Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool., , , and . Privacy and Identity Management, volume 526 of IFIP Advances in Information and Communication Technology, page 207-220. Springer, (2017)Data Protection Impact Assessments in Practice - Experiences from Case Studies., , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 424-443. Springer, (2021)Warum Unternehmen sich (nicht) an Recht und Gesetz halten., and . Datenschutz und Datensicherheit, 43 (8): 493-497 (2019)A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas., , , , and . ADHOCNETS, volume 28 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 896-912. Springer, (2009)„Das Netzwerkdurchsetzungsgesetz“, , , , , , , , , and 1 other author(s). Fraunhofer ISI, Karlsruhe, (2018)Unblackboxing the Effects of Privacy Regulation on Startup Innovation., and . ICIS, Association for Information Systems, (2018)„Datenschutz stärken, Innovationen ermöglichen – Wie man den Koalitionsvertrag ausgestalten sollte“, , , , , , , , , and 2 other author(s). Fraunhofer ISI, Karlsruhe, (2018)A distributed scheduler for airborne backbone networks with directional antennas., , , , and . COMSNETS, page 1-4. IEEE, (2011)Are there any 'object detectors' in the hidden layers of CNNs trained to identify objects or scenes?, , , , and . (2020)cite arxiv:2007.01062Comment: Published in Vision Research 2020, 19 pages, 8 figures.Datenschutz-Risiken partizipativ identifizieren und analysieren., , , and . Datenschutz und Datensicherheit, 44 (3): 161-165 (2020)