default search action
Lothar Fritsch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Samuel Wairimu, Leonardo Horn Iwaya, Lothar Fritsch, Stefan Lindskog:
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review. IEEE Access 12: 19625-19650 (2024) - [e4]Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil:
Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings. Lecture Notes in Computer Science 14324, Springer 2024, ISBN 978-3-031-47747-8 [contents] - 2023
- [j12]Leonardo Horn Iwaya, Anna Nordin, Lothar Fritsch, Elin Børøsund, Margareta Johansson, Cecilie Varsi, Karin Ängeby:
Early Labour App: Developing a practice-based mobile health application for digital early labour support. Int. J. Medical Informatics 177: 105139 (2023) - [c49]Lothar Fritsch:
Electronic identity mass compromize: Options for recovery. Open Identity Summit 2023 - 2022
- [c48]Aws Naser Jaber, Lothar Fritsch:
Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators. 3PGCIC 2022: 249-257 - [c47]Samuel Wairimu, Lothar Fritsch:
Modelling privacy harms of compromised personal medical data - beyond data breach. ARES 2022: 133:1-133:9 - [c46]Aws Naser Jaber, Lothar Fritsch, Hårek Haugerud:
Improving Phishing Detection with the Grey Wolf Optimizer. ICEIC 2022: 1-6 - [c45]Lothar Fritsch, Aws Jaber, Anis Yazidi:
An Overview of Artificial Intelligence Used in Malware. NAIS 2022: 41-51 - [c44]Lothar Fritsch, Marie Mecaliff, Kathinka Wik Opdal, Mathias Rundgreen, Toril Sachse:
Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks. Open Identity Summit 2022: 15-26 - [i1]Tamás Bisztray, Nils Gruschka, Thirimachos Bourlai, Lothar Fritsch:
Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks. CoRR abs/2211.12899 (2022) - 2021
- [j11]Majid Hatamian, Samuel Wairimu, Nurul Momen, Lothar Fritsch:
A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empir. Softw. Eng. 26(3): 36 (2021) - [c43]Tamás Bisztray, Nils Gruschka, Thirimachos Bourlai, Lothar Fritsch:
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks. BIOSIG 2021: 81-90 - [c42]Anna Nordin, Karin Ängeby, Lothar Fritsch:
Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management. BODYNETS 2021: 168-175 - [c41]Jan Zibuschka, Lothar Fritsch:
Mapping Identity Management in Data Lakes. Open Identity Summit 2021: 15-24 - [c40]Lothar Fritsch, Nils Gruschka:
Extraction and Accumulation of Identity Attributes from the Internet of Things. Open Identity Summit 2021: 179-192 - 2020
- [c39]Ludwig Toresson, Maher Shaker, Sebastian Olars, Lothar Fritsch:
PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users. HCI (40) 2020: 613-621 - [c38]Lothar Fritsch:
Identification collapse - contingency in Identity Management. Open Identity Summit 2020: 15-26 - [c37]Lothar Fritsch:
Identity Management as a target in cyberwar. Open Identity Summit 2020: 61-70 - [c36]Tamás Bisztray, Nils Gruschka, Vasileios Mavroeidis, Lothar Fritsch:
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. Open Identity Summit 2020: 185-192 - [c35]Nurul Momen, Sven Bock, Lothar Fritsch:
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android. SACMAT 2020: 71-80 - [c34]Nurul Momen, Lothar Fritsch:
App-generated digital identities extracted through Android permission-based data access - a survey of app privacy. Sicherheit 2020: 15-28
2010 – 2019
- 2019
- [j10]Nurul Momen, Majid Hatamian, Lothar Fritsch:
Did App Privacy Improve After the GDPR? IEEE Secur. Priv. 17(6): 10-20 (2019) - [j9]Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. J. Univers. Comput. Sci. 25(11): 1394-1395 (2019) - [c33]Majid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg:
