| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | ed. |
APF
|
| 2025 | — | conf |
World Conference on Information Security Education
|
| 2025 | — | conf |
HICSS
|
| 2025 | — | ed. |
SEC (1)
|
| 2025 | — | ed. |
SEC (2)
|
| 2025 | — | conf |
ARES (Workshops 2)
|
| 2025 | — | conf |
World Conference on Information Security Education
|
| 2024 | — | ed. |
APF
|
| 2024 | — | ed. |
APF
|
| 2023 | Misc | conf |
SEC
|
| 2022 | — | ch. |
Cybersecurity of Digital Service Chains
|
| 2022 | — | ed. |
APF
|
| 2021 | — | book |
IFIP's Exciting First 60+ Years
|
| 2021 | — | conf |
CSCS
|
| 2021 | — | ed. |
APF
|
| 2020 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | Misc | ed. |
SEC
|
| 2020 | — | ed. |
APF
|
| 2019 | — | conf |
APF
|
| 2019 | — | conf |
HICSS
|
| 2019 | J | jnl |
Mob. Networks Appl.
|
| 2019 | Misc | conf |
SEC
|
| 2019 | Misc | conf |
SAC
|
| 2019 | — | ed. |
APF
|
| 2019 | — | conf |
SNAMS
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2018 | — | conf |
Sicherheit
|
| 2018 | — | conf |
HAISA
|
| 2018 | — | ed. |
APF
|
| 2018 | — | conf |
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.
Sicherheit
|
| 2017 | B | conf |
TrustBus
|
| 2017 | — | conf |
IESS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | ed. |
APF
|
| 2017 | — | conf |
Privacy and Identity Management
|
| 2017 | J | jnl |
New Media Soc.
|
| 2017 | Misc | conf |
SEC
|
| 2016 | J | jnl |
Dagstuhl Reports
|
| 2016 | — | conf |
HAISA
|
| 2016 | Misc | conf |
SEC
|
| 2016 | — | ed. |
APF
|
| 2015 | — | ch. |
Attribute-based Credentials for Trust
|
| 2015 | — | book |
|
| 2015 | J | jnl |
Datenschutz und Datensicherheit
|
| 2015 | — | ch. |
Attribute-based Credentials for Trust
|
| 2015 | — | ch. |
Attribute-based Credentials for Trust
|
| 2015 | — | ch. |
Attribute-based Credentials for Trust
|
| 2015 | — | conf |
APF
|
| 2015 | J | jnl |
Comput. Secur.
|
| 2014 | — | conf |
Privacy and Identity Management
|
| 2014 | — | conf |
CSP Forum
|
| 2014 | Misc | conf |
SEC
|
| 2014 | J | jnl |
Inform. Spektrum
|
| 2014 | Misc | conf |
SEC
|
| 2014 | B | conf |
TrustBus
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | — | conf |
MKWI
|
| 2013 | — | conf |
Secure Data Management
|
| 2012 | B | conf |
TrustBus
|
| 2012 | — | conf |
APF
|
| 2011 | Misc | conf |
SEC
|
| 2011 | J | jnl |
Datenschutz und Datensicherheit
|
| 2011 | — | ch. |
Digital Privacy - PRIME
|
| 2011 | J | jnl |
Dagstuhl Manifestos
|
| 2011 | J | jnl |
Dagstuhl Reports
|
| 2011 | C | conf |
WISTP
|
| 2011 | — | ch. |
Digital Privacy - PRIME
|
| 2011 | — | book |
Privacy and Identity Management for Life
|
| 2011 | — | ch. |
Privacy and Identity Management for Life
|
| 2011 | J | jnl |
J. Syst. Softw.
|
| 2010 | — | conf |
ServiceWave
|
| 2010 | Misc | conf |
SEC
|
| 2010 | Misc | conf |
SEC
|
| 2010 | — | ed. |
MMS
|
| 2010 | Misc | ed. |
SEC
|
| 2009 | — | ch. |
The Future of Identity in the Information Society
|
| 2009 | — | ch. |
The Future of Identity in the Information Society
|
| 2009 | — | book |
The Future of Identity in the Information Society
|
| 2008 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2007 | Misc | ed. |
IWSEC
|
| 2007 | Misc | conf |
SEC
|
| 2007 | — | conf |
AMCIS
|
| 2007 | — | conf |
Wirtschaftsinformatik (1)
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2006 | Misc | ed. |
IWSEC
|
| 2006 | J | jnl |
Datenschutz und Datensicherheit
|
| 2006 | Misc | ed. |
SEC
|
| 2006 | J | jnl |
Prax. Inf.verarb. Kommun.
|
| 2005 | — | conf |
GI Jahrestagung (2)
|
| 2005 | — | conf |
ECIS
|
| 2005 | — | ed. |
MCTA
|
| 2005 | — | conf |
MCTA
|
| 2005 | J | jnl |
Wirtschaftsinf.
|
| 2004 | — | conf |
I3E
|
| 2004 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2004 | — | conf |
MOBIS
|
| 2004 | — | conf |
DFN-Arbeitstagung über Kommunikationsnetze
|
| 2003 | — | ed. |
GI Jahrestagung (1)
|
| 2003 | — | ed. |
GI Jahrestagung (2)
|
| 2003 | — | ed. |
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit")
|
| 2003 | — | conf |
ECIS
|
| 2003 | J | jnl |
Datenschutz und Datensicherheit
|
| 2003 | — | conf |
GI Jahrestagung (2)
|
| 2003 | — | conf |
GI Jahrestagung (1)
|
| 2003 | — | conf |
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit")
|
| 2000 | J | jnl |
Inform. Forsch. Entwickl.
|
| 2000 | A | conf |
ESORICS
|
| 2000 | Misc | conf |
SEC
|
| 2000 | J | jnl |
Wirtschaftsinf.
|
| 2000 | C | conf |
NSPW
|
| 2000 | A | conf |
ACSAC
|
| 2000 | — | conf |
Workshop on Design Issues in Anonymity and Unobservability
|
| 1999 | J | jnl |
Prax. Inf.verarb. Kommun.
|
| 1999 | J | jnl |
Datenschutz und Datensicherheit
|
| 1999 | J | jnl |
Inform. Forsch. Entwickl.
|
| 1999 | J | jnl |
Prax. Inf.verarb. Kommun.
|
| 1999 | J | jnl |
HMD Prax. Wirtsch.
|
| 1998 | — | book |
|
| 1997 | Misc | conf |
SEC
|
| 1997 | — | — |
Kriterien und Zertifizierung mehrseitiger IT-Sicherheit - eine Untersuchung der technischen Grundlagen und der organisatorischen Rahmenbedingungen.
|
| 1997 | Misc | conf |
SEC
|
| 1997 | — | book |
Verläßliche IT-Systeme
|
| 1996 | J | jnl |
Informationstechnik Tech. Inform.
|
| 1995 | — | conf |
VIS
|
| 1993 | — | conf |
Security and Control of Information Technology in Society
|
| 1992 | — | conf |
IFIP Congress (2)
|
| 1991 | — | conf |
VIS
|