You are here: Publications > FIDIS Publications > 

Publications

FIDIS-Publications

Publications 2009

Rannenberg, Kai; Royer, Denis; Deuker, André (Eds.): The Future of Identity in the Information Society - Challenges and Opportunities, Springer, Heidelberg et al., ISBN  978-3-540-88480-4

Royer, Denis; Meints, Martin: Enterprise Identity Management - Towards a Decision Support Framework based on the Balanced Scorecard Approach, in: Wirtschaftsinformatik (WI), ISSN 0937-6429, Vol. 51, No. 3, May 2009.

Publications 2008

Backhouse, J., Halperin, R., ‘Security and Privacy Perceptions of e- ID: a grounded research’,  ECIS conference, Galway, Irland, June 2008.

Friedewald, M., Gutwirth, S., Punie, Y., Wright, D., Vildjiournaite (eds.), Safeguards in a World of Ambient Intelligence, Springer Press, Dordrecht, 2008.

Hildebrandt, M., Gutwirth, S. (eds.), Profiling the European Citizen. Cross disciplinary perspective, Springer Press, Dordrecht, 2008.

Buitelaar, H. C., ‘ID Number Policies in Europe’, Datenschutz und Datensicherheit 4/2008, pp. 270-276, Wiesbaden 2008.

Meints, M., Hansen, M., ‘Der ePass - eine Sicherheits- und Datenschutzanalyse’, in: Proceedings of the Sicherheit 2008, Saarbrücken, Germany, 2-4 of April 2008, pp. 31-43, Gesellschaft für Informatik, Bonn, 2008.

Fischer-Huebner, S., Duquenoy, P., Zuccato, A.,  Martucci, L. (eds.), Proceedings of the IFIP/FIDIS Summer School on "The Future of Identity in the Information Society", Karlstad, Sweden, 4-8 August 2007, Springer, forthcoming 2008.

Andersson, C., Lundin, R., ‘On the Fundamentals of Anonymity Metrics’, in: The Future of Identity in the Information Society Proceedings of the 3rd IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School. p.207-218, Karlstad, Sweden, Springer, forthcoming 2008.

Martucci, L. A., Zuccato, A., Fischer-Hübner. S., ‘Identity Deployment and Management in Wireless Mesh Networks’, in: The Future of Identity in the Information Society Proceedings of the 3rd IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School,  Karlstad, Sweden, Springer, forthcoming 2008.

Royer, D., Enterprise Identity Management - What’s in it for Organisations?’, in: The Future of Identity in the Information Society Proceedings of the 3rd IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School,  Karlstad, Sweden, Springer, forthcoming 2008.

Martucci, L. A., Kohlweiss, M., Andersson, C., Panchenko, A., ‘Self-certified Sybil-Free Pseudonyms: Introducing Privacy in Infrastructureless Wireless Networks’, in: Proceedings of the 1st ACM Conference on Wireless Network Security, WiSec’08, Alexandria, VA, USA, forthcoming 2008.

Van Alsenoy, B., De Cock, D., ‘Due processing of personal data in eGovernment?’, Datenschutz und Datensicherheit 3/2008, pp. 178-183, Wiesbaden 2008. PDF Download

Royer, D., Meints, M., ‘Planung und Bewertung von Enterprise Idenity Managementsystemen’, Datenschutz und Datensicherheit 3/2008, pp. 189-193, Wiesbaden 2008. PDF Download

Meints, M., Royer, D., ‘Gateway - Der Lebenszyklus von Identitäten’, Datenschutz und Datensicherheit 3/2008, p. 201, Wiesbaden 2008. PDF Download

Matyas, V.,- Cvrcek, D., Krhovjak, J., Kumpost, M., ‘Authorizing Card Payments with PINs’, Computer, Los Alamitos, Vol. 41, No. 2, pp. 64-68, IEEE Computer Society, USA, 2008.  Abstract

Pfitzmann, A., Köpsell, S., Steinbrecher, S., Juschka, A., Stange, A.-K., ‘Communication Privacy’, in Acquisti, A. et al., Digital Privacy: Theory, Technologies, and Practice, Taylor & Francis, January 2008.

Publications 2007

Langheinrich, M., Karjoth, G., ‘Das “personliche” Internet’, Digma, December 2007.

Alkassar, A., Volkamer, M., First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers, LNCS Vol. 4896, Springer, Heidelberg 2007.

Matyas, V., et al., User authentication and electronic transaction authorization, Tate International s.r.o., Prague, 2007.

Raab, C., De Hert, P., ‘The Regulation of Technology: Policy Tools and Policy Actors’, Tilburg University Legal Studies Working Paper No. 004/2007, Tilburg 2007.  Abstract

Kumpost, M., ‘Data Preparation for User Profiling’, In Proceedings of the Annual Database Conference DATAKON. 20.10.2007, Santon Hotel, Brno, pp. 152-160, Brno : Masaryk University, 2007.

Andersson, C., Panchenko, A., ‘Practical Anonymous Communication on the Mobile Internet using Tor’, 3rd International Workshop on the Value of Security through Collaboration (SECOVAL 2007) in conjunction with the 3rd International Conference on
Security and Privacy in Communication Networks (SecureComm2007)
, IEEE Xplore Digital Library, Nice, France, 17 September, 2007.

Krhovjak, J., Kumpost, M., Matyas, V., ‘Are PINs distributed by banks in a secure way?’ Data Security  Management Vol. XI, No. 3, pp. 38-42, Prague 2007.  Abstract

Kumpost, M., ‘Data Preparation for User Profiling from Traffic Log’, In Proceedings of The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2007), 14.10.2007, Valencia, Spain, pp. 89-94, IEEE Computer Society, Los Alamitos, USA, 2007.  Abstract

Borcea-Pfitzmann, K., Hansen, M., Liesebach, K., Pfitzmann, A., Steinbrecher, S.,  ‘Managing One’s Identities in Organisational and Social Settings’, Datenschutz und Datensicherheit 9/2007, pp. 671-675, Wiesbaden 2007.

Gloe, T., Kirchner, M., Winkler, A., Böhme, R., ‘Can we trust digital image forensics?’, in proccedings of the MULTIMEDIA ‘07: Proceedings of the 15th international conference on Multimedia, ACM, 2007.  Abstract

Danezis, G., Diaz, C., Faust, S., Käsper, E., Troncoso, C., Preneel, B., , ‘Efficient Negative Databases from Cryptographic Hash Functions’ in Garay, J. et al. (Eds.), Proceedings of the 10th Information Security Conference (ISC’07), pp. 423–436, LNCS 4779, Springer, 2007.

Hansen, M., Fischer-Hübner, S., Pettersson, J. S., Bergmann, M., ‘Security and Identity Management’, in Cunningham, P., Cunningham, M., (eds.): Expanding the Knowledge Economy: Issues, Applications, Case Studies, IOS Press, Amsterdam 2007.

Danezis, G., Diaz, C., Troncoso, C., ‘Two-Sided Statistical Disclosure Attack’,Borisov, N., Golle, P., (Eds.) Proceedings of the 7th Privacy Enhancing Technologies (PET’07), pp. 30-40, LNCS 4776, Springer, 2007.

Kosta, E., ‘RFID Technology: When Innovation Brings Along Data Protection Challenges’, Proceedings of  the 46th FITCE Congress - "The broadband way to the future", 30.08 - 01.09.2007, pp. 54-59, Warsaw - Poland 2007.

De Hert, P., Schreurs, W., Brouwer, E., ‘Machine readable identity documents with biometrc data in the EU. Critical observations.’ Keesing Journal of Documents & Identity, Issues 24, pp. 29-35, 2007.

Halperin, R., Backhouse, J, ‘EU Citizen’s trust in future ID systems & authorities’, The European e-Identity Conference, 12.-13.06.2007, Paris 2007.

Krhovjak, J., Kumpost, M., Matyas, V., ‘Security of Electronic Transactions - Theory and Practice’, In Security and Protection of Information 2007.pp. 75-85, Brno : University of Defence, 2007.  Abstract

De Hert, P., Schreurs, W., Brouwer, E., ‘Machine readable identity documents with biometrc data in the EU. Critical observations.’ Keesing Journal of Documents & Identity, Issues 23, pp. 27-33, 2007.

Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B., ‘Traffic Analysis Attacks on a Continuously -Observable Steganographic File System’ Furon T. et al.(eds.) Proceedings of the 9th Information Hiding (IH’07), pp. 220–236, LNCS 4567, Springer, 2007.

Riha, Z., Matyas, V., Svenda, P., ‘Security of electronic Passports’, The European Journal for the Informatics Professional, Vol. VIIII, No. 6, pp. 60-67, 2007.  Abstract

Riha, Z., Matyas, V., Svenda, P., ‘Security of electronic Passports, Part II’, Crypto-World, Informační sešit GCUCMP, Vol. 9, No. 1, pp. 6-12, Prague 2007.  Abstract

De Hert, P., Schreurs, W., Brouwer, E., ‘Machine readable identity documents with biometrc data in the EU. Overview of the legal framework.’ Keesing Journal of Documents & Identity, Issues 22, pp. 23-26, 2007.

Hildebrandt, M., ‘Profiles and Correlatable Humans’, in Stehr, N. (ed.), Knowledge and the Law. Can Knowledge be Made Just?, New Brunswick, New Jersey: Transaction Books 2007.

Krhovjak, J., Kumpost, M., Matyas, V., ‘Security of Electronic Transactions – Theory and Practice’, in Security and Protection of Information, pp. 75-85, University of Defence, Brno, 2007.

De Hert, P., Hildebrandt, M., Gutwirth, S., Saelens, R., ‘De WBP nade Dexiauitspraken’, Privacy & Informatie, No. 4, pp. 147-157, 2007.

Kosta, E., Gasson, M., Hansen, M. and Meints, M., ‘An analysis of security and privacy issues relating to RFID enabled ePassports’, in Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., New Approaches for Security, Privacy and Trust in Complex Environments, proc. of the IFIP SEC2007, New York 2007.

Wright, D., Gutwirth, S., Friedewald, M., ‘Shining light on the dark side of ambient intelligence’, Foresight, vol 9, issue 2, pp. 46- 59, 2007.

Khrovjak, j., Scenda, P., Matyas, V., Smolik, L., ‘The Sources of Randomness in Smartphones with Symbian OS’, in Security and Protection of Information 2007, pp. 87-98, Brno: University of Defence, Brno 2007.  Abstract

Kosta E., ‘The use of RFID chips on identification documents’, Proceedings of the 2nd Greek national conference with international participation: Electronic democracy - challenges of the digital era, Athens, 16-17 March 2006, p. 471-480, Athens 2007.

Spokkereef, A., De Hert, P., ‘Ethical Practice in the Use of Biometric Identifiers within the EU’, Law, Science and Policy, Vol. 3, pp. 177-201, 2007. Diaz, C., Troncoso, C., Danezis, G., ‘Doe additional information always reduce anonymity?’, in Yu T., (Ed.), Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES’07), pp. 72–75, ACM Press, 2007.

Kindt, E., ‘Biometric applications and the data protection legislation’, Datenschutz und Datensicherheit 3/2007, pp. 166-170, Wiesbaden 2007. Download

Meints, M., ‘Implementierung großer biometrischer Systeme’, Datenschutz und Datensicherheit 3/2007, pp. 189-193, Wiesbaden 2007. Download

Meints, M., ‘Gateway: Kontrolle und Datensicherheit’, Datenschutz und Datensicherheit 3/2007, p. 208, Wiesbaden 2007. Download

Gloe, T., Franz, E., Winkler, A., ‘Forensics for flatbed scanners’, in proceedings in the SPIE:
Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose 2007.  Abstract

Troncoso, C., Danezis, G. , Kosta, E., Preneel, B., ‘PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance’, T. Yu (ed.), proceedings of the Workshop on Privacy in the Electronic Society 2007, pp. 99-107, ACM, 2007.

Kosta, E., Dumortier, J., ‘The data retention directive and the principles of European dataprotection legislation’, Medien und Recht International, 2007

Matyas, V., Kumpost, M., ‘How people value privacy?’, Data Security Management, Vol. XI No. 1, pp. 34-37, Tate International, Prague 2007.  Abstarct

Matyas, V., ‘Principles and technical aspects of authentication’, Data Security Management, Vol. XI, No. 1, pp. 10-16, Tate International, Praque 2007.  Abstarct

Gutwirth, S., ‘Biometrics between opacity and transparency’, Ann. Ist Super Sanita, Vol. 43, No. 1, pp. 61-65, 2007.  PDF Download

And: The publications in the FIDIS Inhouse Journal

Publications 2006

Warwick, K.,  Gasson, M., ‘A Question of Identity – Wiring in the Human’, Proceedings of the IET Wireless Sensor Networks Conference, London, pp.4/1-4/6, 4th Dec. 2006.

Hildebrandt, M., ‘Privacy and Identity’, in: Claes, E., Duff, E., Gutwirth, S. (eds.), Privacy and the Criminal Law, pp. 43-58 Antwerp- Oxford: Intersentia 2006.

Kosta, E.’Data retention directive: What the Council cherishes, the privacy advocates reject and the industry fears…’, Proceedings 45th FITCE Congress - “Telecom Wars: The return of the profit”, 30th August - 2nd September, p. 209-214, Athens 2006.

