Author of the publication

Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen.

, , , , and . MCTA, volume P-59 of LNI, page 9-16. GI, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engineering privacy by design: lessons from the design and implementation of an identity wallet platform., , , and . SAC, page 1475-1483. ACM, (2019)Identitätsmanagement in Mobilkommunikationssystemen und ihren Anwendungen.. GI Jahrestagung (2), volume P-68 of LNI, page 522. GI, (2005)Identity management in mobile applications - Unobtrusive but already effective.. Datenschutz und Datensicherheit, (2003)ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment., , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 165-179. Springer, (2019)Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen., , , , and . MCTA, volume P-59 of LNI, page 9-16. GI, (2005)Mobile Benutzer - Mobiles Wissen - Mobiles Internet., , , , and . GI Jahrestagung (2), volume P-35 of LNI, page 347-348. GI, (2003)Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 361-376. GI, (2004)A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications., , , and . HICSS, page 1-10. ScholarSpace, (2019)PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts., , and . SNAMS, page 53-60. IEEE, (2019)A Multilateral Privacy Impact Analysis Method for Android Apps., , , and . APF, volume 11498 of Lecture Notes in Computer Science, page 87-106. Springer, (2019)