Author of the publication

App-generated digital identities extracted through Android permission-based data access - a survey of app privacy.

, and . Sicherheit, volume P-301 of LNI, page 15-28. Gesellschaft für Informatik e.V., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks., , , and . CoRR, (2022)A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps., , , and . Empir. Softw. Eng., 26 (3): 36 (2021)Improving Phishing Detection with the Grey Wolf Optimizer., , and . ICEIC, page 1-6. IEEE, (2022)Modelling privacy harms of compromised personal medical data - beyond data breach., and . ARES, page 133:1-133:9. ACM, (2022)Identification collapse - contingency in Identity Management.. Open Identity Summit, volume P-305 of LNI, page 15-26. Gesellschaft für Informatik e.V., (2020)Identity Management as a target in cyberwar.. Open Identity Summit, volume P-305 of LNI, page 61-70. Gesellschaft für Informatik e.V., (2020)Extraction and Accumulation of Identity Attributes from the Internet of Things., and . Open Identity Summit, volume P-312 of LNI, page 179-192. Gesellschaft für Informatik e.V., (2021)Did App Privacy Improve After the GDPR?, , and . IEEE Secur. Priv., 17 (6): 10-20 (2019)Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks., , , and . BIOSIG, volume P-315 of LNI, page 81-90. Gesellschaft für Informatik e.V., (2021)Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht., and . Sicherheit, volume P-62 of LNI, page 315-326. GI, (2005)