A Multilateral Privacy Impact Analysis Method for Android Apps. APF 2019: 87-106 - [c32]Michael Colesky, Katerina Demetzou, Lothar Fritsch, Sebastian Herold:
Helping Software Architects Familiarize with the General Data Protection Regulation. ICSA Companion 2019: 226-229 - 2018
- [c31]Simone Fischer-Hübner, Leonardo A. Martucci, Lothar Fritsch, Tobias Pulls, Sebastian Herold, Leonardo H. Iwaya, Stefan Alfredsson, Albin Zuccato:
A MOOC on Privacy by Design and the GDPR. World Conference on Information Security Education 2018: 95-107 - 2017
- [c30]Jörg Lenhard, Lothar Fritsch, Sebastian Herold:
A Literature Study on Privacy Patterns Research. SEAA 2017: 194-201 - [c29]Lothar Fritsch:
Partial Commitment - "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning. IFIPTM 2017: 3-11 - [c28]Lothar Fritsch:
Privacy dark patterns in identity management. Open Identity Summit 2017: 93-104 - [c27]Lothar Fritsch, Nurul Momen:
Derived Partial Identities Generated from App Permissions. Open Identity Summit 2017: 117-130 - [c26]Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog:
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper). PST 2017: 268-276 - [e3]Lothar Fritsch, Heiko Roßnagel, Detlef Hühnlein:
Open Identity Summit 2017, October 5-6, 2017, Karlstad University, Sweden. LNI P-277, Gesellschaft für Informatik, Bonn 2017 [contents] - 2016
- [e2]Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles D. Raab:
Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers. IFIP Advances in Information and Communication Technology 498, 2016, ISBN 978-3-319-55782-3 [contents] - 2014
- [c25]Trenton Schulz, Lothar Fritsch:
Accessibility and Inclusion Requirements for Future e-Identity Solutions. ICCHP (1) 2014: 316-323 - 2013
- [j8]Lothar Fritsch:
The Clean Privacy Ecosystem of the Future Internet. Future Internet 5(1): 34-45 (2013) - [c24]Till Halbach Røssvoll, Lothar Fritsch:
Trustworthy and Inclusive Identity Management for Applications in Social Media. HCI (3) 2013: 68-77 - [c23]Ebenezer Paintsil, Lothar Fritsch:
Executable Model-Based Risk Assessment Method for Identity Management Systems. IDMAN 2013: 97-99 - [c22]Ebenezer Paintsil, Lothar Fritsch:
Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. TrustBus 2013: 48-61 - 2012
- [c21]Jan Zibuschka, Lothar Fritsch:
A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials. NordSec 2012: 169-183 - 2011
- [c20]Lothar Fritsch, Arne-Kristian Groven, Trenton Schulz:
On the Internet of Things, Trust is Relative. AmI Workshops 2011: 267-273 - [c19]Ebenezer Paintsil, Lothar Fritsch:
Towards Legal Privacy Risk Assessment Automation in Social Media. GI-Jahrestagung 2011: 411 - [c18]Lothar Fritsch:
Security and privacy engineering for corporate use of social community platforms. GI-Jahrestagung 2011: 416 - [p2]Tobias Scherner, Lothar Fritsch:
Technology Assurance. Digital Privacy - PRIME 2011: 597-607 - 2010
- [c17]Ebenezer Paintsil, Lothar Fritsch:
A Taxonomy of Privacy and Security Risks Contributing Factors. PrimeLife 2010: 52-63 - [c16]Audun Jøsang, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. TrustBus 2010: 129-140 - [e1]Elisabeth de Leeuw, Simone Fischer-Hübner, Lothar Fritsch:
Policies and Research in Identity Management - Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010. Proceedings. IFIP Advances in Information and Communication Technology 343, Springer 2010, ISBN 978-3-642-17302-8 [contents]
2000 – 2009
- 2009
- [b1]Lothar Fritsch:
Privatsphäre per Design: Privatsphäre respektierende Infrastrukturen für verteilte Mehrparteien-Geschäftsmodelle und Dienste. Goethe University Frankfurt am Main, 2009, ISBN 978-82-497-0309-8, pp. 1- - [c15]Lothar Fritsch, Arne-Kristian Groven, Lars Strand:
A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project. ICN 2009: 275-280 - 2008
- [c14]Lothar Fritsch, Habtamu Abie:
Towards a Research Road Map for the Management of Privacy Risks in Information Systems. Sicherheit 2008: 1-15 - [p1]Lothar Fritsch:
Profiling and Location-Based Services (LBS). Profiling the European Citizen 2008: 147-168 - 2007
- [j7]Lothar Fritsch:
Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering. J. Theor. Appl. Electron. Commer. Res. 2(3): 1-17 (2007) - [j6]Wolfgang König, Lothar Fritsch:
Innovationsförderung im öffentlichen Umfeld durch Public Private Partnerships. Wirtschaftsinf. 49(2): 77-79 (2007) - [c13]Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:
Privacy-Friendly LBS: A Prototype-Supported Case Study. AMCIS 2007: 40 - [c12]Markulf Kohlweiss, Sebastian Faust, Lothar Fritsch, Bartek Gedrojc, Bart Preneel:
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker. Privacy Enhancing Technologies 2007: 77-94 - [c11]Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:
Enabling Privacy of Real-Life LBS. SEC 2007: 325-336 - [c10]Mike Radmacher, Jan Zibuschka, Tobias Scherner, Lothar Fritsch, Kai Rannenberg:
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen. Wirtschaftsinformatik (1) 2007: 237-254 - 2006
- [j5]Lothar Fritsch, Tobias Scherner, Kai Rannenberg:
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services. Prax. Inf.verarb. Kommun. 29(1): 37-42 (2006) - [c9]Mina Deng, Lothar Fritsch, Klaus Kursawe:
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. Privacy Enhancing Technologies 2006: 172-189 - 2005
- [c8]Tobias Scherner, Lothar Fritsch:
Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure, Economic, and Mobile Infastructure. AMCIS 2005: 127 - [c7]Mina Deng, Lothar Fritsch, Klaus Kursawe:
Personal Rights Management- Enabling Privacy Rights in Digital Online Content. Communications and Multimedia Security 2005: 266-268 - [c6]Lothar Fritsch, Kerstin Stephan, Alexander Grohmann:
Mobile Gemeinschaften im E-Government: Bürger-Verwaltungs-Partnerschaft als Mittel zur Kosteneffizienz und Effizienz bei öffentlichen Aufgaben am Beispiel der Verkehrskontrolle. GeNeMe 2005: 77-90 - [c5]Lothar Fritsch, Tobias Scherner:
A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection. ICN (2) 2005: 1130-1137 - [c4]Lothar Fritsch, Jan Muntermann:
Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location-Based-Service-Angeboten. MCTA 2005: 143-156 - [c3]Lothar Fritsch, Heiko Rossnagel:
Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht. Sicherheit 2005: 315-326 - [c2]Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan:
Privacy for Profitable Location Based Services. SPC 2005: 164-178 - 2004
- [c1]Thomas Lindner, Lothar Fritsch, Kilian Plank, Kai Rannenberg:
Exploitation of Public and Private WiFi Coverage for New Business Models. I3E 2004: 131-148 - 2003
- [j4]Johannes Ranke, Lothar Fritsch, Heiko Rossnagel:
M-Signaturen aus rechtlicher Sicht. Datenschutz und Datensicherheit 27(2) (2003) - 2001
- [j3]Lothar Fritsch:
A secure, affordable infrastructure for electronic signature applications - Overview of a server based, user-friendly approach. Datenschutz und Datensicherheit 25(9) (2001) - 2000
- [j2]Thomas Fuchß, Lothar Fritsch:
Security Certificates as a Tool for Measuring Efficiency and Creating Transparency - A Software Vendors View. Datenschutz und Datensicherheit 24(9) (2000) - [j1]Thomas Fuchß, Lothar Fritsch:
Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses. Datenschutz und Datensicherheit 24(10) (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint