default search action
Kai Rannenberg
Person information
- affiliation: Johann Wolfgang Goethe-Universität Frankfurt am Main, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e24]Kai Rannenberg, Prokopios Drogkaris, Cédric Lauradoux:
Privacy Technologies and Policy - 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings. Lecture Notes in Computer Science 13888, Springer 2024, ISBN 978-3-031-61088-2 [contents] - [e23]Meiko Jensen, Cédric Lauradoux, Kai Rannenberg:
Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4-5, 2024, Proceedings. Lecture Notes in Computer Science 14831, Springer 2024, ISBN 978-3-031-68023-6 [contents] - 2023
- [c56]Peter Hamm, Sebastian Pape, Kai Rannenberg:
The Influence of Privacy Concerns on Cryptocurrency Acceptance. SEC 2023: 45-58 - 2022
- [p10]Frédéric Tronnier, Sebastian Pape, Sascha Löbner, Kai Rannenberg:
A Discussion on Ethical Cybersecurity Issues in Digital Service Chains. Cybersecurity of Digital Service Chains 2022: 222-256 - [e22]Agnieszka Gryszczynska, Przemyslaw Polanski, Nils Gruschka, Kai Rannenberg, Monika Adamczyk:
Privacy Technologies and Policy - 10th Annual Privacy Forum, APF 2022, Warsaw, Poland, June 23-24, 2022, Proceedings. Lecture Notes in Computer Science 13279, Springer 2022, ISBN 978-3-031-07314-4 [contents] - 2021
- [c55]Sascha Löbner, Frédéric Tronnier, Sebastian Pape, Kai Rannenberg:
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing. CSCS 2021: 7:1-7:11 - [e21]Nils Gruschka, Luis Filipe Coelho Antunes, Kai Rannenberg, Prokopios Drogkaris:
Privacy Technologies and Policy - 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. Lecture Notes in Computer Science 12703, Springer 2021, ISBN 978-3-030-76662-7 [contents] - [e20]Michael Goedicke, Erich J. Neuhold, Kai Rannenberg:
Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical Committees and Working Groups. IFIP Advances in Information and Communication Technology 600, Springer 2021, ISBN 978-3-030-81700-8 [contents] - 2020
- [j25]David Harborth, Sebastian Pape, Kai Rannenberg:
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. Proc. Priv. Enhancing Technol. 2020(2): 111-128 (2020) - [e19]Luís Antunes, Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Prokopios Drogkaris:
Privacy Technologies and Policy - 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22-23, 2020, Proceedings. Lecture Notes in Computer Science 12121, Springer 2020, ISBN 978-3-030-55195-7 [contents] - [e18]Marko Hölbl, Kai Rannenberg, Tatjana Welzer:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 580, Springer 2020, ISBN 978-3-030-58200-5 [contents]
2010 – 2019
- 2019
- [j24]Majid Hatamian, Jetzabel M. Serna, Kai Rannenberg:
Revealing the unrevealed: Mining smartphone users privacy perception on app markets. Comput. Secur. 83: 332-353 (2019) - [j23]Sebastian Pape, Kai Rannenberg:
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. Mob. Networks Appl. 24(3): 925-933 (2019) - [c54]Majid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg:
A Multilateral Privacy Impact Analysis Method for Android Apps. APF 2019: 87-106 - [c53]David Harborth, Majid Hatamian, Welderufael B. Tesfay, Kai Rannenberg:
A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications. HICSS 2019: 1-10 - [c52]Fatbardh Veseli, Jetzabel Serna-Olvera, Tobias Pulls, Kai Rannenberg:
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform. SAC 2019: 1475-1483 - [c51]Majid Hatamian, Sebastian Pape, Kai Rannenberg:
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. SEC 2019: 165-179 - [c50]Welderufael B. Tesfay, Jetzabel M. Serna, Kai Rannenberg:
PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts. SNAMS 2019: 53-60 - [e17]Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka:
Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings. Lecture Notes in Computer Science 11498, Springer 2019, ISBN 978-3-030-21751-8 [contents] - 2018
- [c49]Christopher Schmitz, André Sekulla, Sebastian Pape, Volkmar Pipek, Kai Rannenberg:
Easing the Burden of Security Self-Assessments. HAISA 2018: 272-281 - [c48]Sebastian Pape, Daniel Tasche, Iulia Bastys, Akos Grosz, Jörg Lässig, Kai Rannenberg:
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping. Sicherheit 2018: 17-28 - [c47]David Harborth, Maren Braun, Akos Grosz, Sebastian Pape, Kai Rannenberg:
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. Sicherheit 2018: 29-41 - [e16]Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas:
Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11079, Springer 2018, ISBN 978-3-030-02546-5 [contents] - 2017
- [j22]Shuzhe Yang, Anabel Quan-Haase, Kai Rannenberg:
The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten. New Media Soc. 19(12): 1983-2002 (2017) - [c46]Ahmed Seid Yesuf, Lars Wolos, Kai Rannenberg:
Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services. IESS 2017: 323-336 - [c45]Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini:
Secure and Privacy-Friendly Storage and Data Processing in the Cloud. Privacy and Identity Management 2017: 153-169 - [c44]Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg:
Using Fraud Patterns for Fraud Risk Assessment of E-services. SEC 2017: 553-567 - [c43]Majid Hatamian, Jetzabel M. Serna, Kai Rannenberg, Bodo Igler:
FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps. TrustBus 2017: 3-18 - [e15]Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg:
Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10518, Springer 2017, ISBN 978-3-319-67279-3 [contents] - [i4]Julian Dax, Ana Ivan, Benedikt Ley, Sebastian Pape, Volkmar Pipek, Kai Rannenberg, Christopher Schmitz, André Sekulla:
IT Security Status of German Energy Providers. CoRR abs/1709.01254 (2017) - [i3]David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg:
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. CoRR abs/1711.07220 (2017) - 2016
- [c42]Julian Dax, Benedikt Ley, Sebastian Pape, Christopher Schmitz, Volkmar Pipek, Kai Rannenberg:
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions. HAISA 2016: 78-87 - [c41]Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg:
On Gender Specific Perception of Data Sharing in Japan. SEC 2016: 150-160 - [e14]Stefan Schiffner, Jetzabel M. Serna, Demosthenes Ikonomou, Kai Rannenberg:
Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9857, Springer 2016, ISBN 978-3-319-44759-9 [contents] - [i2]Tyler W. Moore, Christian W. Probst, Kai Rannenberg, Michel van Eeten:
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). Dagstuhl Reports 6(11): 63-89 (2016) - 2015
- [j21]Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns. Comput. Secur. 53: 187-202 (2015) - [j20]Kai Rannenberg, Helmut Reimer:
Chancen neuer Sicherheitsanker? Datenschutz und Datensicherheit 39(4): 257-258 (2015) - [c40]Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo:
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. APF 2015: 104-123 - [p9]Kai Rannenberg, Welderufael Tesfay, Ahmad Sabouri:
Introduction. Attribute-based Credentials for Trust 2015: 1-9 - [p8]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri:
An Architecture for Privacy-ABCs. Attribute-based Credentials for Trust 2015: 11-78 - [p7]Marit Hansen, Hannah Obersteller, Kai Rannenberg, Fatbardh Veseli:
Establishment and Prospects of Privacy-ABCs. Attribute-based Credentials for Trust 2015: 345-360 - [p6]Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, Welderufael Tesfay:
Further Challenges. Attribute-based Credentials for Trust 2015: 361-367 - [e13]Kai Rannenberg, Jan Camenisch, Ahmad Sabouri:
Attribute-based Credentials for Trust: Identity in the Information Society. Springer 2015, ISBN 978-3-319-14438-2 [contents] - 2014
- [j19]Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti:
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. Inform. Spektrum 37(1): 14-24 (2014) - [c39]Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg:
