Author of the publication

Mobile Benutzer - Mobiles Wissen - Mobiles Internet.

, , , , and . GI Jahrestagung (2), volume P-35 of LNI, page 347-348. GI, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym., , and . Proc. Priv. Enhancing Technol., 2020 (2): 111-128 (2020)Engineering privacy by design: lessons from the design and implementation of an identity wallet platform., , , and . SAC, page 1475-1483. ACM, (2019)Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns., , and . Comput. Secur., (2015)Identitätsmanagement in Mobilkommunikationssystemen und ihren Anwendungen.. GI Jahrestagung (2), volume P-68 of LNI, page 522. GI, (2005)Identity management in mobile applications - Unobtrusive but already effective.. Datenschutz und Datensicherheit, (2003)ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment., , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 165-179. Springer, (2019)Mobile Benutzer - Mobiles Wissen - Mobiles Internet., , , , and . GI Jahrestagung (2), volume P-35 of LNI, page 347-348. GI, (2003)Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 361-376. GI, (2004)Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen., , , , and . MCTA, volume P-59 of LNI, page 9-16. GI, (2005)The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten., , and . New Media Soc., 19 (12): 1983-2002 (2017)