Sven Wohlgemuth

Orcid: 0000-0001-5276-940X

According to our database1, Sven Wohlgemuth authored at least 39 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2019
Competitive Compliance with Blockchain.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

2018
Privacy-Enhancing Trust Infrastructure for Process Mining.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2015
Resilience by Usable Security.
Proceedings of the Mensch und Computer 2015, 2015

2014
Security and privacy in business networking.
Electron. Mark., 2014

Resilience as a New Enforcement Model for IT Security Based on Usage Control.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Is Privacy Supportive for Adaptive ICT Systems?
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Adaptive User-Centered Security.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers.
IEEE Syst. J., 2013

A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Protecting Access Pattern Privacy in Database Outsourcing Service.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Securing Smartphone Compartments: Approaches and Solutions.
Proceedings of the ISSE 2012, 2012

2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinf., 2011

Nachhaltiges Computing in Clouds.
Wirtschaftsinf., 2011

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011

Aspects of privacy for electronic health records.
Int. J. Medical Informatics, 2011

Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Bus. Inf. Syst. Eng., 2011

Sustainable Cloud Computing.
Bus. Inf. Syst. Eng., 2011

User Centric Privacy in Mobile Communication Scenarios.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Fine-Grained Access Control for Electronic Health Record Systems.
Proceedings of the U- and E-Service, Science and Technology, 2010

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010

2009
Privatsphäre durch die Delegation von Rechten.
PhD thesis, 2009

On Privacy-aware Delegation of Personal Data using Digital Watermarking.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009

On Observable Delegation of Personal Data by Watermarking.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Privacy and Identity.
Proceedings of the Future of Identity in the Information Society, 2009

Privatsphäre durch die Delegation von Rechten.
Vieweg+Teubner, 2009

2006
Privacy with Delegation of Rights by Identity Management.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2003
Mit Sicherheit zukunftsfähig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik".
Prax. Inf.verarb. Kommun., 2003

DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik".
it Inf. Technol., 2003

Sichere IT-Systeme.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003


  Loading...