De Hert, P. and Gutwirth, P., ‘Privacy, data protection and law enforcement. Opacity of the individual and transparency of power’, in  Claes, E., Duff, E., Gutwirth, S. (eds.), Privacy and the criminal law, pp. 61-104, Antwerp/Oxford, Intersentia, 2006.

Warwick, K., ‘People and Networks: Cyborg Identity’, in Birch, D. (ed.), Digital Identity Management: Technological, Business and Social Implications, Gower publishing, 2006.

De Hert, P., Schreurs, W., Brouwer, E., ‘Machine readable identity documents with biometric data in the EU’, Keesing Journal of Documents and Identity, 21/2006, pp. 2-10.

Cvrcek, D., Matyas, V., ‘Pseudonymity in the Light of Evidence-Based Trust’. In Security Protocols - 12th International Workshop, Lecture Notes in Computer Science, Vol. 3957, pp. 267-274. Springer Verlag, 2006.

Matyas, V., Kumpost, M., Krhovják, J., ‘Card Payments Using PIN’, Data Secutity Management, X(5), pp. 26-28, Tate International, Prague 2006.

Matyas, V., Kouril, D., Cvrcek, D., Lorenc, V., ‘Authentication Hardware Token of New Generation’. In Vojtas, P., Skopal, T., Datakon, pp. 229-238, Brno, Masarykova univerzita 2006.

Riha, Z., Matyas, V., ‘Unsolicited communication and mobility’, Data Secutity Management, X(5), p. 44, Tate International, s.r.o., Prague 2006.

 

Datenschutz und Datensicherheit Special Edition September 2006

Meints, M., Reimer, H., ‘Editorial: Identität - eine sichere Sache?’, Datenschutz und Datensicherheit 9/2006, p. 528, Wiesbaden 2006. Download

Meints, M., Hansen, M., ‘Identität - die europäische Perspektive’, Datenschutz und Datensicherheit 9/2006, pp. 531-532, Wiesbaden 2006. Download

Halperin, R., ‘Identity as an Emerging Field of Study’, Datenschutz und Datensicherheit 9/2006, pp. 533-537, Wiesbaden 2006. Download

Nabeth, T., Identity of Identity’, Datenschutz und Datensicherheit 9/2006, pp. 538-542, Wiesbaden 2006. Download

Hansen, M., Meints, M., Digitale Identitäten - Überblick und aktuelle Trends’, Datenschutz und Datensicherheit 9/2006, pp. 543-547, Wiesbaden 2006. Download

Hildebrandt, M., ‘Profiling: From Data tp Knowledge’, Datenschutz und Datensicherheit 9/2006, pp. 548-552, Wiesbaden 2006. Download

Koops, B.-J., Leenes, R., ‘Identity Theft, Identity Fraud and/or Identity-related Crime’, Datenschutz und Datensicherheit 9/2006, pp. 553-556, Wiesbaden 2006. Download

Geradts, Z., ‘Forensic Implications of Identity Systems’, Datenschutz und Datensicherheit 9/2006, pp. 557-559, Wiesbaden 2006. Download

Meints, M., Hansen, M., ‘Identitätsdokumente’, Datenschutz und Datensicherheit 9/2006, pp. 560-564, Wiesbaden 2006. Download

Backhouse, J., ‘Interoperability of Identity and Identity Management Systems’, Datenschutz und Datensicherheit 9/2006, pp. 568-570, Wiesbaden 2006. Download

Royer, D., Rannenberg, K., ‘Mobilität, mobile Technologien und Identität’, Datenschutz und Datensicherheit 9/2006, pp. 571-575, Wiesbaden 2006. Download

Meints, M., ‘Gateway: Identität’, Datenschutz und Datensicherheit 9/2006, p. 576, Wiesbaden 2006. Download

 

 

Meints, M., ‘Protokollierung bei Identitätsmanagementsystemen’, Datenschutz und Datensicherheit 5/2006, pp. 304-307, Wiesbaden 2006. Download

Kumpost, Marek. ‘Log processing using cluster analysis’, in XXVIII. konference EurOpen, pp. 71-78, Plzen, CZ, 2006. 

Publications 2005

Rost, M., Meints, M., ‘Authentisierung in Sozialsystemen - Identiytheft strukturell betrachtet’, Datenschutz und Datensicherheit 4/2005, pp. 216-218, Wiesbaden 2005. Download