Lothar Fritsch

Orcid: 0000-0002-0418-4121

According to our database1, Lothar Fritsch authored at least 65 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review.
IEEE Access, 2024

2023
Early Labour App: Developing a practice-based mobile health application for digital early labour support.
Int. J. Medical Informatics, September, 2023

Electronic identity mass compromize: Options for recovery.
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023

2022
Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks.
Proceedings of the Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022., 2022

An Overview of Artificial Intelligence Used in Malware.
Proceedings of the Nordic Artificial Intelligence Research and Development, 2022

Improving Phishing Detection with the Grey Wolf Optimizer.
Proceedings of the International Conference on Electronics, Information, and Communication, 2022

Modelling privacy harms of compromised personal medical data - beyond data breach.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2022

2021
A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps.
Empir. Softw. Eng., 2021

Mapping Identity Management in Data Lakes.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Extraction and Accumulation of Identity Attributes from the Internet of Things.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
App-generated digital identities extracted through Android permission-based data access - a survey of app privacy.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Identity Management as a target in cyberwar.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

Identification collapse - contingency in Identity Management.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

2019
Cyberattack Detection and Response.
J. Univers. Comput. Sci., 2019

Did App Privacy Improve After the GDPR?
IEEE Secur. Priv., 2019

Helping Software Architects Familiarize with the General Data Protection Regulation.
Proceedings of the IEEE International Conference on Software Architecture Companion, 2019

A Multilateral Privacy Impact Analysis Method for Android Apps.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
A MOOC on Privacy by Design and the GDPR.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2017
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Derived Partial Identities Generated from App Permissions.
Proceedings of the Open Identity Summit 2017, 2017

Privacy dark patterns in identity management.
Proceedings of the Open Identity Summit 2017, 2017

Partial Commitment - "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

A Literature Study on Privacy Patterns Research.
Proceedings of the 43rd Euromicro Conference on Software Engineering and Advanced Applications, 2017

2014
Accessibility and Inclusion Requirements for Future e-Identity Solutions.
Proceedings of the Computers Helping People with Special Needs, 2014

2013
The Clean Privacy Ecosystem of the Future Internet.
Future Internet, 2013

Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Executable Model-Based Risk Assessment Method for Identity Management Systems.
Proceedings of the Policies and Research in Identity Management, 2013

Trustworthy and Inclusive Identity Management for Applications in Social Media.
Proceedings of the Human-Computer Interaction. Users and Contexts of Use, 2013

2012
A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

2011
Technology Assurance.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Towards Legal Privacy Risk Assessment Automation in Social Media.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Security and privacy engineering for corporate use of social community platforms.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

On the Internet of Things, Trust is Relative.
Proceedings of the Constructing Ambient Intelligence, 2011

2010
Privacy Policy Referencing.
Proceedings of the Trust, 2010

A Taxonomy of Privacy and Security Risks Contributing Factors.
Proceedings of the Privacy and Identity Management for Life, 2010

2009
Privatsphäre per Design: Privatsphäre respektierende Infrastrukturen für verteilte Mehrparteien-Geschäftsmodelle und Dienste.
PhD thesis, 2009

A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Towards a Research Road Map for the Management of Privacy Risks in Information Systems.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Profiling and Location-Based Services (LBS).
Proceedings of the Profiling the European Citizen, Cross-Disciplinary Perspectives, 2008

2007
Innovationsförderung im öffentlichen Umfeld durch Public Private Partnerships.
Wirtschaftsinf., 2007

Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering.
J. Theor. Appl. Electron. Commer. Res., 2007

Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Enabling Privacy of Real-Life LBS.
Proceedings of the New Approaches for Security, 2007

Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Privacy-Friendly LBS: A Prototype-Supported Case Study.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services.
Prax. Inf.verarb. Kommun., 2006

Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2005
Privacy for Profitable Location Based Services.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location-Based-Service-Angeboten.
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005

A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection.
Proceedings of the Networking, 2005

Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle.
Proceedings of the Virtuelle Organisation und Neue Medien 2005, Workshop GeNeMe 2005, 2005

Personal Rights Management- Enabling Privacy Rights in Digital Online Content.
Proceedings of the Communications and Multimedia Security, 2005

Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure, Economic, and Mobile Infastructure.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Exploitation of Public and Private WiFi Coverage for New Business Models.
Proceedings of the Building The E-Service Society: E-Commerce, 2004

2003
M-Signaturen aus rechtlicher Sicht.
Datenschutz und Datensicherheit, 2003

2001
A secure, affordable infrastructure for electronic signature applications - Overview of a server based, user-friendly approach.
Datenschutz und Datensicherheit, 2001

2000
Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses.
Datenschutz und Datensicherheit, 2000

Security Certificates as a Tool for Measuring Efficiency and Creating Transparency - A Software Vendors View.
Datenschutz und Datensicherheit, 2000


  Loading...