for an enterprise: experienced challenges and solutions", 30th Annual FIRST Conference.
  • Pape, S. and Rannenberg, K.. 2018. "Cyber-Gefahren auf dem Radar", ManagementKompass: Unternehmen schützen -- Risiken minimieren, (November:03), pp. 9-12, https://www.soprasteria.de/de/newsroom/publikationen/publication/managementkompass-unternehmen-sch%C3%BCtzen-risiken-minimieren.
  • Aladawy, D.; Beckers, K. and Pape, S.. 2018. "PERSUADED: Fighting Social Engineering Attacks with a Serious Game", In: Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, DOI:10.1007/978-3-319-98385-1_8, https://doi.org/10.1007/978-3-319-98385-1_8, Springer.
  • Nakamura, T., Kiyomoto, S., Tesfay, W., Serna, J.. 2017. "Easing the burden of setting privacy preferences: a machine learning approach", In: Communications in Computer and Information Science https://www.m-chair.de/images/documents/publications/Rannenberg/CCIS2016.pdf, Springer.
  • Ahmed Seid Yesuf. 2017. "A Review of Risk Identification Approaches in the Telecommunication Domain", International Conference on Information Systems Security and Privacy.
  • Ahmed Seid Yesuf, Lars Wolos, Kai Rannenberg. 2017. "Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services", The 8th International Conference on Exploring Service Science, IESS 1.7https://m-chair.de/images/documents/publications/Yesuf/FRM_Requirement_Elicitation_16.pdf.
  • Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg. 2017. "Using Fraud Patterns for Fraud Risk Assessment of E-services", 32nd International Conference on ICT Systems Security and Privacy Protection -- IFIP SEC 2017https://m-chair.de/images/documents/publications/Yesuf/Using_FRP_for_risk_Assessment_66.pdf.
  • Kristian Beckers, Veronika Fries, Eduard C. Groen, Sebastian Pape. 2017. "Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment", In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017)http://ceur-ws.org/Vol-1796/creare-paper-1.pdf.
  • M. Hatamian, J. Serna. 2017. "Beacon Alarming: Informed decision-making supporter and privacy risk analyser in Smartphone applications", 35th IEEE International Conference on Consumer Electronics, pp. 468-471, DOI:10.1109/ICCE.2017.7889399, https://www.m-chair.de/images/documents/publications/Hatamian/2017_Hatamian_ICCE.pdf, Las Vegas, USA.
  • David Harborth. 2017. "Augmented Reality in Information Systems Research: A Systematic Literature Review", Twenty-third Americas Conference on Information Systems, Boston, 2017http://aisel.aisnet.org/amcis2017/AdvancesIS/Presentations/16/.
  • David Harborth and Sebastian Pape. 2017. "Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go", 2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 155-168, DOI:10.1109/ISMAR.2017.32, http://ieeexplore.ieee.org/document/8115414/.
  • Jose Maria de Fuentes, Lorena González-Manzano, Jetzabel Serna-Olvera, Fatbardh Veseli. 2017. "Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities", Personal Ubiquitous Computing, (21:5), pp. 869–891, DOI:https://doi.org/10.1007/s00779-017-1057-6https://link.springer.com/article/10.1007%2Fs00779-017-1057-6, Springer.
  • M. Hatamian, J. Serna, K. Rannenberg, and B. Igler. 2017. "FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps", 14th International Conference on Trust and Privacy in Digital Business (TrustBus 2017), pp. 3-18, DOI:https://doi.org/10.1007/978-3-319-64483-7_1https://www.m-chair.de/images/documents/publications/Hatamian/2017_Hatamian_TrustBus.pdf, Springer, Lyon, France.
  • M. Hatamian, and J. Serna. 2017. "ARM: ANN-based Ranking Model for Privacy and Security Analysis in Smartphone Ecosystems", 51th Annual IEEE International Carnahan Conference on Security Technologyhttps://www.m-chair.de/images/documents/publications/Hatamian/PID5094909.pdf, IEEE, Madrid, Spain.
  • David Harborth and Sebastian Pape. 2017. "Privacy Concerns and Behavior of Pokémon Go Players in Germany", Proceedings of IFIP Summer School on Privacy and Identity Management – the Smart World Revolution 2017 (IFIPSC2017).
  • Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael B. Tesfay, Andrea Migliavacca, and Felix Hörandner. 2017. "Towards the Adoption of Secure Cloud Identity Services", Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), ACM.
  • Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, and Jetzabel Serna. 2017. "Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences", International Workshop on Data Privacy Management (ESORICS 2017)https://www.m-chair.de/images/documents/publications/Rannenberg/DPM2017.pdf, Springer.
  • David Harborth and Maurice Pohl. 2017. "Standardization of 5G Mobile Networks - A Systematic Literature Review and Current Developments", International Journal of Standardization Research (IJSR), (15:2), DOI:10.4018/IJSR.2017070101, https://www.igi-global.com/article/standardization-of-5g-mobile-networks/202985.
  • Michael Sailer, Carina Hoppenz, Kristian Beckers, Sebastian Pape. 2017. "Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie", In Tagung der Sektion "Empirische Bildungsforschung" -- Educational Research and Governance (AEPF 2017)http://www.smjp.org/files/publications/SHBP17aepf.
  • Kristian Beckers, Daniel Schosser, Sebastian Pape, Peter Schaab. 2017. "A Structured Comparison Of Social Engineering Intelligence Gathering Tools", In: In: Trust, Privacy and Security in Digital Business, pp. 232-246, https://link.springer.com/chapter/10.1007/978-3-319-64483-7_15.
  • Kristian Schaab, Peter Beckers, Sebastian Pape. 2017. "Social engineering defence mechanisms and counteracting training strategies", In: Information and Computer Securityhttp://www.emeraldinsight.com/doi/full/10.1108/ICS-04-2017-0022.
  • David Harborth, Sebastian Pape. 2017. "Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract)", To appear In: Preproceedings of IFIP Summer School on Privacy and Identity Management ? the Smart World Revolution 2017 (IFIPSC2017).
  • N. Arastouie, Omid Tavallaie, Hamid Reza Naji, Masoud Sabaei. 2017. "RTEA: Real-Time and Energy Aware Routing for Industrial Wireless Sensor Networks", Wireless Personal Communications.
  • Dax, Julian; Hamburg, Daniel; Kreusch, Michael; Ley, Benedikt; Pape, Sebastian; Pipek, Volker; Rannenberg, Kai; Schmitz, Christopher; Terhaag, Frank. 2016. "Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger", Multikonferenz Wirtschaftsinformatik (MKWI 2016), Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), Ilmenau, Germany.
  • Nakamura T., Kiyomoto S., Tesfay W., Serna J.. 2016. "Personalised Privacy By Default Preferences - Experiment and Analysis", International Conference on Information Systems Security and Privacy (ICISSP)https://www.m-chair.de/images/documents/publications/Rannenberg/ICISSP.pdf, SCITEPRESS.
  • Shuzhe Yang, Anabel Quan-Haase, Kai Rannenberg. 2016. "The changing public sphere on Twitter: Network structure, elites, and topics of the #righttobeforgotten", New Media & Society, pp. 1-20, DOI:10.1177/1461444816651409, http://nms.sagepub.com/content/early/2016/06/13/1461444816651409.full.pdf+html, Sage Publications.
  • Dax, Julian; Ley, Benedikt; Pape, Sebastian; Schmitz, Christopher; Pipek, Volkmar; Rannenberg, Kai. 2016. "Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions", In: Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany.
  • Shuzhe Yang. 2016. "Understanding the Pain: Examining Individuals’ Online Reputation Management Behaviour and its Obstacles – A Grounded Theory", The 49th Hawaii International Conference on System Sciences (HICSS 2016).
  • Shuzhe Yang, Anabel Quan-Haase. 2016. "People’s sentiment with regard to the right to be forgotten", Social Media and Society.
  • A. Naghizadeh, B. Razeghi, E. Meamari, M. Hatamian, R. Ebrahimi Atani. 2016. "C-Trust: A Trust Management System to Improve Fairness on Circular P2P Networks", Peer-to-Peer Networking and Applications, (9:6), pp. 1128-1144, Springer.
  • M. Hatamian, H. Barati, A. Movaghar, A. Naghizadeh. 2016. "CGC: Centralized Genetic-Based Clustering Protocol for Wireless Sensor Networks using Onion Approach", Telecommunications Systems, (62:4), pp. 657-674, Springer.
  • M. Hatamian, M. Almasi Bardmily, M. Asadboland, M. Hatamian, H. Barati. 2016. "Congestion- Aware Routing and Fuzzy-based Rate Controller for Wireless Sensor Networks", Radioengineering Journal, (25:1), pp. 114-123.
  • Welderufael B. Tesfay, Jetzabel Serna-Olvera. 2016. "Towards User-centered Privacy Risk Detection and Quantification Framework", 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE.
  • Welderufael B. Tesfay, Jetzabel Serna-Olvera. 2016. "Towards User-centered Privacy Risk Detection and Quantification Framework", 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE.
  • Welderufael B. Tesfay, Jetzabel Serna, Sebastian Pape. 2016. "Challenges in Detecting Privacy Revealing Information in Unstructured Text", Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2016) at the International Semantic Web Conference (ISWC) 2016, CEUR-WS.
  • Dan Ionita, Jaap Gordijn, Ahmed Seid Yesuf, and Roel Wieringa. 2016. "Value-Driven Risk Analysis of Coordination Models", 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling https://www.researchgate.net/publication/309475723_Value-Driven_Risk_Analysis_of_Coordination_Models.
  • S. Berenjian, M. Shajari, N. Farshid, M. Hatamian. 2016. " Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment", IEEE 8th International Conference on Intelligent Systems (IS'16), DOI:10.1109/IS.2016.7737389, IEEE.
  • Iulia Bastys (Boloșteanu), Deepak Garg. 2016. "Asymmetric Secure Multi-Execution with Declassification", Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 24-45.
  • Fatbardh Veseli, Jetzabel Serna. 2016. "Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency", In: Trust Management X, IFIPTM 2016, ISBN: 978-3-319-41354-9, pp. 63-78, DOI:10.1007/978-3-319-41354-9_5, https://link.springer.com/chapter/10.1007/978-3-319-41354-9_5, Springer.
  • Kristian Beckers, Sebastian Pape, Veronika Fries. 2016. "HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering", http://ewic.bcs.org/content/ConWebDoc/56973.
  • Peter Schaab, Kristian Beckers, Sebastian Pape. 2016. "A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology", In: Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), ISBN: 9781841024134, pp. 241-251.
  • Kristian Beckers, Sebastian Pape. 2016. "A Serious Game for Eliciting Social Engineering Security Requirements", ISBN: 2332-6441, DOI:10.1109/RE.2016.39, http://ieeexplore.ieee.org/document/7765507/, IEEE.
  • Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo. 2016. "Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers", In: APF 2015: Privacy Technologies and Policy, ISBN: 978-3-319-31456-3, pp. 104-123, DOI:10.1007/978-3-319-31456-3_6, https://link.springer.com/chapter/10.1007%2F978-3-319-31456-3_6, Springer, Cham.
  • N Arastouie, M Sabaei. 2016. "Data forwarding scheme to minimize end-to-end delay in Opportunistic Network", 8th International Symposium on Telecommunications, (5:1).
  • Tschersich, Markus. 2015. "Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options (2015).".
  • Tschersich, Markus; Niekamp, Michael. 2015. "Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites (2015).".
  • Chehrazi, Golriz; Schmitz, Christopher; Hinz, Oliver. 2015. "QUANTSEC - Ein Modell zur Nutzenquantifizierung von IT-Sicherheitsmaßnahmen", In: Proceedings of the 12th International Conference on Wirtschaftsinformatik (WI 2015), Eds. Oliver Thomas; Frank Teuteberg, Osnabrück, Germany.
  • Heim, Stephan; Yang, Shuzhe. 2015. "Content Attractiveness in Enterprise Social Networks", Proceedings of the 2nd European Conference on Social Media (ECSM).
  • Bal, Gökhan; Rannenberg, K., and Hong, J. I. 2015. "Styx: Privacy Risk Communication for the Android Smartphone Platform Based on Apps’ Data-Access Behavior Patterns,", Computers & Security (in press).
  • Ahmad Sabouri. 2015. "Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers", The 14th IFIP Conference on e-Business, e-Services and e-Society (I3E 2015).
  • Ahmad Sabouri. 2015. "A Cloud-based Model to Facilitate Mobility of Privacy-preserving Attribute-based Credential Users", The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications,.
  • Pape S., Serna-Olvera J., Tesfay W.. 2015. "Why open data may threaten your privacy", Workshop on Privacy and Inference (Prinf15) co-located with KI 2015 - The 38th German Conference on Artificial Intelligence, Dresden, September 21-25, 2015.
  • Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J. 2015. "STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper", In: ICSE '16: 38th International Conference on Software Engineering Companion.
  • Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.. 2015. "On Gender Specific Perception of Data Sharing in Japan", In: ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016.
  • Shuzhe Yang. 2015. "Understanding Personal Online Reputation Management: A Grounded Theory Study", In: Proceedings of the 19th Pacific Asia Conference on Information Systems (PACIS 2015).
  • Shuzhe Yang. 2015. "Why Are People So Naïve? Long-term Motivation in Online Reputation Management: A Grounded Theory Study", Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015).
  • A. Naghizadeh, B. Razeghi, I. Radmanesh, M. Hatamian, R. Ebrahimi Atani, and Z. Nadem Norudi. 2015. "Counter Attack to Free-Riders: Filling A Security Hole in Bittorrent Protocol", 12th IEEE International Conference on Networking, Sensing and Control (ICNSC'2015), Taiwan.
  • P. T. Heravi, D. M. Souran, S. Tavakkoli, M. Hatamian, A. Mehrabian, and V. E. Balas. 2015. "Classification of the Liver Disorders Data Using Multi-Layer Adaptive Neuro-Fuzzy Inference System", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), USA.
  • B. Razeghi, M. Hatamian, A. Naghizadeh, S. Sabeti, and G. A. Hodtani. 2015. "A Novel Relay Selection Scheme for Multi-user Cooperation Communications Using Fuzzy Logic", 12th IEEE International Conference on Networking, Sensing and Control (ICNSC'2015), Taiwan.
  • M. Hatamian, H. Barati. 2015. "Priority-based Congestion Control Mechanism for Wireless Sensor Networks using Fuzzy Logic", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), DOI:10.1109/ICC- CNT.2015.7395203, USA.
  • M. Hatamian, S. S. Ahmadpoor, S. Berenjian, B. Razeghi, and H. Barati. 2015. "A Centralized Evolutionary Clustering Protocol for Wireless Sensor Networks", IEEE Computer Society 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT2015), DOI:10.1109/ICCCNT.2015.7395190, USA.
  • M. Hatamian, H. Barati, S. Berenjian, A. Naghizadeh, and B. Razeghi. 2015. "Error Control Coding in Optical Fiber Communication Systems: An Overview", Advances in Computer Science : an International Journal, (4:14), pp. 70-80.
  • M. Hatamian, H. Barati, and A. Movaghar. 2015. "A New Greedy Geographical Routing in Wireless Sensor Networks", Journal of Advances in Computer Research, (6:1), pp. 1-7.
  • Fatbardh Veseli, Jetzabel Serna-Olvera. 2015. "Benchmarking Privacy-ABC Technologies - An Evaluation of Storage and Communication Efficiency", DOI:10.1109/SERVICES.2015.37, http://ieeexplore.ieee.org/document/7196525/, IEEE.
  • Kai Rannenberg, Helmut Reimer. 2015. "Chancen neuer Sicherheitsanker?", Datenschutz und Datensicherheit (DuD), pp. 257-258 , DOI:10.1007/s11623-015-0407-7, https://www.springerprofessional.de/en/chancen-neuer-sicherheitsanker/5903478, Springer Fachmedien Wiesbaden.
  • M Doroudian, N Arastouie, M Talebi, AR Ghanbarian. 2015. "Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction", Second International Conference on Information Security and Cyber Forensics (InfoSec).
  • Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri. 2014. "Towards a Framework for Benchmarking Privacy-ABC Technologies", ISBN: 978-3-642-55415-5, pp. 197-204, http://link.springer.com/chapter/10.1007/978-3-642-55415-5_16, Springer.
  • Bal, Gökhan; Rannenberg, Kai; Hong, Jason. 2014. "Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones", pp. 113–126., http://link.springer.com/chapter/10.1007/978-3-642-55415-5_10, Marrakech.
  • Bal, Gökhan; Rannenberg, Kai . 2014. "User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps", https://m-chair.de/images/documents/publications/Position_Paper_W3C_WPUCC_Bal__Rannenberg.pdf, Berlin.
  • Bal, Gökhan. 2014. "Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps", GA, USA.
  • Bal, Gökhan. 2014. "Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk", Auckland, New Zealand.
  • Pape, Sebastian. 2014. "Sample or Random Security – A Security Model for Segment-Based Visual Encryption", In: Financial Cryptography and Data Security .
  • Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg. 2014. "Trust Relationships in Privacy-ABCs’ Ecosystems", The 11th International Conference on Trust, Privacy & Security in Digital Business.
  • Ahmad Sabouri, Kai Rannenberg. 2014. "ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life - Keynote Paper", The 9th International IFIP Summer School on Privacy and Identity Management for the Future Internet.
  • Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg. 2014. "Privacy-Respecting School Community Interaction Platform", The 3rd Cyber Security and Privacy EU Forum,.
  • Ahmad Sabouri, Ronny Bjones. 2014. "Privacy-ABCs to Leverage Identity Management as a Service", The 2nd EU Annual Privacy Forum.
  • Ahmad Sabouri, Jonas Lindstrøm Jensen, Kasper Lyneborg Damgård, Janus Dam Nielsen, Kai Rannenberg. 2014. "Integrating and trialling Attribute-based Credentials on Smartcards for building Trust - The ABC4Trust project - Keynote Paper", Smartcard Workshop 2014.
  • D. Souran, M. Mir, A. Mehrabian, B. Razeghi, M. Hatamian, S. Sina Sebtahmadi. 2014. "A Performance Comparison of Classical PID Type-1 and Type-2 Fuzzy Controller in a Three Tank Level Control System", IEEE International Symposium on Robotics and Manufacturing Automation, Malaysia.
  • Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti. 2014. "Technische Sicherheit und Informationssicherheit, Unterschiede und Gemeinsamkeiten; Informatik-Spektrum", https://fb-sicherheit.gi.de/fileadmin/FB/SICHERHEIT/AKBegriffsbildungIS-1-2014.pdf, February 2014, Vol. 37, Issue 1, pp. 14-24, DOI: 10.1007/s00287-013-0748-2, https://fb-sicherheit.gi.de/fileadmin/FB/SICHERHEIT/AKBegriffsbildungIS-1-2014.pdf.
  • Kai Rannenberg. 2014. "Where Security Research Should Go in the Next Decade", In: Secure Data Management 2013, 10th VLDB Workshop, ISBN: 978-3-319-06811-4, pp. 28-32, DOI:10.1007/978-3-319-06811-4_6, https://link.springer.com/chapter/10.1007/978-3-319-06811-4_6, Springer, Cham.
  • N Arastouie, M Sabaei. 2014. "Optimal stochastic model for maximizing delivered messages in opportunistic networks", 7'th International Symposium on Telecommunications.
  • Yang, Shuzhe; Albers, Andreas . 2013. "Overcoming Information Overload in Online Reputation Management: A Systematic Literature Review.", Amsterdam, Netherlands.
  • Tschersich, Markus; Botha, Reinhardt . 2013. "Understanding the Impact of Default Privacy Settings on Self-Disclosure in Social Networking Services: Building a Conceptual Model and measurement instrument.", Chicago, USA.
  • Schreiber, Tobias; Deuker, André; Albers, Andreas; Neves, Mickel . 2013. "The Privacy Trade-Off: App Usage on OSN", Chicago, USA.
  • Leontaridis, Lefteris; Andersson, Thomas; Leitold, Herbert; Zwattendorfer, Bernd; Yang, Shuzhe; Lindholm, Pasi . 2013. "The INDI Ecosystem of privacy-aware", pp. 45-57, Wiesbaden, Germany.
  • Krontiris, Ioannis; Dimitriou, Tassos . 2013. "Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications", Cambridge, Massachusetts.
  • Kahl, Christian; Albers, Andreas . 2013. "How to unleash the Virus".
  • Fischer-Hübner, Simone; Krontiris, Ioannis, Rannenberg, Kai; Waidner, Michael; Bowden, Caspar . 2013. "Online Privacy: Towards Informational Self-Determination on the Internet", In: Digital Enlightenment Yearbook, Eds. .
  • Benenson, Zinaida; Krontiris, Ioannis; Rannenberg, Kai; Schröder, Dominik; Schopf, Alexander; Stamatiou, Yannis; Liagkou, Vasiliki. 2013. "Understanding and Using Anonymous Credentials, poster at the 9th Symposium On Usable Privacy and Security (SOUPS 2013)", Newcastle, United Kingdom.
  • Benenson, Zinaida; Girard, Anna; Krontiris, Ioannis; Liagkou, Vasiliki; Rannenberg, Kai; Stamatiou, Yannis . 2013. "User Acceptance of Privacy-ABCs: An Exploratory Study", Heraklion, Greece.
  • Albers, Andreas; Krontiris Ioannis; Sonehara, Noboru; Echizen, Isao . 2013. "Coupons as Monetary Incentives in Mobile Participatory Sensing", Athens, Greece.
  • Acquisti, Alessandro; Krontiris, Ioannis; Langheinrich, Marc; Sasse, Angela. 2013. "My Life, Shared - Trust and Privacy in the Age of Ubiquitous Experience Sharing".
  • Bleikertz, Sören; Mastelic, Toni; Pape, Sebastian; Pieters, Wolter; Dimkov, Trajce. 2013. "Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers", In: Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pp. 78-87.
  • Samuel Idowu, Desta Haileselassie Hagos, Welderufael B Tesfay, Abiola Famurewa, Juel Rana, Kare Synnes. 2013. "NexTrend: Context-aware music-relay corridors using NFC tags", Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 .
  • Samuel Idowu, Desta Haileselassie Hagos, Welderufael B Tesfay, Abiola Famurewa, Juel Rana, Kare Synnes. 2013. "Welderufael Berhane Tesfay Welderufael Berhane Tesfay NexTrend: Context-aware music-relay corridors using NFC tags", Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013, IEEE.
  • Welderufael B Tesfay, Markus Aleksy, Karl Andersson, Marko Lehtola. 2013. "Mobile computing application for industrial field service engineering: A case for ABB service engineers", Local Computer Networks Workshops (LCN Workshops), IEEE.
  • N Arastouie, M Sabaei, V Hakami, S Soltanali. 2013. "A novel trade–off between communication and computation costs for data aggregation in wireless sensor networks", International Journal of Ad Hoc and Ubiquitous Computing, (12:4).
  • N Arastouie,E. Salimi, S. Soltanali. 2013. "Detecting Botnets in View of an Efficient Method", International Journal of Advance Research and Computer Science, (9:4).
  • Yang, Shuzhe; Bal, Gökhan . 2012. "Balancing Security and Usability of Local Security Mechanisms for Mobile Devices", Crete, Greece.
  • Sabouri, Ahmad; Krontiris, Ioannis; Rannenberg, Kai. 2012. "Attribute-based Credentials for Trust (ABC4Trust)", Austria.
  • Luna, Jesus; Suri,Neeraj; Krontiris, Ioannis. 2012. "Privacy-by-Design Based on Quantitative Threat Modeling", Cork, Ireland.
  • Kahl, Christian . 2012. "Create Attention to Attract Attention".
  • Krontiris, Ioannis; Albers, Andreas . 2012. "Monetary Incentives in Participatory Sensing using Multi-Attributive Auctions", International Journal of Parallel, Emergent and Distributed Systems.
  • Gürses Seda; Krontiris, Ioannis; Sabouri, Ahmad; Pashalidis, Andreas; Yang, Shuzhe; Zwattendorfer, Bernd. 2012. "A Privacy Policy Framework for the INDI ecosystem", GINI.
  • Dimitriou, Tassos; Krontiris, Ioannis; Sabouri, Ahmad. 2012. "PEPPeR: A querier's Privacy Enhancing Protocol for PaRticipatory sensing", Frankfurt, Germany.
  • Deuker, André; Rosenkranz, Christoph; Albers, Andreas . 2012. "The usage of individual privacy settings on social networking sites - Drawing desired digital images of oneself", Barcelona, Spain.
  • Deuker, André . 2012. "Friend-to-Friend Privacy Protection on Social Networking Sites: A Grounded Theory Study", Washington, USA.
  • Deuker, André; Albers, Andreas . 2012. "Who Cares - Content Sharing on Social Networking Sites", Ho Chi Minh City, Vietnam.
  • Camenisch, Jan; Krontiris, Ioannis; Lehmann, Anaj; Neven, Gregory; Paquin, Christian; Rannenberg, Kai; Zwingelberg, Harald. 2012. "ABC4Trust Architecture for Developers", ABC4Trust.
  • Bal, Gökhan . 2012. "Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications", San Francisco, USA.
  • Bjones, Ronny; Krontiris, Ioannis; Paillier, Pascal; Rannenberg, Kai. 2012. "Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication", Limassol, Cyprus.
  • Pape, Sebastian; Schöch, Christof; Wegner, Lutz. 2012. "TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions", Journal of the Text Encoding Initiative, (2:), pp. 1-16, http://jtei.revues.org/432.
  • Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri. 2012. "PEPPeR: A querier's Privacy Enhancing Protocol for PaRticipatory sensing", The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems.
  • Welderufael Berhane Tesfay, Todd Booth, Karl Andersson. 2012. "Reputation based security model for android applications", IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE.
  • N. Arastouie. 2012. " Behavioral analysis of a Yj1 Bot", National conference and workshop in ITRC (Iran Telecommunication Research Center) on cyber security.
  • N. Arastouie. 2012. "How to detect victim bots and C&C using Pcap", National conference and workshop in ITRC (Iran Telecommunication Research Center) on cyber security.
  • O Tavallaie, HR Naji, M Sabaei, N Arastouie. 2012. "Providing QoS Guarantee of Timeliness in Wireless Sensor Networks with a New Routing Methodology", 6th International Symposium on Telecommunications.
  • Tschersich, Markus . 2011. "Design Guidelines for Mobile Group Recommender Systems to handle inaccurate or missing Location Data.".
  • Tschersich, Markus; Kahl, Christian; Heim, Stephan; Crane, Stephen; Böttcher, Katja; Krontiris, Ioannis; Rannenberg, Kai. 2011. "Towards Privacy-enhanced Mobile Communities - Architecture", Journal of Systems and Software, Special Issue: Mobile Applicationshttp://dx.doi.org/10.1016/j.jss.2011.06.048, Elsevier.
  • Krontiris, Ioannis; Leitold, Herbert; Posch, Reinhard; Rannenberg, Kai. 2011. "eID Interoperability", Publicis Publishing, Erlangen, Germany.
  • Krontiris, Ioannis; Maisonneuve, Nicolas. 2011. "Participatory Sensing: The Tension between Social Translucence and Privacy", In: Trustworty Internet, Eds. .
  • Krontiris, Ioannis; Dimitriou, Tassos . 2011. "Scatter - Secure Code Authentication for Efficient Reprogramming in Wireless Sensor Networks", International Journal of Sensor Networks, (10:2), pp. p.14-24.
  • Koschinat, Sascha; Bal, Gökhan; Weber, Christian; Rannenberg, Kai . 2011. "Privacy by Sustainable Identity Management Enablers.", In: Privacy and Identity Management for Life, ISBN: 978-3-642-20317-6, pp. 431- 452, Springer, Heidelberg, Germany.
  • Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai . 2011. "Profit vs. Privacy - Advanced Targeted Advertising for Social Networks.".
  • Fritz, Marcel; Schlereth, Christian; Figge, Stefan . 2011. "Empirische Evaluation von Fair-Use Flatrate-Strategien für das mobile Internet".
  • Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai . 2011. "Privacy respecting targeted advertising for social networks", Heraklion, Greece.