Privacy-Respecting School Community Interaction Platform. CSP Forum 2014: 108-119 - [c38]Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. HCI (24) 2014: 375-386 - [c37]Frédéric Thiesse, Kai Rannenberg, Thomas Kirste:
Vorwort. MKWI 2014: 1834 - [c36]Ahmad Sabouri, Kai Rannenberg:
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. Privacy and Identity Management 2014: 3-16 - [c35]Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. SEC 2014: 113-126 - [c34]Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri:
Towards a Framework for Benchmarking Privacy-ABC Technologies. SEC 2014: 197-204 - [c33]Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Trust Relationships in Privacy-ABCs' Ecosystems. TrustBus 2014: 13-23 - 2013
- [c32]Kai Rannenberg:
Where Security Research Should Go in the Next Decade. Secure Data Management 2013: 28-32 - 2012
- [c31]Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg:
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication. APF 2012: 111-124 - [c30]Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Attribute-Based Credentials for Trust (ABC4Trust). TrustBus 2012: 218-219 - 2011
- [j18]Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1): 1-20 (2011) - [j17]Kai Rannenberg:
ISO/IEC standardization of identity management and privacy technologies - Making IT Security and Biometrics contribute to better Identity Management and Privacy. Datenschutz und Datensicherheit 35(1): 27-29 (2011) - [j16]Markus Tschersich, Christian Kahl, Stephan Heim, Stephen Crane, Katja Böttcher, Ioannis Krontiris, Kai Rannenberg:
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials. J. Syst. Softw. 84(11): 1947-1960 (2011) - [c29]Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. SEC 2011: 317-325 - [c28]Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg:
Privacy Respecting Targeted Advertising for Social Networks. WISTP 2011: 361-370 - [p5]Sascha Koschinat, Gökhan Bal, Christian Weber, Kai Rannenberg:
Privacy by Sustainable Identity Management Enablers. Privacy and Identity Management for Life 2011: 431-452 - [p4]Jan Zibuschka, Kai Rannenberg, Tobias Kölsch:
Location-Based Services. Digital Privacy - PRIME 2011: 679-695 - [p3]Tobias Kölsch, Jan Zibuschka, Kai Rannenberg:
Privacy and Identity Management Requirements: An Application Prototype Perspective. Digital Privacy - PRIME 2011: 735-749 - [e12]Jan Camenisch, Simone Fischer-Hübner, Kai Rannenberg:
Privacy and Identity Management for Life. Springer 2011, ISBN 978-3-642-20316-9 [contents] - [i1]Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Reports 1(2): 1-15 (2011) - 2010
- [c27]Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg:
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. SEC 2010: 277-288 - [c26]Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. SEC 2010: 302-310 - [c25]Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg:
Enhanced Privacy and Identity Management for Community Services - Demo of the PICOS Project. ServiceWave 2010: 218-219 - [e11]Markus Bick, Stefan Eulgem, Elgar Fleisch, J. Felix Hampe, Birgitta König-Ries, Franz Lehner, Key Pousttchi, Kai Rannenberg:
Mobile und Ubiquitäre Informationssysteme - Technologien, Anwendungen und Dienste zur Unterstützung von mobiler Kollaboration Proceedings zur 5. Konferenz Mobile und Ubiquitäre Informationssysteme (MMS 2010), 23.-25. Februar 2010 in Göttingen, Germany. LNI P-163, GI 2010, ISBN 978-3-88579-257-4 [contents] - [e10]Kai Rannenberg, Vijay Varadharajan, Christian Weber:
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. IFIP Advances in Information and Communication Technology 330, Springer 2010, ISBN 978-3-642-15256-6 [contents]
2000 – 2009
- 2009
- [p2]Denis Royer, André Deuker, Kai Rannenberg:
Mobility and Identity. The Future of Identity in the Information Society 2009: 195-242 - [p1]Kai Rannenberg, Denis Royer:
Open Challenges - Towards the (Not So Distant) Future of Identity. The Future of Identity in the Information Society 2009: 391-399 - [e9]Kai Rannenberg, Denis Royer, André Deuker:
The Future of Identity in the Information Society. Springer 2009, ISBN 978-3-540-88480-4 [contents] - 2008
- [j15]Leon Strous, Kai Rannenberg:
Editorial. Int. J. Crit. Infrastructure Prot. 1: 3 (2008) - 2007
- [j14]Pete Bramhall, Marit Hansen, Kai Rannenberg, Thomas Roessler:
User-Centric Identity Management: New Trends in Standardization and Regulation. IEEE Secur. Priv. 5(4): 84-87 (2007) - [c24]Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:
Privacy-Friendly LBS: A Prototype-Supported Case Study. AMCIS 2007: 40 - [c23]Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:
Enabling Privacy of Real-Life LBS. SEC 2007: 325-336 - [c22]Mike Radmacher, Jan Zibuschka, Tobias Scherner, Lothar Fritsch, Kai Rannenberg:
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen. Wirtschaftsinformatik (1) 2007: 237-254 - [e8]Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg:
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings. Lecture Notes in Computer Science 4752, Springer 2007, ISBN 978-3-540-75650-7 [contents] - 2006
- [j13]Denis Royer, Kai Rannenberg:
Mobilität, mobile Technologie und Identität - Mobile Identitätsmanagementsysteme. Datenschutz und Datensicherheit 30(9): 571-575 (2006) - [j12]Lothar Fritsch, Tobias Scherner, Kai Rannenberg:
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services. Prax. Inf.verarb. Kommun. 29(1): 37-42 (2006) - [e7]Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Lecture Notes in Computer Science 4266, Springer 2006, ISBN 3-540-47699-7 [contents] - [e6]Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog:
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. IFIP 201, Springer 2006, ISBN 0-387-33405-X [contents] - 2005
- [j11]Kai Rannenberg, Stefan Figge, Ingo Schneider:
Mobile Systeme und Anwendungen - Hammer sucht Nagel. Wirtschaftsinf. 47(1): 1-2 (2005) - [c21]Jan Muntermann, Heiko Rossnagel, Kai Rannenberg:
Mobile Brokerage Infrastructures - Capabilities and Security Requirements. ECIS 2005: 610-620 - [c20]Kai Rannenberg:
Identitätsmanagement in Mobilkommunikationssystemen und ihren Anwendungen. GI Jahrestagung (2) 2005: 522 - [c19]Kai Rannenberg, Andreas Albers, Stefan Figge, Mike Radmacher, Heiko Rossnagel:
Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen. MCTA 2005: 9-16 - [e5]J. Felix Hampe, Franz Lehner, Key Pousttchi, Kai Rannenberg, Klaus Turowski:
Mobile Business - Processes, Platforms, Payment - Proceedings zur 5. Konferenz Mobile Commerce Technologien und Anwendungen (MCTA 2005), 31.01.-02.02.2005, Universität Augsburg. LNI P-59, GI 2005, ISBN 3-88579-388-1 [contents] - 2004
- [j10]Kai Rannenberg:
Identity management in mobile cellular networks and related applications. Inf. Secur. Tech. Rep. 9(1): 77-85 (2004) - [c18]Jan Muntermann, Heiko Rossnagel, Kai Rannenberg:
Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen. DFN-Arbeitstagung über Kommunikationsnetze 2004: 361-376 - [c17]Thomas Lindner, Lothar Fritsch, Kilian Plank, Kai Rannenberg:
Exploitation of Public and Private WiFi Coverage for New Business Models. I3E 2004: 131-148 - [c16]Stefan Figge, Kai Rannenberg:
Inviting New Players To The Multimedia M-Commerce Arena: An approach to enhance the current m-Commerce business model with regard to emerging DVB-T networks. MOBIS 2004: 311-322 - 2003
- [j9]Kai Rannenberg:
Identity management in mobile applications - Unobtrusive but already effective. Datenschutz und Datensicherheit 27(9) (2003) - [c15]Stefan Figge, Gregor Schrott, Jan Muntermann, Kai Rannenberg, S.-H. Chun:
Earning m-oney - a situation based approach for mobile business models. ECIS 2003: 642-656 - [c14]Klaus R. Dittrich, Wolfgang König, Andreas Oberweis, Kai Rannenberg, Wolfgang Wahlster:
Vorwort der Herausgeber. GI Jahrestagung (1) 2003: 3-10 - [c13]Rüdiger Grimm, Hubert B. Keller, Kai Rannenberg:
Vorwort. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 3 - [c12]Kurt Geihs, Norbert Gronau, Sonja Martens, Kai Rannenberg, Thomas Schwotzer:
Mobile Benutzer - Mobiles Wissen - Mobiles Internet. GI Jahrestagung (2) 2003: 347-348 - [e4]Klaus R. Dittrich, Wolfgang König, Andreas Oberweis, Kai Rannenberg, Wolfgang Wahlster:
33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29 - October 2, 2003, Band 1. LNI P-34, GI 2003, ISBN 3-88579-363-6 [contents] - [e3]Klaus R. Dittrich, Wolfgang König, Andreas Oberweis, Kai Rannenberg, Wolfgang Wahlster:
33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29 - October 2, 2003, Band 2. LNI P-35, GI 2003, ISBN 3-88579-364-4 [contents] - [e2]Rüdiger Grimm, Hubert B. Keller, Kai Rannenberg:
33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29 - October 2, 2003. LNI P-36, GI 2003, ISBN 3-88579-365-2 [contents] - 2000
- [j8]Kai Rannenberg:
Electronic Commerce und Mehrseitige Sicherheit: Baustellen, Fortschritte und Perspektiven. Inform. Forsch. Entwickl. 15(4): 193-206 (2000) - [j7]Kai Rannenberg:
Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet. Wirtschaftsinf. 42(6): 489-498 (2000) - [c11]Kai Rannenberg, Giovanni Iachello:
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? ACSAC 2000: 107- - [c10]Giovanni Iachello, Kai Rannenberg:
Protection Profiles for Remailer Mixes. Workshop on Design Issues in Anonymity and Unobservability 2000: 181-230 - [c9]Kai Rannenberg:
How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. ESORICS 2000: 37-54 - [c8]Kai Rannenberg:
Multilateral security a concept and examples for balanced security. NSPW 2000: 151-162 - [c7]Kai Rannenberg:
IT Security Certification and Criteria. Progress, Problems and Perspectives. SEC 2000: 1-10
1990 – 1999
- 1999
- [j6]Kai Rannenberg, Dirk Fox:
Privacy Points. Datenschutz und Datensicherheit 23(2) (1999) - [j5]Kai Rannenberg:
Sicherung internetbasierter Unternehmenskommunikation. HMD Prax. Wirtsch. 209: 53-52 (1999) - [j4]Günter Müller, Kai Rannenberg:
Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm. Inform. Forsch. Entwickl. 14(1): 46-48 (1999) - [j3]Günter Müller, Kai Rannenberg:
Sicherheit, auch das noch!?! Prax. Inf.verarb. Kommun. 22(3): 138-139 (1999) - [j2]Kai Rannenberg:
IT-Sicherheitszertifizierung - Garantier für Sicherheit? Prax. Inf.verarb. Kommun. 22(3): 154-161 (1999) - 1998
- [b2]Kai Rannenberg:
Zertifizierung mehrseitiger IT-Sicherheit - Kriterien und organisatorische Rahmenbedingungen. University of Freiburg, Freiburg im Breisgau, Germany, DuD-Fachbeiträge, Vieweg 1998, ISBN 978-3-528-05666-7, pp. I-XX, 1-230 - 1997
- [b1]Kai Rannenberg:
Kriterien und Zertifizierung mehrseitiger IT-Sicherheit - eine Untersuchung der technischen Grundlagen und der organisatorischen Rahmenbedingungen. Universität Freiburg, 1997, pp. I-XVI, 1-192 - [c6]Michael Sobirey, Simone Fischer-Hübner, Kai Rannenberg:
Pseudonymous audit for privacy enhanced intrusion detection. SEC 1997: 151-163 - [c5]Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg:
Individual management of personal reachability in mobile communication. SEC 1997: 164-174 - [e1]Günter Müller, Kai Rannenberg, Manfred Reitenspieß, Helmut Stiegler:
Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld. DuD-Fachbeiträge, Vieweg+Teubner Verlag 1997, ISBN 978-3-528-05594-3 [contents] - 1996
- [j1]Kai Rannenberg, Andreas Pfitzmann, Günter Müller:
Sicherheit, insbesondere mehrseitige IT-Sicherheit. Informationstechnik Tech. Inform. 38(4): 7-10 (1996) - 1995
- [c4]Kai Rannenberg:
Evaluationskriterien zur IT-Sicherheit - Entwicklung und Perspektiven in der Normung und außerhalb. VIS 1995: 45-68 - 1993
- [c3]Kai Rannenberg:
Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security. Security and Control of Information Technology in Society 1993: 113-128 - 1992
- [c2]Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg:
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? IFIP Congress (2) 1992: 579-587 - 1991
- [c1]Martin Meyer, Kai Rannenberg:
Eine Bewertung der "Information Technology Security Evaluation Criteria". VIS 1991: 243-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint