Simone Fischer-Hübner

Orcid: 0000-0002-6938-4466

Affiliations:
  • Karlstad University, Sweden


According to our database1, Simone Fischer-Hübner authored at least 104 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy Impact Assessments in the Wild: A Scoping Review.
CoRR, 2024

2023
Structural and functional explanations for informing lay and expert users: the case of functional encryption.
Proc. Priv. Enhancing Technol., October, 2023

Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Transparency of Privacy Risks Using PIA Visualizations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Automating privacy decisions -where to draw the line?
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
A multidisciplinary definition of privacy labels.
Inf. Comput. Secur., 2022

Privacy in Speech and Language Technology (Dagstuhl Seminar 22342).
Dagstuhl Reports, 2022

Capturing drivers' privacy preferences for intelligent transportation systems: An intercultural perspective.
Comput. Secur., 2022

Organisational Privacy Culture and Climate: A Scoping Review.
IEEE Access, 2022

Exploring User-Suitable Metaphors for Differentially Private Data Analyses.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

2021
Reconciling the what, when and how of privacy notifications in fitness tracking scenarios.
Pervasive Mob. Comput., 2021

Stakeholder perspectives and requirements on cybersecurity in Europe.
J. Inf. Secur. Appl., 2021

Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Towards Cybersecurity MOOC Certification.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention.
ACM Trans. Priv. Secur., 2020

Privacy Labelling and the Story of Princess Privacy and the Seven Helpers.
CoRR, 2020

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review.
IEEE Access, 2020

Quality Criteria for Cyber Security MOOCs.
Proceedings of the Information Security Education. Information Security in Action, 2020

Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems: A Study from South-Africa.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

Using PAPAYA for eHealth - Use Case Analysis and Requirements.
Proceedings of the 33rd IEEE International Symposium on Computer-Based Medical Systems, 2020

2019
Making secret sharing based cloud storage usable.
Inf. Comput. Secur., 2019

A survey on anonymous voice over IP communication: attacks and defenses.
Electron. Commer. Res., 2019

To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Making GDPR Usable: A Model to Support Usability Evaluations of Privacy.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

2018
Unobservability.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Pseudonymity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Privacy-Enhancing Technologies.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Anonymity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Helping john to make informed decisions on using social login.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

A MOOC on Privacy by Design and the GDPR.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

HCI Patterns for Cryptographically Equipped Cloud Services.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Human Issues, 2018

mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems.
Proceedings of the 31st IEEE International Symposium on Computer-Based Medical Systems, 2018

Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Tools for Achieving Usable Ex Post Transparency: A Survey.
IEEE Access, 2017

The Smart World Revolution.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Assessments of a Cloud-Based Data Wallet for Personal Identity Management.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017

2016
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work?
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Privacy Impact Assessment Template for Provenance.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Automated Log Audits for Privacy Compliance Validation: A Literature Survey.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

Accountability Through Transparency for Cloud Customers.
Proceedings of the Cloud Computing and Services Science - 5th International Conference, 2015

Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Privacy for Peer Profiling in Collective Adaptive Systems.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

Tools for Cloud Accountability: A4Cloud Tutorial.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

Counteract DNS Attacks on SIP Proxies Using Bloom Filters.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Towards Usable Privacy Policy Display & Management for PrimeLife.
Inf. Manag. Comput. Secur., 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Human-Computer Interaction.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Census 2011 and Privacy.
it Inf. Technol., 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011

Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes.
Proceedings of the Information Security, 14th International Conference, 2011

Evoking Comprehensive Mental Models of Anonymous Credentials.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Towards Usable Privacy Policy Display & Management - The PrimeLife Approach.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Timing Attacks on PIN Input in VoIP Networks (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials.
Proceedings of the Privacy and Identity Management for Life, 2011

Trust and Assurance HCI.
Proceedings of the Privacy and Identity Management for Life, 2011

HCI for Policy Display and Administration.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Blocking attacks on SIP VoIP proxies caused by external processing.
Telecommun. Syst., 2010

Usable Security und Privacy.
Datenschutz und Datensicherheit, 2010

Technik für mehr Transparenz.
digma, 2010

Surveillance and Privacy.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

SIP Proxies: New Reflectors in the Internet.
Proceedings of the Communications and Multimedia Security, 2010

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks.
Proceedings of the Communications and Multimedia Security, 2010

2009
Unobservability.
Proceedings of the Encyclopedia of Database Systems, 2009

Pseudonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

Privacy-Enhancing Technologies.
Proceedings of the Encyclopedia of Database Systems, 2009

Anonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

Exploring Trust, Security and Privacy in Digital Business.
Trans. Large Scale Data Knowl. Centered Syst., 2009

Revealing the Calling History of SIP VoIP Systems by Timing Attacks.
Proceedings of the The Forth International Conference on Availability, 2009

2007
Special issue: TrustBus 2006.
Comput. Syst. Sci. Eng., 2007

Identity Deployment and Management in Wireless Mesh Networks.
Proceedings of the Future of Identity in the Information Society, 2007

Experiences from Educating Practitioners in Vulnerability Analysis.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

How ordinary internet users can have a chance to influence privacy policies.
Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, 2006

2005
Making PRIME usable.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Requirements for Privacy-Enhancements in Mobile Ad Hoc Networks.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Privacy and identity management for everyone.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

2004
Meeting the Global Challenges of Security Incident Response.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2002
Self-Determination in Mobile Internet: PiMI Prototype Results.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Preventing Privacy Attacks and CyberCrime in the Mobile Internet?
Proceedings of the Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society, IFIP 17<sup>th</sup> World Computer Congress, 2002

2001
IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms
Lecture Notes in Computer Science 1958, Springer, ISBN: 3-540-42142-4, 2001

1998
The global information society and electronic commerce: Privacy threats and privacy technologies.
Proceedings of the Computers and Networks in the Age of Globalization, 1998

1997
Pseudonymous audit for privacy enhanced intrusion detection.
Proceedings of the Information Security in Research and Business, 1997

1996
Risks on the way to the global information society.
Proceedings of the Information Systems Security, 1996

1993
IDA (Intrusion Detection and Avoidance System): ein einbruchsentdeckendes und einbruchsvermeidendes System.
PhD thesis, 1993

On the Cutting Edge between Privacy and Security.
Proceedings of the Security and Control of Information Technology in Society, 1993

The Day at St Petersburg.
Proceedings of the Security and Control of Information Technology in Society, 1993

1992
Möglichkeiten und Grenzen von Kriterienkatalogen.
Wirtschaftsinf., 1992

Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms.
Proceedings of the Education and Society, 1992

1990
Combining Verified and Adaptive System Components Towards More Secure Computer Architectures.
Proceedings of the Security and Persistence, 1990

1989
Risikoanalyse verteilter und vernetzter Systeme.
Proceedings of the Organisation der Datenverarbeitung, 1989

Das Virus-Test-Centrum and der Universität Hamburg.
Proceedings of the GI, 1989


  Loading...