  • Fritz, Marcel; Schlereth, Christian; Figge, Stefan . 2011. "Empirical evaluation of fair-use flat rate strategies for mobile Internet".
  • Fischer-Hübner, Simone; Hoofnagle, C,; Krontiris, Ioannis; Rannenberg, Kai; Waidner, Michael. 2011. "Empirical evaluation of fair-use flat rate strategies for mobile Internet, Business & Information Systems Engineering".
  • Camenisch, Jan; Krontiris, Ioannis; Lehmann, Anja; Neven, Gregory; Paquin, Christian; Rannenberg, Kai; Zwingelberg, Harald. 2011. "D2.1 Architecture for Attribute-based Credential Technologies – Version 1".
  • Albers, Andreas . 2011. "Auswirkungen der Verfügbarkeit von Kontextinformationen über mobile Nutzer auf die Vermarktung mobiler Werbeträgerleistung", Zurich, Swiss.
  • Heim, Stephan; Böttcher, Katja, Rannenberg, Kai. 2011. "Social Networks und Netzwerkmanagement – Kann man aus der Datenschutzdiskussion zu Social Networks für das Netzwerkmanagement lernen?", Proceedings der Konferenz interPM in Glashütten 2011, In: Neu denken: vom Projekt- zum Netzwerkmanagement, Eds. Martin Engstler; Reinhard Wagner , pp. 11-24, dPunkt Verlag, Heidelberg, 2011.
  • Tassos Dimitriou, Ahmad Sabouri. 2011. "Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks", The 10th IEEE International Conference on Trust, Security and Privacy in Com- puting and Communications (IEEE TrustCom’11).
  • Ahmad Sabouri, Nikos Komninos, Christos Douligeris. 2011. "User Dependent Cryptography for Security in Fu- ture Mobile Telecommunication Systems", The 8th International Conference on Telecommunications (ICT 2011).
  • Tassos Dimitriou, Ahmad Sabouri. 2011. "Privacy Preservation Schemes for Querying Wireless Sensor Networks", The 7th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS ’11).
  • Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner. 2011. "Online Privacy: Towards Informational Self-Determination on the Internet ", pp. 1-20, http://drops.dagstuhl.de/opus/volltexte/2011/3205/pdf/dagman_v001_i001_p001_11061.pdf, Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
  • E Salimi, N Arastouie. 2011. " Backdoor Detection System Using Artificial Neural Network and Genetic Algorithm", International Conference on Computational and Information Sciences.
  • Royer, Denis . 2010. "Development of a theoretical Model for Explaining and Predicting the Impacts of Enterprise Identity Management Introductions", Pretoria, South Africa.
  • Rannenberg, Kai; Kahl, Christian; Böttcher, Katja . 2010. "Communities, Mobilität und Datenschutz. Innovative Konzepte zum Schutz der Privatsphäre im Projekt PICOS", Forschung Frankfurt, (2010:1), ISBN: 0175-0992, http://www.muk.uni-frankfurt.de/FFFM/dok/2010/08Datenschutz.pdf, Frankfurt, Germany.
  • Krontiris, Ioannis; Freiling, Felix; Dimitriou, Tassos . 2010. "Location Privacy in Urban Sensing Networks: Research Challenges and Directions", IEEE Wireless Communications Magazine, (17:5), pp. p30-35.
  • Krontiris, Ioannis; Freiling, Felix . 2010. "Urban Sensing through Social Networks: The Tension between Participation and Privacy", Island of Ponza, Italy.
  • Krontiris, Ioannis; Freiling, Felix . 2010. "Integrating People-centric Sensing with Social Networks: A privacy Research Agenda", Mannheim, Germany.
  • Krontiris, Ioannis; Albers, Andreas; Rannenberg, Kai . 2010. "W3C Geolocation API calls for Better User Privacy Protection", http://www.web-portal-system.de/wps/wse/dl/showfile/rannenberg/5499/W3C-Workshop.pdf, London, United Kingdom.
  • Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai . 2010. "Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project", ISBN: 978-3-642-17693-7, Springer, Ghent, Belgium.
  • Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai . 2010. "How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project", ISBN: 978-3642152566, http://www.springer.com/computer/communication+networks/book/978-3-642-15256-6, Springer, Brisbane, Australia.
  • Kahl, Christian; Albers, Andreas . 2010. "Towards reasonable Revenue Streams through Marketing in Mobile Social Networks", Göttingen, Germany.
  • Giannetsos, Thanassis; Krontiris, Ioannis; Dimitriou, Tassos; Prasad, N.R. . 2010. "Arbitrary Code Injection through Self-propagating Worms", In: Architecture Devices, Eds. .
  • Deuker, André . 2010. "Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services", In: Privacy and Identity Management for Life, Eds. .
  • Pape, Sebastian; Schöch, Christof; Wegner, Lutz. 2010. "Bringing Bèrardier de Bataut's Essai sur le rècit to the Web: Editorial Requirements and Publishing Framework (Poster)", In: Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortiumhttp://www.sebastian-pape.de/fileadmin/docs/literatur/publ/1011-pape_schoech_wegner-tei_framework_poster.pdf.
  • Seyyed Ehsan Mahmoudi, Alireza Akhondi-Asl, Roohollah Rahmani, Shahrooz Faghih-Roohi, Vahid Taimouri, Ahmad Sabouri, Hamid Soltanian-Zade. 2010. " Web-based interactive 2D/3D medical image processing and visualization software", Journal of Computer Methods and Programs in Biomedicine,.
  • Ahmad Sabouri, Adel Ardalan, Reza Shahidi-Nejad. 2010. "Classification of Protein Secondary Structure Based on NMR Chemical Shift Data Using Support Vector Machines", The 12th International Conference on Computer Modelling and Simulation (UKSim 2010).
  • N Arastouie, M Sabaei, HS Shahreza. 2010. "A Novel approach for trade-off between computation and communication cost in wireless sensor network", , The 12th International Conference on Advanced Communication Technolog.
  • N Arastouie, M Sabaei, HS Shahreza. 2010. " Adaptive Approach for Reducing Energy Consumption, Considering Nodes’ Mission in Wireless Sensor Networks", , Second International Conference on Communication Software and Networks.
  • Weiss, Stefan . 2009. "Privacy Threat Model for Data Portability in Social Network Applications".
  • Scherner, Tobias; Muntermann, Jan; Roßnagel, Heiko . 2009. "Integrating Value-Adding Services into an Emergency Management System for Tourist Destinations", Verona, Italy.
  • Royer, Denis; Rannenberg, Kai . 2009. "Open Challenges – Towards the (Not So Distant) Future of Identity", In: The Future of Identity - Challenges and Opportunities, ISBN: 978-3-540-88480-4, http://www.springer.com/978-3-540-88480-4, Springer, Heidelberg, Germany.
  • Royer, Denis; Deuker, André; Rannenberg, Kai . 2009. "Mobility and Identity", ISBN: 3-540-88480-07, Springer, Heidelberg, Germany.
  • Royer, Denis; Meints, Martin . 2009. "Enterprise Identity Management - Towards a Decision Support Framework based on the Balanced Scorecard Approach", Business & Information Systems Engineering, (1:3), ISBN: 1867-0202, pp. 245-253..
  • Krontiris, Ioannis . 2009. "Sensor Networks Security for Pervasive Healthcare", In: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, Eds. , ISBN: 978-1615207657.
  • Hegen, Marvin . 2009. "Good bye Medienbruch – Wie Mobile Tagging die Welt verknüpft und das Handy zum Barcodescanner wird", Wirtschaftsinformatik und Management, (2009:4).
  • Franz, Elke; Liesebach Katja . 2009. "Supporting Local Aliases as Usable Presentation of Secure Pseudonyms", Linz, Austria.
  • Crespo, Alberto; Mendez, Rubén; Liesebach, Katja . 2009. "Climbing towards trust and privacy management in social mobile communities", Barcelona, Spain.
  • Bal, Gökhan; Kuntze, Nicolai; Schmidt, Andreas U. . 2009. "Injecting trust to cryptographic Key Management", Phoenix Park, Korea.
  • Hildenbrand, Tobias und Scheibmayr, Sven und Heim, Stephan. 2009. "Entwicklungshilfe: Software über Betriebsgrenzen hinweg erstellen", Wirtschaftsinformatik & Management .
  • Pape, Sebastian. 2009. "A Survey on Non-transferable Anonymous Credentials", In: The Future of Identity in the Information Society, pp. 107-118, http://www.sebastian-pape.de/fileadmin/docs/literatur/publ/0907-pape-nontransferable_anon_credentials.pdf, Springer Boston, Brno, Czech Republic.
  • Tannaz Alinaghi, Camelia Ghoroghi, Ahmad Sabouri, Reza Basseda. 2009. "A Framework for Dependency Evaluation of the Agent oriented Methodologies workflow", The 3rd IEEE Theoretical Aspects of Software Engineering Conference (TASE 2009).
  • Ehsan Valavi, Hamid Reza As’adi, Ahmad Sabouri.. 2009. "Resource Allocation in Wireless Sensor Network using Multi-Armed Bandit Problem", The 3rd International Workshop on Localized Algorithms and Pro- tocols for Wireless Sensor Networks (LOCALGOS 2009).
  • N. Arastouie. 2009. "Soundmix: A Case-study of Malware Analysis", National conference on malware analysis.
  • N. Arastouie. 2009. "How to detect and analysis malwares with appropriate tools", National conference and workshop in ITRC on cyber security.
  • N. Arastouie. 2009. "Survey on spyware and solution to protect from them", National conference and workshop in ITRC on cyber security.
  • Zibuschka, Jan; Roßnagel, Heiko . 2008. "Implementing Strong Authentication Interoperability with Legacy Systems", Rotterdam, Netherlands.
  • Weiss, Stefan . 2008. "Using the Concept of Topic Maps for Enhancing Information Privacy in Social Networking Applications", Lecture Notes in Informatics, Saarbrücken, Germany.
  • Weiss, Stefan . 2008. "Privacy Threat Model for Data Portability in Social Network Applications", Ontario, Canada.
  • Scherner, Tobias; Muntermann, Jan . 2008. "Sustainable Growth for the Pacific-Asia Tourism Industry: Addressing Natural Disasters and Business Opportunities with Mobile ICT", Suzhou, China.
  • Royer, Denis; Meints, Martin . 2008. "Planung und Bewertung von Enterprise Identity Managementsystemen", Datenschutz und Datensicherheit, (32:3), ISBN: 0724-4371, pp. 189–193..
  • Royer, Denis . 2008. "Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach", pp. 779-786, IEEE Publishing, Barcelona, Spain.
  • Royer, Denis . 2008. "Enterprise Identity Management – What’s in it for Organisations?", pp. 403-416, Karlstad, Sweden.
  • Royer, Denis . 2008. "Ganzheitliche Bewertung von Enterprise Identity Management Systemen – Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterstützungsinstrument", pp. 449-460, Saarbrücken, Germany.
  • Roßnagel, Heiko; Zibuschka, Jan . 2008. "Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen", Saarbrücken, Germany.
  • Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2008. "Identitätsmanagement und Privatsphäre. Vertrauen und Kontrolle in Mobilen Contentumgebungen", In: Prozessgestaltung in der Medienproduktion. Neue Geschäftsmodelle und Technologien für Mobile Portale und HD Broadcast, Eds. , GITO, Berlin, Germany.
  • Radmacher, Mike . 2008. "Adaptive Customer Profiles For Context Aware Services in a Mobile Environment", IFIP International Federation for Information Processing, (251:), pp. 390-399, Wuhan, China.
  • Radmacher, Mike . 2008. "Design Criteria for Transparent Mobile Event Recommendations", Ontario, Canada.
  • Radmacher, Mike . 2008. "A Procedure of How to conduct Research in Transparent Mobile Recommendations", IFIP International Federation for Information Processing, (286:), pp. 49–60, Tokyo, Japan.
  • Meints, Martin; Royer, Denis . 2008. "Der Lebenszyklus von Identitäten", Datenschutz und Datensicherheit, (32:3), ISBN: 0724-4371, pp. 201..
  • Krontiris, Ioannis; Giannetsos, Thanassis; Dimitriou, Tassos; Freiling, Felix.C. . 2008. "Intrusion Detection in Wireless Sensor Networks", ISBN: 978-1420068399, Auerbach Publications.
  • Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos . 2008. "Privacy issues in location based services - Legal considerations on privacy-enhancing Location Based Services using PRIME technology", Computer Law & Security Report, (24:2), pp. 137-146..
  • Groth, Sven; Muntermann, Jan . 2008. "A Text Mining Approach to Support Intraday Financial Decision-Making", Toronto, Canada.
  • Deuker, André; Radmacher, Mike . 2008. "Individualisierungsmöglichkeiten im Mobile TV - Ein werbebasierter Geschäftsmodellansatz", pp. 39-52, Munich, Germany.
  • Deuker, André; Radmacher, Mike . 2008. "Multicast and Individual Service Provisioning in Mobile TV".
  • Albers, Andreas; Kahl, Christian . 2008. "Design and Implementation of context-sensitive Mobile Marketing Platforms", Washington DC, USA.
  • Albers, Andreas; Kahl, Christian . 2008. "Prototypical Implementation of an Intermediary Platform for Context-sensitive Mobile Marketing Applications", Toronto, Canada.
  • Pape, Sebastian; Benamar, Nabil. 2008. "Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy", In: The Future of Identity in the Information Society, Eds. Fischer-Hübner, Simone; Duquenoy, Penny; Zuccato, Albin; Martucci, Leonardo, ISBN: 978-0-387-79026-8, pp. 299-310, http://www.sebastian-pape.de/fileadmin/docs/literatur/publ/0806-pape_benamar-id_based_pk_crypto.pdf, Springer Boston.
  • N Arastouie, MR Razzazi. 2008. "Hunter: An Anti-spyware for windows Operating System", , 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
  • Zibuschka, Jan; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Empowering LBS Users: Technical, Legal and Economic Aspects", The Hague, Netherlands.
  • Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning", Sandton, South Africa.
  • Zibuschka, Jan; Fritsch, Lothar; Radmacher, Mike; Scherner, Tobias; Rannenberg, Kai . 2007. "Privacy-Friendly LBS: A Prototype-supported Case Study", CO, USA.
  • Weiss, Stefan . 2007. "The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications", Karlstad, Sweden.
  • Scherner, Tobias . 2007. "Enabling Efficient and Privacy-friendly Location-based Services with Standardized Intermediary Infrastructures", Colorado, USA.
  • Royer, Denis . 2007. "Enterprise Identity Management – What’s in it for Organisations?", Karlstad, Sweden.
  • Roßnagel, Heiko; Zibuschka, Jan . 2007. "Integrating Qualified Electronic Signatures with Password Legacy Systems", Digital Evidence Journal, (4:1), pp. 5-11, Pario Comm. Ltd..
  • Roßnagel, Heiko . 2007. "Sichere Mobile Finanzdienstleistungen", digma. Zeitschrift für Datenrecht und Informationssicherheit, (7:1), pp. 12-15..
  • Roßnagel, Heiko; Hinz, Oliver . 2007. "Zahlungsbereitschaft für elektronische Signaturen", In: Wirtschaftsinformatik 2007, Eds. , Universitätsverlag Karlsruhe, Karlsruhe, Germany.
  • Radmacher, Mike; Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2007. "Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher", Karlsruhe, Germany.
  • Radmacher, Mike . 2007. "Elicitation of Profile Attributes by Transparent Communication", pp. 199-202, Minnesota, USA.
  • Nickerson, Robert C.; Varshney, Upkar; Muntermann, Jan; Isaac, Henri . 2007. "Towards a Taxonomy of Mobile Applications", Colorado, USA.
  • Muntermann, Jan; Güttler, André . 2007. "Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case", Journal of International Financial Markets, Institutions and Money, (17:1), pp. 1-24..
  • Muntermann, Jan . 2007. "Event-driven Mobile Financial Information Services – Design of an Intraday Decision Support System".
  • Krontiris, Ioannis; Dimitriou, Tassos; Salajegheh, Mastooreh; Soroush, Hamed . 2007. "WSN Link-Layer Security Frameworks", In: Wireless Sensors Networks Security, Eds. , ISBN: 978-1586038137, IOS Press.
  • Krontiris, Ioannis; Dimitriou, Tassos . 2007. "Secure Network Programming in Wireless Sensor Networks", In: Security in Distributed and Networking Systems, Eds. , ISBN: 978-9812708076, World Scientific Publishing Co.
  • Kosta, Eleni; Zibuschka, Jan; Scherner, Tobias; Dumortier, Jos . 2007. "Privacy-enhancing user-friendly Identity Management for Location Based Services using PRIME technology – A legal discussion", Beijing, China.
  • König, Wolfgang; Fritsch, Lothar . 2007. "Innovationsförderung im öffentlichen Umfeld durch Public Private Partnerships - Das Beispiel der Satellitennavigation", Frankfurt, Germany.
  • Kohlweiss, Markulf; Gedrojc, Bartek; Fritsch, Lothar; Preneel, Bart . 2007. "Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker", Ottawa, Canada.
  • Fritsch, Lothar . 2007. "Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering", Journal of Theoretical and Applied E-Commerce research, (2:3), pp. 1-17..
  • Eicker, Stefan; Spies, Thorsten; Kahl, Christian . 2007. "Softwarevisualisierung im Kontext serviceorientierter Architekturen", ISBN: 1860-2770, Universität Duisburg-Essen, Essen, Germany.
  • Eicker, Stefan; Spies, Thorsten; Kahl, Christian . 2007. "Software Visualization in the Context of Service-Oriented Architectures", Banff, Canada.
  • Borcea-Pfitzmann, Katrin; Liesebach, Katja . 2007. "The concept of workspaces - re-defined for eLearning".
  • Borcea-Pfitzmann, Katrin; Hansen, Marit; Liesebach, Katja; Pfitzmann, Andreas; Steinbrecher, Sandra. 2007. "Managing One".
  • Albers, Andreas . 2007. "An Electronic Market Framework for context-sensitive Mobile Consumer Profiles in the Marketing Domain", CO, USA.
  • Albers, Andreas . 2007. "Allokation und Bepreisung kontextbezogener Kundenkontakte im Mobile Marketing", Karlsruhe, Germany.
  • Tobias Hildenbrand, Alla Korchminskaya, Stephan Oswald, Eike Bieber, Jean-Pierre Berchez, Niels Maché. 2007. "Konzeption einer Kollaborationsplattform für die zwischenbetriebliche Softwareerstellung", Wirtschaftsinformatik, (49:(4)), pp. 247-256.
  • Zibuschka, Jan; Scherner, Tobias; Fritsch, Lothar; Rannenberg, Kai . 2006. "Towards a Unified Interface for Privacy Regulation-conformant Location-based Services", http://www.w3.org/2006/07/privacy-ws/, Ispra, Italy.
  • Scherner, Tobias . 2006. "Privacy as an enabler for new communities - an example of a leisure-time community", FIDIS, Långholmen, Sweden.
  • Scherner, Tobias; Zibuschka, Jan; Rannenberg, Kai . 2006. "Präsentation: Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen", In: DIN Workshop Ortsbasierte Dienste unter Nutzung verschiedener mobiler Infrastrukturen, u.a. Ad-hoc Networking, Eds. , Berlin, Germany.
  • Royer, Denis; Rannenberg, Kai . 2006. "Mobilität", Datenschutz und Datensicherheit, (30:9), ISBN: 0724-4371, pp. 571–575, http://www.springerlink.com/content/m55456705566quuq/.
  • Royer, Denis; Deuker, André . 2006. "Komplexe Kommunikation - Der Einsatz von TYPO3 für Forschungsprojekte", T3N: Magazin für Open Source und TYPO3, (1:), Hannover, Germany.
  • Roßnagel, Heiko; Zibuschka, Jan . 2006. "Single Sign On mit Signaturen - Integration von elektronischen Signaturen und Passwortsystemen", Datenschutz und Datensicherheit, (30:12), pp. 773-777, Wiesbaden, Germany.
  • Roßnagel, Heiko; Scherner, Tobias . 2006. "Secure Mobile Notifications of Civilians in Case of a Disaster", pp. 33-42, Crete, Greece.
  • Roßnagel, Heiko; Royer, Denis . 2006. "Wirtschaftlichkeit mobiler qualifizierter Signaturen im E-Government", In: Informatik 2006 - Informatik für Menschen, pp. 451-459., Dresden, Germany.
  • Roßnagel, Heiko . 2006. "On Diffusion and Confusion - Why Electronic Signatures Have Failed", Krakow, Poland.
  • Muntermann, Jan; Roßnagel, Heiko . 2006. "Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures", Journal of Information System Security, (2:1), pp. 27-43..
  • Muntermann, Jan; Milic Frayling, Natasa . 2006. "Enhancing Asynchronous User Communication with Cross Platform and Channel Agnostic Messaging Services", Acapulco, Mexico.
  • Fritsch, Lothar; Scherner, Tobias; Rannenberg, Kai . 2006. "Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur", Praxis der Informationsverarbeitung und Kommunikation, Mannheim, Germany.
  • Fritsch, Lothar . 2006. "Der Rüstungswettlauf um das elektronische Geld", Frankfurt, Germany.
  • Fritsch, Lothar; Roßnagel, Heiko . 2006. "Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht", In: Kontaktbehaftet oder kontaktlos: auf jeden Fall Sicherheit, Eds. , Berlin, Germany.
  • Figge, Stefan; Theysohn, Sven . 2006. "Quantifizierung IKS-basierter Marktleistungen - Analyse eines werbefinanzierten Geschäftsmodells für den Mobile Commerce", WIRTSCHAFTSINFORMATIK, (48:2).
  • Franz, Elke; Liesebach, Katja; Borcea-Pfitzmann, Katrin. 2006. "Privacy-Aware User Interfaces within Collaborative Environments", pp. 45-48..
  • Dimitriou, Tassos; Krontiris, Ioannis; Nikakis, Fotios. 2006. "Fast and Scalable Key Establishment in Sensor Networks", In: Sensor Network Operations, ISBN: 978-0471719762, pp. 557-570, Wiley-IEEE Press.
  • Dimitriou, Tassos; Krontiris, Ioannis . 2006. "GRAViTy: Geographic Routing Around Voids", The International Journal of Pervasive Computing and Communications.
  • Dimitriou, Tassos; Krontiris, Ioannis . 2006. "Secure In-Network Processing in Sensor Networks", In: Security in Sensor Networks, Eds. , ISBN: 978-0849370588.
  • Deng, Mina; Fritsch, Lothar; Kursawe, Klaus . 2006. "Personal Rights Management - Taming camera-phones for individual privacy enforcement", Cambridge, United Kingdom.
  • Borcea-Pfitzmann, Katrin; Hansen, Marit; Liesebach, Katja; Steinbrecher, Sandra; Pfitzmann, Andreas. 2006. "What User-Controlled Identity Management Should Learn from Communities", Technical Report, (11:3), pp. 119-128..
  • Royer, Denis . 2005. "How to cope with complexity: The usage of Typo3 for Research Projects", Karlsruhe, Germany.
  • Scherner, Tobias; Fritsch, Lothar . 2005. "Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure".
  • Roßnagel, Heiko; Royer, Denis . 2005. "Making Money with Mobile Qualified Electronic Signatures", pp. 110-118, Copenhagen, Denmark.
  • Roßnagel, Heiko; Royer, Denis . 2005. "Investing in security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators? ", Nebraska, USA.
  • Roßnagel, Heiko; Royer, Denis . 2005. "Profitability of Mobile Qualified Electronic Signatures", Bangkok, Thailand.
  • Roßnagel, Heiko; Murmann, Tobias . 2005. "How Secure are Current Mobile Operating Systems?", Windermere, United Kingdom.
  • Roßnagel, Heiko; Fritsch, Lothar . 2005. "Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht", In: Sicherheit - Schutz und Zuverlässigkeit, Eds. , Regensburg, Germany.
  • Rannenberg, Kai; Schneider, Ingo; Figge, Stefan . 2005. "Mobile Systeme und Anwendungen - Editorial zum Schwerpunktheft", WIRTSCHAFTSINFORMATIK, (47:1).
  • Rannenberg, Kai; Albers, Andreas; Figge, Stefan; Radmacher, Mike; Roßnagel, Heiko . 2005. "Mobile Commerce – Forschungsfragen am Scheideweg der Mobilfunkgenerationen", Augsburg, Germany.
  • Pisko, Evgenia; Rannenberg, Kai; Roßnagel, Heiko . 2005. "Trusted Computing in Mobile Platforms - Players, Usage Scenarios, and Interests", Datenschutz und Datensicherheit, (29:9), pp. 526-530., https://www.m-chair.de/images/documents/publications/Rannenberg/DuD_Mobile_Trusted_Computing_20050814.pdf.
  • Murmann, Tobias; Roßnagel, Heiko . 2005. "Sicherheitsanalyse von Betriebssystemen für Mobile Endgeräte", In: SICHERHEIT 2005, Sicherheit - Schutz und Zuverlässigkeit, Eds. , Regensburg, Germany.
  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai . 2005. "Mobile Brokerage Infrastructures - Capabilities and Security Requirements", http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5671/, Regensburg, Germany.
  • Muntermann, Jan; Janssen, Lars . 2005. "Assessing Customers’ Value of Mobile Financial Information Services – Empirical-based Measures", Las Vegas, USA.
  • Muntermann, Jan . 2005. "Automated Mobile Alerting Services - Towards A Level Playing Field in the Financial Community", Journal of Electronic Commerce Research, (6:3).
  • Lippmann, Silvia; Roßnagel, Heiko . 2005. "Geschäftsmodelle für signaturgesetzkonforme Trust Center", In: Wirtschaftsinformatik 2005, Eds. , Physica, Bamberg, Germany.
  • Liesebach, Katja . 2005. "Kontext- und zielgruppenspezifische Repräsentation von Lernmaterialien mit Hilfe von semantischen Netzen", Rostock, Germany.
  • Koelsch, Tobias; Fritsch, Lothar; Kohlweiss, Markulf; Kesdogan, Dogan . 2005. "Privacy for Profitable Location Based Services", pp. 164-179, Boppard, Germany.
  • Hess, Thomas; Kaspar, Christian; Rauscher, Barbara; Figge, Stefan; et al., . 2005. "Technische Möglichkeiten und Akzeptanz mobiler Anwendungen - Eine interdisziplinäre Betrachtung", WIRTSCHAFTSINFORMATIK, (47:1).
  • Fritsch, Lothar; Stephan, Kerstin; Grohmann, Alexander . 2005. "Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle", Dresden, Germany.
  • Fritsch, Lothar; Scherner, Tobias . 2005. "Schutz der Privatsphäre wahren: Sichere Bevölkerungswarnung per Handy", WIK - Zeitschrift für Sicherheit in der Wirtschaft, (3:), Ingelheim, Germany.
  • Fritsch, Lothar; Scherner, Tobias . 2005. "A Multilaterally Secure, Privacy-Friendly Location-based Service for Disaster Management and Civil Protection", pp. 1130-1137, La Réunion, France.
  • Fritsch, Lothar; Rannenberg, Kai . 2005. "Mobile Goverment", Otto Schmidt, Düsseldorf, Germany.
  • Fritsch, Lothar; Roßnagel, Heiko; Schwenke, Matthias; Stadler, Tobias . 2005. "Die Pflicht zum Angebot anonym nutzbarer Dienste - Eine technische und rechtliche Zumutbarkeitsbetrachtung", Datenschutz und Datensicherheit, (29:10), pp. 592-596, Wiesbaden, Germany.
  • Fritsch, Lothar; Muntermann, Jan . 2005. "Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location Based Service-Angeboten", In: Lecture Notes on Informatics, Eds. , Augsburg, Germany.
  • Figge, Stefan; Albers, Andreas . 2005. "Individualising M-Commerce Services by Semantic User Situation Modelling", Bamberg, Germany.
  • Deng, Mina; Fritsch, Lothar; Kursawe, Klaus . 2005. "Personal Rights Management - enabling privacy rights in digital online content", Salzburg, Austria.
  • Borcea-Pfitzmann, Katrin; Liesebach, Katja; Wahrig, Hagen. 2005. "Das Workspace-Konzept - neu verpackt im eLearning!", Rostock, Germany.
  • Borcea-Pfitzmann, Katrin; Liesebach, Katja; Pfitzmann, Andreas. 2005. "Establishing a Privacy-Aware Collaborative eLearning Environment", Rome, Italy.
  • Borcea, Katrin; Donker, Hilko; Franz, Elke; Liesebach, Katja; Pfitzmann, Andreas; Wahrig, Hagen. 2005. "Intra-application Partitioning of Personal Data", Edinburgh, United Kingdom.
  • Albers, Andreas; Figge, Stefan; Radmacher, Mike . 2005. "LOC3 - Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures", Munich, Germany.
  • Albers, Andreas; Figge, Stefan; Hochstatter, Iris; Kaspar, Christian; et al. . 2005. "Mobile Anwendungen - Best Practices in der TIME-Branche", Universitätsverlag Göttingen, Göttingen, Germany.
  • Roßnagel, Heiko . 2004. "Mobile Qualified Electronic Signatures and Certification on Demand", Samos Island, Greece.
  • Roßnagel, Heiko . 2004. "Mobile Qualified Electronic Signatures for Secure Mobile Brokerage", Cyprus, Turkey.
  • Rannenberg, Kai . 2004. "Identity management in mobile cellular networks and related applications", Information Security Technical Report, (9:1), ISBN: 1363-4127, pp. 77–85, http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5681/, Elsevier Sciences.
  • Roßnagel, Heiko . 2004. "Enabling Mobile Qualified Electronic Signatures with Certification on Demand", Information Security Bulletin, (9:6).
  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai . 2004. "Mobile Financial Information Services", http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5673/, Toulouse, France.
  • Muntermann, Jan; Roßnagel, Heiko; Rannenberg, Kai . 2004. "Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen", In: E-Science und GRID, Ad-hoc-Netze und Medienintegration, pp. 361-376., http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5672/, Bonn, Germany.
  • Muntermann, Jan; Güttler, André . 2004. "Mobile Financial Information Services: Capabilities of Suitable Push Services", Shanghai, China.
  • Muntermann, Jan . 2004. "Notifying Investors in Time - A Mobile Information System Approach", New York, .
  • Lindner, Thomas; Fritsch, Lothar; Rannenberg, Kai . 2004. "Exploitation of Public and Private WiFi Coverage for New Business Models", http://www.springerlink.com/content/h801635g0621h152/, Toulouse, France.
  • Günnewig, Dirk; Rannenberg, Kai; Sadeghi, Ahmad-Reza; Stüble, Christian . 2004. "Trusted Computing Platforms – Zur technischen und industriepolitischen Situation und Vorgehensweise", In: Trusted Computing – Technik, Recht und gesellschaftspolitische Implikationen vertrauenswürdiger Systemumgebungen, ISBN: 3-8005-1341-2, pp. 154-162, http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5680/, Recht und Wirtschaft GmbH, Heidelberg, Germany.
  • Fritsch, Lothar; Roßnagel, Heiko . 2004. "SIM-based Mobile Electronic Signatures: Enabling M-Business with Certification on Demand", Card Forum International, (8:1), Lüneburg, Germany.
  • Figge, Stefan; Rannenberg, Kai . 2004. "Inviting New Players to the Multimedia M-Commerce - An approach to enhance the current M-Commerce business model with regard to emerging DVB-T networks", In: Mobile Information Systemshttp://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5540/, New York, USA.
  • Figge, Stefan . 2004. "Situation-dependent services - a challenge for mobile network operators", Journal of Business Research - Mobility and Markets: Emerging Outlines of M-Commerce, (57:12).
  • Pape, Sebastian;Dietz, Laura; Tandler, Peter. 2004. "Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops", In: Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04.
  • Tiebel, O.; Liesebach, Katja; Mitschick, A. et al. . 2003. "DIPOL-Edit – a new system supporting the WWW-based delivery of course content at Dresden Medical Faculty", University of Bern, Switzerland.
  • Roßnagel, Heiko . 2003. "Mobile/kabellose Netzwerke", In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik, Eds. , Frankfurt am Main, Germany.
  • Rannenberg, Kai; Roßnagel, Heiko; Fritsch, Lothar . 2003. "Economics & IT Security Certification", Stockholm, Sweden.
  • Rannenberg, Kai . 2003. "Identity Management in Mobile Applications", Datenschutz und Datensicherheit, (27:9), pp. 546-550, Wiesbaden, Germany.
  • Rannenberg, Kai . 2003. "Sicherheit", In: Taschenbuch der Wirtschaftsinformatik und Wirtschaftsmathematik, ISBN: 978-3-8171-1694-2, pp. 353-361, Frankfurt a.M., Germany.
  • Ranke, Johannes; Fritsch, Lothar; Roßnagel, Heiko . 2003. "M-Signaturen aus rechtlicher Sicht", Datenschutz und datensicherheit, (27:2), pp. 95-100, Wiesbaden, Germany.
  • Fritsch, Lothar; Weber, Christoph . 2003. "Volcanic Activity Report - Erta Ale: Frequent changes in the active crater morphology and lava lake level", Smithsonian National Museum of Natural History, Washington D.C., USA.
  • Fritsch, Lothar; Rannenberg, Kai . 2003. "Informationstechnische Voraussetzungen von E-Government am Beispiel des Katastrophenschutzes mittels Mobilkommunikation", In: Tagungsband zur Jahrstagung 2002 der Deutschen Gesellschaft für Recht und Informatikhttp://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5558/, Otto-Schmidt, Cologne, Germany.
  • Fritsch, Lothar; Ranke, Johannes; Roßnagel, Heiko . 2003. "ualified mobile electronic signatures: Possible, but worth a try?", Vienna, Austria.
  • Fritsch, Lothar . 2003. "Die T-Mobile-Stiftungsprofessur für Mobile Commerce und Mehrseitige Sicherheit an der Johann Wolfgang Goethe-Universität Frankfurt", Praxis der Informationsverarbeitung und Kommunikation, (2:3), pp. 114f, K.G. Saur, München, Germany.
  • Figge, Stefan; Schrott, Gregor; Muntermann, Jan; Rannenberg, Kai . 2003. "EARNING M-ONEY - A Situation based Approach for Mobile Business Models", http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5541/, Naples, Italy.
  • Figge, Stefan; Schrott, Gregor; Muntermann, Jan; Rannenberg, Kai . 2003. "Expanding Mobile Commerce: Mobile Multimedia als Werbemedium der Zukunft", In: MultiMedia Mobil - Dienste und Inhalte über mobile Plattformen, ISBN: 3-88927-336-X, http://www.verlag-reinhard-fischer.de/ProduktDetail.aspx?ID_Artikel%3D96, Munich, Germany.
  • Figge, Stefan; Schrott, Gregor . 2003. "3G “ad” Work - 3G’S Breakthrough with mobile Advertising", München, Germany.
  • Amberg, Michael; Figge, Stefan; Wehrmann, Jens . 2003. "A Cooperation Model for Personalised and Situation Dependent Services in Mobile Networks", Berlin, Germany.
  • Rannenberg, Kai . 2002. "CamWebSIM and Friends: Steps towards Personal Security", In: The Trends and Challenges of Modern Financial Services, pp. 173-176, https://m-chair.de/images/documents/publications/Rannenberg/CWSfriends.1.3.20040201.wh.pdf, Prague, Czech Republic.
  • Rannenberg, Kai . 2002. "Interview: Werbefreie Identität gewünscht", MARKET Magazin für Online-Marketing und E-Commerce, (5:), Munich, Germany.
  • Kursawe, Klaus; Cachin, Christian; Lysyanskaya, Anna; Strobl, Reto . 2002. "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems.".
  • Fuchß, Thomas; Fritsch, Lothar . 2002. "Effective Business Processes Online - A Platform for Secure Online Business Transactions with Electronic Signatures", Düsseldorf, Germany.
  • Kursawe, Klaus . 2002. "Optimistic Byzantine Agreement".
  • Figge, Stefan . 2002. "Die Open Mobile Architecture - Systemumgebung für mobile Dienste der nächsten Generation", WIRTSCHAFTSINFORMATIK, (44:).
  • Fritsch, Lothar . 2002. "A secure, economic infrastructure for signing of web based documents and financial affairs", CBL – Cyberbanking & Law, Ausgabe, (2:).
  • Amberg, Michael; Figge, Stefan; Wehrmann, Jörg . 2002. "COMPASS – Ein Kooperationsmodell für situationsabhängige mobile Dienst", In: Mobile and Collaborative Business 2002, Eds. .
  • Rannenberg, Kai; Iachello, Giovanni . 2001. "Protection Profiles for Remailer Mixes", In: Designing Privacy Enhancing Technologies, pp. 181-230, https://m-chair.de/images/documents/publications/Rannenberg/IacRan.pdf, CA, USA.
  • Fuchß, Thomas; Fritsch, Lothar . 2001. "Sicherheit im Mobile Banking", Mobile Computer & Kommunikation, (10:), pp. 66f..
  • Fritsch, Lothar . 2001. " secure, affordable infrastructure for electronic signature applications", Datenschutz und Datensicherheit, (9:), pp. 532f.
  • Fuchß, Thomas; Fritsch, Lothar . 2001. "Endgeräte für den M-Commerce: Defizite und Aussichten", KES, Zeitschrift für Kommunikations- und EDV-Sicherheit, (1:), pp. 6f.
  • Fritsch, Lothar . 2001. "Sicherheit im M-Commerce", IT-Lösungen und Banktechnik.
  • Fox, Dirk; Fritsch, Lothar; Giessmann, Ernst G. . 2001. "Vertrauen", Kiel, Germany.
  • Figge, Stefan; Schoedel, Sven . 2001. "Architekturen für mobile Geschäfte", Computerwoche Extra, (8:).
  • Rannenberg, Kai; Iachello, Giovanni . 2000. "Protection Profiles for Remailer Mixes - Do the new Evaluation Criteria help?", ISBN: 0-7695-0859-6, pp. 107-118, https://m-chair.de/images/documents/publications/Rannenberg/ACSAC-6.6header_book_20031028.pdf, IEEE CS Press, Louisiana, USA.
  • Rannenberg, Kai . 2000. "IT Security Certification and Criteria – Progress, Problems and Perspectives", Proceedings of the 16th Annual Working Conference on Information Security (IFIP/SEC 2000), ISBN: 0-7923-7914-4, pp. 1-10 in Sihan Qing, https://m-chair.de/images/documents/publications/Rannenberg/IFIP-SEC-2000-978-0-387-35515-3_1.pdf, Kluwer Academic Publishers, Boston, Jan H.P.El:Information Security for Global Information Infrastructures, Beijing, China.
  • Kai Rannenberg. 2000. "Multilateral Security - A concept and examples for balanced security", In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000, pp. 151-162, https://m-chair.de/images/documents/publications/Rannenberg/p151-rannenberg.pdf, 2000 Cork, Ireland; ACM Press; ISBN 1-58113-260-3, https://m-chair.de/images/documents/publications/Rannenberg/p151-rannenberg.pdf.
  • Kai Rannenberg. 2000. "How much negotiation and detail can users handle?", In: Frédéric Cuppens et al.: Computer security: Proceedings of the 6th European Symposium on Research in Computer Security, October 4-6, 2000, Toulouse, France; Lecture Notes in Computer Science 1895, Springer-Verlag; ISBN 3-540-41031-7, https://m-chair.de/images/documents/publications/Rannenberg/ESORICS-f-1.7.mh.pdf.
  • Kai Rannenberg. 2000. "Electronic Commerce und Mehrseitige Sicherheit – Baustellen, Fortschritte und Perspektiven", Informatik Forschung und Entwicklung, (15:4), pp. 193-206.
  • Rannenberg, Kai . 2000. "Multilateral Security - Why and How?", pp. 520, Maryland, USA.
  • Kai Rannenberg. 2000. "Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet", Wirtschaftsinformatik, (42:6), pp. 489-497, https://link.springer.com/article/10.1007/BF03250765.
  • Fuchß, Thomas; Fritsch, Lothar . 2000. "Erfahrungen mit der ITSEC E4/Hoch-Zertifizierung", Datenschutz und Datensicherheit, (10:), pp. 583f.
  • Fuchß, Thomas; Fritsch, Lothar . 2000. "M-Commerce Security", Barcelona, Spain.
  • Fuchß, Thomas; Fritsch, Lothar . 2000. "Security Certificates as a tool for reliably software engineering", Datenschutz und Datensicherheit, (9:), pp. 514f.
  • Fritsch, Lothar; Fuchß, Thomas . 2000. "Experience with E4/High evaluation", Paris, France.
  • Fritsch, Lothar; Fuchß, Thomas . 2000. "Erfahrungen eines Softwarehauses in Deutschland mit der ITSEC E4/Hoch-Zertifizierung – Ist bewiesene Sicherheit bezahlbar?", Darmstadt, Germany.
  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1999. "Mehrseitige Sicherheit in der Telekommunikation", In: Mobile und sichere Kommunikation im Gesundheitswesen, ISBN: 3-528-05690-8, pp. 35-44, Vieweg, Braunschweig, Germany.
  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1999. "IT Security and Multilateral Security", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 21-29, Addison-Wesley-Longman, Massachusetts, USA.
  • Rannenberg, Kai; Fox, Dirk . 1999. "Privacy Points", Datenschutz und Datensicherheit, (23:2), pp. 99.
  • Rannenberg, Kai . 1999. "Sicherheit", Praxis der Wirtschaftsinformatik, (22:3), pp. 138-139..
  • Rannenberg, Kai . 1999. "What can IT Security Certification do for Multilateral Security?", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 515-530, Addison-Wesley-Longman, Germany.
  • Rannenberg, Kai . 1999. "IT-Sicherheitszertifizierung – Garantie für Sicherheit?", Praxis der Wirtschaftsinformatik, (22:3), pp. 154-161..
  • Mueller, Guenter; Rannenberg, Kai . 1999. "DFG-Schwerpunktprogramm", Praxis der Informationsverarbeitung und Kommunikation, (22:1), pp. 61-62..
  • Rannenberg, Kai . 1999. "Sicherung internetbasierter Unternehmenskommunikation", Praxis der Wirtschaftsinformatik, (36:209), pp. 53-66..
  • Mueller, Guenter; Rannenberg, Kai . 1999. "Sicherheit in der Informations- und Kommunikationstechnik – Ein neues DFG-Schwerpunktprogramm", Informatik Forschung und Entwicklung, (14:1), pp. 46-48..
  • Mueller, Guenter; Rannenberg, Kai . 1999. "Security for Global Communications", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 11-17, Addison-Wesley-Longman, Massachusetts, USA.
  • Kursawe, Klaus; Albers, Susanne; Schuierer, Sven . 1999. "Exploring Onknown Environments with Obstacles".
  • Mueller, Guenter; Rannenberg, Kai . 1999. "Multilateral Security – Empowering Users", In: Multilateral Security in Communications – Technology, Infrastructure, Economy, ISBN: 3-8273-1360-0, pp. 563-570, Addison-Wesley-Longman, Massachusetts, USA.
  • Jendricke, Uwe; Rannenberg, Kai . 1999. "A MixDemonstrator for teaching Security in the Virtual University", ISBN: 91-7153-910-7, pp. 83-96, Kista, Sweden.
  • Bludau, Hans-Bernd; Rannenberg, Kai . 1999. "Das Erfahrungsfeld im "Erreichbarkeitsmanagement" im Kontext mehrseitiger Sicherheit – Simulationsstudien als didaktisches Instrument", In: Zur Didaktik der IT-Sicherheit, ISBN: 3-922746-33-0, pp. 173-188, Secu-Media, Ingelheim, Germany.
  • Bertsch, Andreas; Rannenberg, Kai; Bunz, Herbert . 1999. "Nachhaltige Überprüfbarkeit digitaler Signaturen", In: Sicherheitsinfrastrukturen, ISBN: 3-528-05709-2, pp. 39-50, Vieweg, Braunschweig, Germany.
  • Bertsch, Andreas; Rannenberg, Kai . 1999. "Lean Infrastructures for Sustainable Digital Signatures", pp. 173-189..
  • Rannenberg, Kai . 1998. "Sicherheitszertifizierung", Datenschutz und Datensicherheit, (22:4), pp. 190-192..
  • Rannenberg, Kai . 1998. "Datenschutz als Innovationsmotor statt als Technikfeind", In: Der neue Datenschutz - Datenschutz in der Informationsgesellschaft von morgen, ISBN: 3-472-03284-7, pp. 190-205, Neuwied, Germany.
  • Fox, Dirk; Rannenberg, Kai . 1998. "Zertifikate – Gütesiegel oder Feigenblatt?", Datenschutz und Datensicherheit, (22:4), pp. 186.
  • Rannenberg, Kai . 1998. "Kriterien und Zertifizierung mehrseitiger IT-Sicherheit", In: Ausgezeichnete Informatikdissertationen, ISBN: 3-519-02647-3, pp. 98-117, http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5701/, Teubner, Stuttgart, Germany.
  • Damker, Herbert; Pordesch, Ulrich; Rannenberg, Kai; Schneider, Michael . 1998. "Aushandlung mehrseitiger Sicherheit: der Erreichbarkeits- und Sicherheitsmanager", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Erwartung, Akzeptanz, Nutzung, ISBN: 3-8273-1355-0, pp. 29-42, Addison-Wesley-Longman, Bonn, Germany.
  • Sobirey, Michael; Fischer-Huebner, Simone; Rannenberg, Kai . 1997. "Pseudonymous Audit for Privacy Enhanced Intrusion Detection", ISBN: 0-412-8178-02, pp. 151-163, https://m-chair.de/images/documents/publications/Rannenberg/SoFiRa_97.IFIP_SEC.2.pdf, Chapman & Hall, London, United Kingdom.
  • Reichenbach, Martin; Damker, Herbert; Federrath, Hannes; Rannenberg, Kai . 1997. "Individual Management of Personal Reachability in Mobile Communication", ISBN: 0-412-8178-02, pp. 163-174, https://m-chair.de/images/documents/publications/Rannenberg/ReiDFRa_97.IFIP_SEC.pdf, Chapman & Hall, London, United Kingdom.
  • Rannenberg, Kai; Mueller, Guenter . 1997. "Mehrseitige Sicherheit – Nutzer stärken", FIFF-Kommunikation, (14:3), pp. 29-31..
  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1997. "Sicherheit", ISBN: 3-8273-1116-0, pp. 21-29, Addison-Wesley-Longman, Bonn, Germany.
  • Rannenberg, Kai . 1997. "Tragen Zertifizierung und Evaluationskriterien zu mehrseitiger Sicherheit bei?", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, ISBN: 3-8273-1116-0, pp. 527-562, Addison-Wesley-Longman, Bonn, Germany.
  • Mueller, Guenter; Rannenberg, Kai . 1997. "Mehrseitige Sicherheit – Nutzer stärken", In: Mehrseitige Sicherheit in der Kommunikationstechnik – Verfahren, Komponenten, Integration, ISBN: 3-8273-1116-0, pp. 565-572, Addison-Wesley-Longman, Bonn, Germany.
  • Mueller, Guenter; Rannenberg, Kai . 1997. "Das Ladenburger Kolleg – Sicherheit in der Kommunikationstechnik", Zeitschrift für Kommunikations- und EDV-Sicherheit, (13:6), pp. 54-56.
  • Rannenberg, Kai; Pfitzmann, Andreas; Mueller, Guenter . 1996. "Sicherheit", Informationstechnik und Technische Informatik, (38:4), pp. 7-10, https://m-chair.de/images/documents/publications/Rannenberg/RaPM_96.itti.pdf.
  • Rannenberg, Kai; Damker, Herbert; Langenheder, Werner; Mueller, Guenter . 1995. "Mehrseitige Sicherheit als integrale Eigenschaft von Kommunikationstechnik – Kolleg", In: Jahrbuch „Telekommunikation & Gesellschaft, Eds. , R. v. Decker's, Heidelberg, Germany.
  • Rannenberg, Kai . 1995. "Evaluationskriterien zur IT-Sicherheit – Entwicklungen und Perspektiven in der Normung und außerhalb", ISBN: 3-528-05483-2, pp. 45-68, http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5706/, Vieweg, Braunschweig, Germany.
  • Rannenberg, Kai . 1995. "Normfähigkeit von Test- und Bewertungsmethoden", Datenschutz-Berater, (19:6), pp. 19.
  • Damker, Herbert; Rannenberg, Kai; Mueller, Guenter . 1995. "Erreichbarkeitsmanagement und mehrseitige Sicherheit aus Benutzersicht", http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5705/, Bonn, Germany.
  • Rannenberg, Kai . 1994. "Version 1.0 des Evaluationshandbuches ITSEM", Datenschutz-Berater, (18:5), pp. 5-6.
  • Rannenberg, Kai . 1994. "Recent Development in Information Technology Security Evaluation – The Need for Evaluation Criteria for multilateral Security", ISBN: 0-444-81831-6, https://m-chair.de/images/documents/publications/Rannenberg/1994-IFIP-9.6-11.7-RecentDevelopmentinInformation.pdf, North-Holland Publishers, St. Petersburg, Amsterdam, .
  • Rannenberg, Kai . 1994. "GI und Studierende", Informatik-Spektrum, (17:4), pp. 219.
  • Mueller, Guenter; Rannenberg, Kai; Damker, Herbert . 1994. "Kolleg "Sicherheit in der Kommunikationstechnik" eingerichtet", Praxis der Informationsverarbeitung und Kommunikation, (17:4), pp. 255-257.
  • Mueller, Guenter; Rannenberg, Kai . 1994. "Sicherheit in der Kommunikationstechnik – zu Aufgabe und Struktur eines Kollegs", In: Sicherheit von Technik – Ladenburger Kolleg, ISBN: 3-8249-0224-9, pp. 183-189, TÜV Rheinland GmbH, Cologne, Germany.
  • Rannenberg, Kai . 1993. "The 15th National Computer Security Conference - Security made out of Building Blocks", The Computer Law and Security Report, (9:3), pp. 143-144.
  • Rannenberg, Kai . 1993. "Die USA präsentieren den Orange-Book-Nachfolger", Datenschutz-Berater, (17:5), pp. 8-10.
  • Pfitzmann, Andreas; Rannenberg, Kai . 1993. "Staatliche Initiativen und Dokumente zur IT-Sicherheit – Eine kritische Würdigung", Computer und Recht, (9:3), pp. 170-179, http://www.web-portal-system.de/wps/wse/dl/det/rannenberg/5708/.
  • Rannenberg, Kai . 1992. "Tagungsbericht: 15. National Computer Security Conference", pp. 13-15.
  • Rannenberg, Kai . 1992. "Evaluierung", Datenschutz und Datensicherung, (16:5), pp. 250-251.
  • Gehrke, Michael; Pfitzmann, Andreas; Rannenberg, Kai . 1992. "Information Technology Security Evaluation Criteria – a Contribution to Vulnerability?", pp. 579-587, https://m-chair.de/images/documents/publications/Rannenberg/InformationTechnologySecurityE.pdf, Madrid, Spain.
  • Rienhoff, O.; Lutterbeck, Bernd; Retter, K.; Rannenberg, Kai; Reinecke, Elke . 1991. "Rechtsunsicherheiten bei der digitalen Bildverarbeitung und Archivierung", In: Digitale Radiographie, Referate und Vorträge, ISBN: 3-87018-081-1, pp. 159-164, Schnetztor, Konstanz, Germany.
  • Rannenberg, Kai . 1991. "GI-Fachgruppe VIS zu den ITSEC-Plänen", KES – Zeitschrift für Kommunikations- und EDV-Sicherheit, (7:4), pp. 261-263.
  • Rannenberg, Kai . 1991. "Diskussion "IT-Sicherheit – Bewertungskriterien" auf der VIS", Datenschutz und Datensicherung, (15:5), pp. 267-269.
  • Rannenberg, Kai . 1991. "IT-Sicherheit – Bewertungskriterien", Computer und Recht, (7:11), pp. 699-701.
  • Rannenberg, Kai . 1991. "IT-Sicherheit – Bewertungskriterien auf der VIS", Informatik-Spektrum, (14:4), pp. 235-236.
  • Meyer, Martin; Rannenberg, Kai . 1991. "Eine Bewertung der „Information Technology Security Evaluation Criteria“", In: Proc. Verläßliche Informationssysteme (VIS'91), pp. 243-258, Springer, Darmstadt, Germany.
  • Brandenburg, Uwe-Wolfgang; Rannenberg, Kai . 1990. "Viren und Würmer.", Automatisierungstechnische Praxis, (32:10), pp. 500-508.
  • Working Papers
  • Alexander Pana, Fatbardh Veseli, Kai Rannenberg. 2020. "Privacy Engineering - A Literature Review".
  • David Harborth and Sebastian Pape. 2018. "German Translation of the Concerns for Information Privacy (CFIP) Construct", Available at SSRNhttps://ssrn.com/abstract=3112207.
  • David Harborth and Sebastian Pape. 2018. "German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire", Available at SSRNhttps://ssrn.com/abstract=3147708.
  • David Harborth and Eva Katharina Bauer. 2017. "The Influence of Advertising on the Process of Technology Adoption: A Systematic Literature Review", Available at SSRNhttps://ssrn.com/abstract=3069809.
  • David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg. 2017. "Integrating Privacy-Enhancing Technologies Into the Internet Infrastructur", https://arxiv.org/abs/1711.07220.
  • Zwattendorfer, Bernd; Leitold, Herbert; Yang, Shuzhe; Andersson, Thomas; Leontaridis, Lefteris; Lindholm, Pasi . 2012. "D5.1 - A longer-term research and implementation roadmap towards a fully user-centric INDI ecosystem", GINI.
  • Van Alsenoy, Brendan; Lievens, Eva; Janssen, Katleen; Dumortier, Jos; Rannenberg, Kai; Yang, Shuzeh; Andersson, Thomas; Abbas, Qammar; Leitold, Herbert; Zwattendorfer, Bernd . 2012. "D3.2 - A Regulatory Framework for INDI Operators", GINI.
  • Leitold, Herbert; Zwattendorfer, Bernd; Andersson, Thomas; Leontaridis, Lefteris; Lindholm, Pasi; Yang, Shuzhe . 2012. "D5.2 - White Paper on the establishment of an INDI Operator Market across the EU", GINI.
  • Deuker, André, Albers, Andreas, Rosenkranz, Christoph . 2012. "All Friends Are Equal – Some Even More: An Investigation of Privacy Protection Among Facebook Users".
  • Ochoa, Martin; Pape, Sebastian; Ruhroth, Thomas; Sprick, Barbara; Stenzel, Kurt; Sudbrock, Henning. 2012. "Report on the RS3 Topic Workshop "Security Properties in Software Engineering"", http://opus.bibliothek.uni-augsburg.de/volltexte/2012/1865/, Universitätsbibliothek der Universität Augsburg, Universitätsstr. 22, 86159 Augsburg.
  • Pape, Sebastian; Schöch, Christof; Wegner, Lutz. 2010. "A Framework for TEI-Based Scholarly Text Editions", http://nbn-resolving.de/urn:nbn:de:hebis:34-2010111534956, Universität Kassel.
  • Royer, Denis; Yang, Shuzhe . 2009. "D3.17: Identity Management Systems – recent developments", FIDIS, Frankfurt, Germany.
  • Bal, Gökhan; Hegen, Marvin; Koschinat, Sascha; Weber, Christian; Wolos, Lars . 2009. "Study on IdM related Data Assets on the basis of current IdM Player’s Data-Handling".
  • Koschinat, Sascha; Wolos, Lars . 2009. "Catalogue of Identity Management Functions".
  • Pape, Sebastian. 2009. "Some Observations on Reusing One-Time Pads within Dice Codings (abstract)", In: Tagungsband zum 10. Kryptotag, Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft für Informatik, Arbeitsgruppe Algebra und Zahlentheorie, Technische Universität Berlin, Fakultät II, Institut für Mathematik.
  • Royer, Denis . 2008. "D11.3: Economic aspects of mobility and identity", FIDIS, Frankfurt am Main, Germany.
  • Tschersich, Markus; Spies, Thorsten; Eicker, Stefan . 2008. "Einsatz von Multi-Touch beim Softwaredesign am Beispiel der CRC Card-Methode", ISBN: 1860-2770, Institut für Informatik und Wirtschaftsinformatik, Essen, Germany.
  • "D2.4 Requirements", PICOS.
  • Pape, Sebastian. 2008. "Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract)", In: Book of Abstracts of the 2nd Weekend of Cryptography, Eds. Fleischmann,Ewan; Gorski, Michael, http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:bvb:473-opus-1333, Weimar.
  • Pape, Sebastian. 2008. "Embedding Biometric Information into Anonymous Credentials", In: Extended Abstracts of the Second Privacy Enhancing Technologies Convention (PET-CON 2008.1), Eds. Loesing, Karsten, urn:nbn:de:bvb:473-opus-1333.
  • Pape, Sebastian. 2008. "A Survey on Untransferable Anonymous Credentials (extended abstract)", Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Brno.
  • "D13.1.d – Advanced Tutorial (for developers)", PRIME.
  • Scherner, Tobias; Fritsch, Lothar . 2007. "Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process", In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Eds. , Frankfurt, Germany.
  • Pape, Sebastian; Benamar, Nabil. 2007. "Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy (extended Abstract)", In: {Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Karlstadt.
  • Fritsch, Lothar . 2006. "Mind your Step! How Profiling Location reveals your Identity - and how you prepare for it", Santorin, Greece.
  • Royer, Denis . 2006. "D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity", FIDIS, Frankfurt am Main, Germany.
  • "D13.1.c – General Public Tutorial", PRIME.
  • Muntermann, Jan; Güttler, André . 2005. "Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case", In: Working Paper Series: Finance and Accounting Goethe-University, Frankfurt am Main, Germany.
  • Muntermann, Jan . 2005. "Automated ANN Alerts : One Step Ahead with Mobile Support", In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Eds. , Frankfurt am Main, Germany.
  • Koelsch, Tobias; Fritsch, Lothar; Kohlweiss, Markulf; Kesdogan, Dogan . 2005. "Mit IDM und Mittler zu mehr Privatsphäre in LBS", In: Forschungsbericht zum 2.Fachgespräch Ortsbezogene Anwendungen und Dienste, Eds. .
  • Klobucar, Tomaz; Borcea, Katrin; Jerman-Blažic, Borka; Liesebach, Katja . 2005. "Privacy and Data Protection in Corporate e-Learning".
  • Hahn, Patrick; Fritsch, Lothar . 2005. "Studie zur Akzeptanzanalyse von Location-based Services", In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Eds. , Frankfurt am Main, Germany.
  • Fritsch, Lothar; Kursawe, Klaus . 2005. "Personal Rights Management (PRM): Enabling Privacy Rights in Digital Online Media Content", In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Eds. , Frankfurt am Main, Germany.
  • Fritsch, Lothar . 2005. "WiFi hot spot superdistribution : a profit scheme for WiFi access distribution", Johann Wolfgang Goethe - Universität, Frankfurt am Main, Germany.
  • Fritsch, Lothar . 2005. "Economic Location-Based Services", Riezlern, Austria.
  • Figge, Stefan . 2005. "The Potentials of Mobile Commerce - An Economics Perspective", Frankfurt am Main, Germany.
  • Roßnagel, Heiko; Kalbe, Thomas; Zikesch, Felix . 2004. "SmartBlaster - a realtime multiplayer game for mobile ad-hoc networks", In: Hochschulschriften der Johann Wolfgang Goethe - Universität, Eds. , Frankfurt am Main, Germany.
  • Figge, Stefan; Rossnagel, Heiko; Muntermann, Jan; Albers, Andreas; Fritsch Lothar; Rannenberg, Kai . 2003. "Standardisierung im Mobilfunk und Mobile Commerce", Frankfurt, Germany.
  • Albers, Andreas; Figge, Stefan . 2003. "Lizenzvergabe für DVB-T in Deutschland", Frankfurt, Germany.
  • Fritsch, Lothar; Schunter, Matthias . 1998. "A design pattern for implementing robust protocol machines in Java", SEMPER, Saarbrücken, Germany.
  • Rannenberg, Kai . 1995. "IT-Sicherheitsevaluationskriterien – Sicherheit mit Gütesiegel?", pp. 2-12, Uni Rostock, Germany.
  • Rannenberg, Kai . 1989. "Untersuchung von Sicherheitsdiensten und ihre Integration in das ISO-OSI-Referenzmodell auf der Grundlage eines pragmatisch orientierten Sicherheitsmodells", Technische Universität Berlin, Berlin, Germany.
  • Rannenberg, Kai . 1988. "Technischer Datenschutz in CIM-Systemen und anderen verteilten Anwendungen", Technische Universität Berlin, Berlin, Germany.
  • Reviewed Project Publications
  • Andreas Happe, Stephan Krenn, Miryam Villegas Jimenez, Juan Carlos Pérez Baún, Florian Thiemer, Welderufael B. Tesfay, Luigi Rizzo, Tobias Pulls, Alberto Zanini, Andrea Migliavacca, Silvana Mura, Alexandros Kostopoulos, Andreas Abraham, and Felix Hörandne. 2017. "CREDENTIAL Deliverable 2.3 Cloud Identity Wallet Requirements ", https://credential.eu/publications/d2-3-cloud-identity-wallet-requirements/.
  • Charlotte Bäccman, Andreas Happe, Felix Hörandner, Simone Fischer-Hübner, Farzaneh Karegar, Alexandros Kostopoulos, Stephan Krenn, Daniel Lindegren, Silvana Mura, Andrea Migliavacca, Nicolas Notario McDonnell, Juan Carlos Pérez Baún, John Sören Pettersson. 2017. "CREDENTIAL Deliverable 3.1 UI Prototypes V1", https://credential.eu/publications/deliverables/d3-1-ui-prototypes-v1/.
  • Nicolás Notario, Juan Carlos Pérez Baun, Welderufael Tesfay, Florian Thiemer, Stephan Krenn, Christoph Striecks Andreas Happe, Andreas Abraham, Felix Hörandner, Evangelos Sfakianakis, Simon Roth, and Pritam Dash. 2017. "CREDENTIAL Deliverable 5.1 Functional Design", https://credential.eu/publications/deliverables/d5-1-functional-design/.
  • Fatbardh Veseli et. al.. 2017. "D3.3 - Recommendations on Privacy-enhancing mechanisms", https://credential.eu/publications/deliverables/d3-3-recommendations-on-privacy-enhancing-mechanisms/, CREDENTIAL Project Deliverable.
  • Ahmed S. Yesuf, R. Wieringa, L. Wolos, M. Ford, S. Bleikertz, M. Martins, S. Saraiva, M. Fraile. 2015. "Final Requirements for Implementation of Case Studies (D7.1.2)", http://www.trespass-project.eu/, TREsPASS.
  • S. Bleikertz, J.-W. Bullée, M. Ford, O. Gadyatskaya, D. Gollmann, R.R. Hansen, D. Ionita, H. Jonkers, L. Mon- toya, C.W. Probst, S. Saraiva, A. Tanner, S. Übelacker, L. Wolos, A.S. Yesuf. 2015. "Extensibility of Socio-Technical Security Models (D1.3.2)", https://www.trespass-project.eu/sites/default/files/Deliverables/D1_3_2.pdf, TREsPASS.
  • S. Bleikertz, J.W. Bullée, M. Ford, D. Ionita, H. Jonkers, L. Montoya, S. Saraiva, A. Tan- ner, A.S. Yesuf, J. Willemson, C.W. Probst. 2015. "Dynamic features of socio-technical security models (D1.3.3)", https://www.trespass-project.eu/sites/default/files/Deliverables/D1_3_3.pdf, TREsPASS.
  • M. Ford A. Lenin, O. Gadyatskaya, D. Ionita, A. Tan- ner, S. Saraiva. 2015. "First report on the integrated TREsPASS process (D5.4.1)".
  • Fatbardh Veseli and Welderufael B. Tesfay. 2015. "Privacy-ABC Technologies, Personal Data Ecosystem, and Business Models", https://abc4trust.eu/download/R2.1%20-%20PDE%20and%20ABC%20Review%20V1.0.pdf, ABC4Trust project deliverable.
  • Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna. 2015. "D3.1 Scientific comparison of ABC protocols - Part II: Practical comparison (of Privacy-ABC systems)", https://abc4trust.eu/download/Deliverable%20D3.1%20Part%202.pdf, ABC4Trust project deliverable.
  • Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna . 2014. "D3.1 Scientific comparison of ABC", ABC4Trust Deliverable to the EC.
  • Fatbardh Veseli, Jesus Luna, Hamza Ghani, Tsvetoslava Vateva-Gurova, Harald Zwingelberg, Katalin Storf, Felix Bieker, Daniel Deibler, Marit Hansen . 2014. "D2.3 Benchmarking Criteria for Privacy-ABC technologies".
  • Ahmed S. Yesuf, Lars Wolos, Roel Wieringa, Dan Ionita, Margaret Ford. 2014. "Results from Case Study B: Telecommunication Services (D7.3.1)", http://www.trespass-project.eu/, TREsPASS.
  • Jan-Willem Bullée, Sören Bleikertz, Mar- garet Ford, René Rydhof Hansen, Ma- rieta Georgieva Ivanova, Lorena Mon- toya, Christian W. Probst, Sven Übelacker, Ahmed S. Yesuf. 2014. "Initial Policy-Specification Language (D1.2.1)", http://www.trespass-project.eu/, TREsPASS.
  • Deibler, D., Engeler, M., Krontiris, I., Lehmann, A., Liagkou, V., Pyrgelis, A., Schlehahn, E., Stamatiou, Y., Tesfay, W. and Zwingelberg, H.. 2014. "D7. 3 Evaluation of the Student Pilot", https://abc4trust.eu/download/Deliverable%20D7.3.pdf.
  • Souheil Bcheri,Erik Björk, Daniel Deibler, Göran Hånell, Jimm Lerch,Maksym Moneta, Monika Orski, Eva Schlehahn, Welderufael Tesfay. 2014. "D6.3 Evaluation of the School pilot", https://abc4trust.eu/download/Deliverable%20D6.3.pdf.
  • Souheil Bcheri,Erik Björk, Daniel Deibler, Göran Hånell, Jimm Lerch,Maksym Moneta, Monika Orski, Eva Schlehahn, Welderufael Tesfay. 2014. "D6.3 Evaluation of the School pilot", https://abc4trust.eu/download/Deliverable%20D6.3.pdf.
  • F. Veseli, D. M. Sommer, J. Schallaboeck, and K. Ioannis. 2014. "D8.12 Architecture (of Privacy-ABC technologies) for Standardization V2", https://abc4trust.eu/download/D8.12%20-%20Architecture%20for%20Standardization%20V2.pdf, ABC4Trust project deliverable.
  • Fatbardh Veseli, Jesus Luna, Hamza Ghani, Tsvetoslava Vateva-Gurova, Harald Zwingelberg, Katalin Storf, Felix Bieker, Daniel Deibler, Marit Hansen. 2014. "D2. 3 Benchmarking criteria (for Privacy-ABC technologies)", https://abc4trust.eu/download/D2.3%20-%20Benchmarking%20Criteria.pdf, ABC4Trust project deliverable.
  • Fatbardh Veseli, Jan Camenisch and Jonas Lindstrøm Jensen. 2014. "D8. 13 (ABC4Trust) reference implementation for standardization v2", https://abc4trust.eu/download/D8.13%20-%20Reference%20Implementation%20for%20Standardization%20V2.pdf, ABC4Trust project deliverable.
  • Gert Læssøe Mikkelsen, Michael Østergaard Pedersen, Fatbardh Veseli. 2014. "D3.2 Guidance on Selection and Complementarity of ABC Protocols", https://abc4trust.eu/download/Deliverable%20D3.2.pdf, ABC4Trust project deliverable.
  • Gert Læssøe Mikkelsen, Michael Østergaard Pedersen, Fatbardh Veseli. 2014. "D3.2 Guidance on Selection and Complementarity of ABC Protocols", https://abc4trust.eu/download/Deliverable%20D3.2.pdf, ABC4Trust project deliverable.
  • Fatbardh Veseli, Dieter M. Sommer, Jan Schallaöck, Ioannis Krontiris. 2014. "D8.12 (ABC4Trust) Architecture for Standardization V2".
  • Joerg Abendroth, Souheil Bcheri, Ioannis Krontiris, Vasiliki Liagkou, Ahmad Sabouri, Eva Schlehahn, Fatbardh Veseli, Harald Zwingelberg . 2013. "D5.2 Amendment Building Blocks of ABC Technology", ABC4Trust Deliverable to the EC.
  • Joerg Abendroth, Vasiliki Liagkou, Apostolis Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou, Harald Zwingelberg. 2012. "D7.1 Application Description for Students", ABC4Trust Deliverable to the EC.
  • Fatbardh Veseli, Pascal Paillier, Jan Schallaböck, Ioannis Krontiris. 2012. "D8. 4 (ABC4Trust) Architecture for standardization v1", ABC4Trust project deliverable.
  • Joerg Abendroth, Souheil Bcheri, Norbert Götze, Vasiliki Liagkou, Monika Orski, Robert Seidl, Fatbardh Vesel. 2012. "D5. 2 Description of the “common denominator” elements (for the pilots)", ABC4Trust project deliverable.
  • Koschinat, Sascha; Bal, Gökhan; Rannenberg, Kai; Hegen, Marvin . 2011. "D6.1.2 - Economic Valuation of Identity Management Enablers", http://www.primelife.eu/results/documents/151-612d.
  • Deuker, André; Albers, Andreas . 2011. "Entwicklung des kontextbasierten Preisfundungsservices", Frankfurt, Germany.
  • Isaac Agudo, Susen Döbelt, Stefan Eicker, Stephan Heim, Eleni Kosta, Georg Kramer, Marek Kumpošt, Vashek Matyas, Karsten Radatz, Johann Schrammel, Bernd Ueberschär, José Luis Vivas . 2011. "D8.2 Legal, economic and technical evaluation of the second platform and community prototype", PICOS.
  • Kosta, Eleni, Vivas, José-Luis; Agudo, Isaac; Kumpošt, Marek; Radatz, Karsten, Eicker, Stefan; Döbelt, Susen, Überschär, Bernd; Heim, Stephan. 2011. "D8.3 Final Evaluation Report", PICOS.
  • Döbelt, Susen; Ueberschär, Bernd; Pietro, Elsa; Tschersich, Markus; Heim, Stephan . 2010. "D7.1b Trial plan for the second community prototype.", PICOS.
  • Deuker, André; Albers, Andreas . 2010. "Anforderungen für kontextbasierte Preisfindung im Mobile Marketing", Frankfurt, Germany.
  • Isaac Agudo, Mohamed Bourimi, Stefan Eicker, Eva Ganglbauer, Stephan Heim, Eleni Kosta, Georg Kramer, Marek Kumpošt, Vashek Matyas, Karsten Radatz, Johann Schrammel, José Luis Vivas . 2010. "D8.1 Legal, economic and technical evaluation of the first platform and community prototype", PICOS.
  • Döbelt, Susen; Überschär, Bernd, Alvarez, Maria Rosa; Heim, Stephan. 2010. "D7.3 Second Community Trial Report", PICOS.
  • Royer, Denis; Deuker, André . 2009. "D11.6: Survey on Mobile Identity", FIDIS.
  • Koschinat, Sascha; Rannenberg, Kai, Bal, Gökhan. 2009. "D6.1.1 - Identity Management Infrastructure Protocols for Privacy-enabled SOA", http://www.primelife.eu/images/stories/deliverables/d6.1.1-idm_infrastructure_protocols_for_privacy-enabled_soa-public.pdf, PrimeLife, Frankfurt, Germany.
  • Deuker, André . 2009. "D11.12: Mobile Marketing in the Perspective of Identity", FIDIS, Frankfurt, Germany.
  • Deuker, André; Royer, Denis . 2009. "D11.11: Next Generation Networks", FIDIS.
  • Deuker, André . 2009. "D11.8: Study on Mobile Communities", Frankfurt, Germany.
  • Albers, Andreas; Radmacher, Mike . 2009. "Bestandsaufnahme "Kontextbasierte Preisfindung"", Frankfurt, Germany.
  • Deuker, André . 2008. "D11.2: Mobility and LBS", Frankfurt, Germany.

 

Scientific Expertises
  • Albers, Andreas . 2012. "Datenzentrische Geschäftsmodelle im Mobile Business - Herausforderungen im Konflikt zwischen Unternehmenszielen und Datenschutz für mobile Nutzer", Interview - Das Magazin für kompetente & innovative Unternehmen, (1:).
  • Albers, Andreas . 2012. "Datenschutz - Kosten oder potentieller Wettbewerbsvorteil für Unternehmen?", Interview - Das Magazin für kompetente & innovative Unternehmen, (1:).
  • Albers, Andreas; Duschinski, Hannes . 2012. "Smart Agents – wie digitale Stellvertreter Kunden erobern (Teil 2/2)", Innovation Management, (1:).
  • Albers, Andreas; Duschinski, Hannes . 2011. "Smart Agents – wie digitale Stellvertreter Kunden erobern (Teil 1/2)", Innovation Management, (10:).
  • Duschinski, Hannes; Albers, Andreas, Deuker, André; Aumann, Clemens . 2011. "'Tis More Blessed to Receive than to Search", Magazine for Management & Technology, pp. 8-17.
  • Samad Sabouri, Amir Masoud Rahmani, Ahmad Sabouri. 2011. "PIC Microcontrollers - Architecture, Programming with mikroC PRO for PIC Compiler", ISBN: 978- 964-10-0296-3, IAU Science and Research.
  • Albers, Andreas; Wolos Lars; Rannenberg, Kai . 2010. "Towards Telco enabled Online and Mobile Payments", Berlin, Germany.
  • Krontiris, Ioannis . 2010. "Towards Open-world Urban Sensing Applications", Helsinki, Finland.
  • Krontiris, Ioannis; Benenson, Zinaida; Giannetsos, Thanassis; Freiling, Felix C.; Dimitriou, Tassos . 2009. "Cooperative Intrusion Detection in Wireless Sensor Networks".
  • Albers, Andreas; Figge, Stefan . 2008. "Mobile Werbung: Wie sich Aufmerksamkeit vermarkten lässt", Hannover, Germany.
  • Krontiris, Ioannis; Dimitriou, Tassos. 2008. "Security Issues in Biomedical Sensor Networks", Aalborg, Denmark.
  • Krontiris, Ioannis; Dimitriou, Tassos. 2008. "Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side", Avignon, France.
  • Krontiris, Ioannis; Dimitriou, Tassos; Giannets, Tassos. 2008. "osLIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks", Istanbul, Turkey.
  • Krontiris, Ioannis; Dimitriou, Tassos; Freiling, Felix C. . 2007. "Towards Intrusion Detection in Wireless Sensor Networks", Paris, France.
  • Krontiris, Ioannis; Dimitriou, Tassos; Giannetsos, Thanassis; Mpasoukos, Marios. 2007. "Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks", Wroclaw, Poland.
  • Dimitriou, Tassos; Krontiris, Ioannis . 2006. "Authenticated In-Network Programming for Wireless Sensor Networks", Ottawa, Canada.
  • Dimitriou, Tassos; Krontiris, Ioannis . 2006. "A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks", Uppsala, Sweden.
  • Salajegheh, Mastooreh; Soroush, Hamed; Thomos, A.; Dimitriou, Tassos; Krontiris, Ioannis . 2006. "Sense A Secure Framework for Sensor Network Data Acquisition", Uppsala, Sweden.
  • Dimitriou, Tassos; Krontiris, Ioannis . 2005. "Autonomic Communication Security in Sensor Networks".
  • Dimitriou, Tassos; Krontiris, Ioannis . 2005. "A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks".
  • Dimitriou, Tassos; Krontiris, Ioannis; Nikakis, Fotios. 2004. "SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks", Athens, Greece.
  • Müller, Günter; Rannenberg, Kai; Jendricke, Uwe . 1998. "Der Stellenwert von Datenschutz in der Standardisierung von IT-Sicherheit", Germany.

 

Others
  • David Harborth and Sebastian Pape. 2020. "DATASET ON ACTUAL USERS OF THE PRIVACY-ENHANCING TECHNOLOGY JONDONYM", IEEE DataPort, DOI:10.21227/a66b-8443, https://ieee-dataport.org/open-access/dataset-actual-users-privacy-enhancing-technology-jondonym.
  • David Harborth and Sebastian Pape. 2020. "DATASET ON ACTUAL USERS OF THE PRIVACY-ENHANCING TECHNOLOGY TOR", IEEE DataPort, DOI:10.21227/734p-nx67, https://ieee-dataport.org/open-access/dataset-actual-users-privacy-enhancing-technology-tor.
  • Schmid, M. and Pape, S.. 2019. "Aggregating Corporate Information Security Maturity Levels of Different Assets", Springer Boston.
  • Pape, Sebastian; Pipek, Volkmar; Rannenberg, Kai; Schmitz, Christopher; Sekulla, André; Terhaag, Frank. 2018. "Stand zur IT-Sicherheit deutscher Stromnetzbetreiber", Technical Reporthttps://dokumentix.ub.uni-siegen.de/opus/volltexte/2018/1394/, Universität Siegen.
  • Vineet Rajani, Iulia Bastys, Willard Rafnsson, and Deepak Garg. 2017. "Type Systems for Information Flow Control: The Question of Granularity", Invited article in ACM SIGLOG News, (4:1), pp. 6-21.
  • Dax, Julian; Ley, Benedikt; Pape, Sebastian; Pipek, Volker; Rannenberg, Kai; Schmitz, Christopher; Sekulla, André. 2017. "Stand zur IT-Sicherheit deutscher Stromnetzbetreiber", Technical Reporthttp://dokumentix.ub.uni-siegen.de/opus/volltexte/2017/1185, Universität Siegen.
  • Dax, Julian; Ivan, Ana; Ley, Benedikt; Pape, Sebastian; Pipek, Volker; Rannenberg, Kai; Schmitz, Christopher; Sekulla, Andre. 2017. "IT Security Status of German Energy Providers", Technical Reporthttps://arxiv.org/abs/1709.01254, Cornell University, arXiv.
  • David Harborth. 2016. "Establishing Privacy-Enhancing Technologies (PETs) in Consumer Mass Markets", 20. Doktoranden-Kolloquium von Simon-Kucher & Partners, 02.-03.06.2016, Bonn.
  • David Harborth, Peter Hamm. 2016. "Strategiemodelle der Post-Merger-Integrationsphase", In: Strategische Positionierung - Geschäfts- und Servicebereiche auf Kundenbedarf fokussieren, Eds. Hirzel, Matthias, Zub; Herbert; Dimler, Nick, ISBN: 978-3-658-11905-8, pp. 135-151, DOI:10.1007/978-3-658-11906-5, http://www.springer.com/de/book/9783658119058, Gabler Verlag.
  • Radmacher, Mike; Rieger, Volker; Wellmann, Alexander; Upmeyer, Ralf . 2011. "InCar 2032 - Herausforderungen und Möglichkeiten", Bonn, Deutschland.
  • Cornelius, Britta; Radmacher, Mike; Kleinhans, Christian. 2011. "Always On - Wie der Einzelhandel die vielfältigen Möglichkeiten des mobilen Internets für sich nutzen kann", Bonn, Germany.
  • Radmacher, Mike; Ismailov, Ruslan; Tempich, Christoph. 2010. "Speaking the language of the future - Mobile network operators worldwide are entering the Machine-to-Machine communication business", Bonn, .
  • Radmacher, Mike; Slamka, Christian; Collier de Mendonca, Joao; Jaster, Bernd . 2010. "Wer klaut in der Cloud? - Chancen und Risiken des Cloud Computings", Bonn, .
  • Radmacher, Mike; Stefan Kistler . 2010. "„Ich geh’ jetzt mal duschen…“ - Wie Mobilbetreiber mit ihren Kernkompetenzen Social Communities als Erlösquellen erschließen", Bonn, .
  • Wolf, Christopher; Pape, Sebastian; Porada, Ludger. 2010. "Leitfaden zur Gründung von GI - Studierendengruppen (GI-SG)", http://studierende.gi-ev.de/gliederungen/beiraete/beirat-fuer-studierende-und-auszubildende/hochschulgruppen/gruendungsleitfaden.html.
  • Greveler, Ulrich; Laskov, Pavel; Pape, Sebastian. 2009. "Vorwort der Workshop-Leitung", In: GI Jahrestagung: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 28.9.-2.10.2009, Eds. Fischer, Stefan; Maehle, Erik; Reischuk, Rüdiger, ISBN: 978-3-88579-248-2, pp. 186-190, GI.
  • Fritsch, Lothar . 2006. "Personalisierte Mobilität (Interview)", Interview im E-Commerce-Magazin, (2:), Vaterstetten, Germany.
  • Royer, Denis . 2006. "Mobile 2.0 - Challenges of Mobile Work & Life", Långholmen, Sweden.
  • Zibuschka, Jan . 2006. "A Mobile Single Sign-On System", Långholmen, Sweden.
  • Fritsch, Lothar . 2005. "Vulkane erleben - Basiswissen für Draußen", Conrad-Stein, Welver, Germany.
  • Fritsch, Lothar . 2004. "Und Größe zählt doch", Lüneburg, Germany.
  • Fritsch, Lothar . 2004. "Kaffeesternchen und Börsenpoltern", Lüneburg, Germany.
  • Roßnagel, Heiko . 2003. "Betriebssysteme", Frankfurt am Main, Germany.
  • Kursawe, Klaus; Shoup, Victor. 2002. "Optimistic Asynchronous Atomic Broadcast".
  • Kursawe, Klaus; Cachin, Christian; Petzold, Frank; Shoup, Victor. 2001. "Secure and Efficient Asynchronous Broadcast Protocols".
  • Kursawe, Klaus; Cachin, Christian; Shoup, Victor. 2000. "Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography".
  • Giovanni Iachello. 1999. "User-Oriented Protection Profile for Unobservable Message Delivery using MIX networks", http://m-chair.de/images/documents/publications/User_MIX_PP.pdf.

 

Book Chapters
  • Dax, Julian; Pape, Sebastian; Pipek, Volkmar; Rannenberg, Kai; Schmitz, Christopher; Sekulla, André; Terhaag, Frank. 2018. "Das SIDATE-Portal im Einsatz", State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pp. 145-150, Universität der Bundeswehr, Neubiberg.
  • Dax, Julian; Hamburg, Daniel; Pape, Sebastian; Pipek, Volkmar; Rannenberg, Kai; Schmitz, Christopher; Sekulla, André; Terhaag, Frank. 2018. "Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE)", State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pp. 29, Universität der Bundeswehr, Neubiberg.
  • Dax, Julian; Pape, Sebastian; Pipek, Volkmar; Rannenberg, Kai; Schmitz, Christopher; Sekulla, André; Terhaag, Frank. 2018. "Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern", State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pp. 69-74, Universität der Bundeswehr, Neubiberg.
  • Hamburg, Daniel; Niephaus, Thorsten; Noll, Wolfgang; Pape, Sebastian; Rannenberg, Kai; Schmitz, Christopher. 2018. "SIDATE: Gefährdungen und Sicherheitsmaßnahmen", In: State of the Art: IT-Sicherheit für Kritische Infrastrukturen, Eds. Rudel, D. and Lechner, U., pp. 51, Universität der Bundeswehr, Neubiberg.
  • M. Hansen, H. Obersteller, K. Rannenberg, and F. Veseli. 2015. "Establishment and Prospects of Privacy-ABCs", In: Attribute-based Credentials for Trust, Eds. Rannenberg K., Camenisch J., Sabouri A., ISBN: 978-3-319-14439-9, pp. 345-360, DOI:https://doi.org/10.1007/978-3-319-14439-9_11, Springer.
  • Pedersen M.Ø., Mikkelsen G.L., Veseli F., Sabouri A., Vateva-Gurova T.. 2015. "Comparison of mechanisms", In: Attribute-based Credentials for Trust, Eds. Rannenberg K., Camenisch J., Sabouri A., ISBN: 978-3-319-14439-9, pp. 109-141, DOI:https://doi.org/10.1007/978-3-319-14439-9_4, Springer.