A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps M Hatamian, S Wairimu, N Momen, L Fritsch Empirical Software Engineering 26 (3), 1-51, 2021 | 72 | 2021 |
Did App Privacy Improve After the GDPR? N Momen, M Hatamian, L Fritsch IEEE Security & Privacy 17 (6), 10-20, 2019 | 66 | 2019 |
A literature study on privacy patterns research J Lenhard, L Fritsch, S Herold 2017 43rd Euromicro Conference on Software Engineering and Advanced …, 2017 | 61 | 2017 |
Privacy for profitable location based services T Kölsch, L Fritsch, M Kohlweiss, D Kesdogan Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005 | 48 | 2005 |
Efficient oblivious augmented maps: Location-based services with a payment broker M Kohlweiss, S Faust, L Fritsch, B Gedrojc, B Preneel International Workshop on Privacy Enhancing Technologies, 77-94, 2007 | 42 | 2007 |
A multilaterally secure, privacy-friendly location-based service for disaster management and civil protection L Fritsch, T Scherner International Conference on Networking, 1130-1137, 2005 | 42 | 2005 |
Towards inclusive identity management L Fritsch, KS Fuglerud, I Solheim Identity in the Information Society 3, 515-538, 2010 | 39 | 2010 |
A multilateral privacy impact analysis method for android apps M Hatamian, N Momen, L Fritsch, K Rannenberg Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019 | 37 | 2019 |
Privacy dark patterns in identity management L Fritsch Open Identity Summit (OID), 5-6 october 2017, Karlstad, Sweden., 93-104, 2017 | 37 | 2017 |
On the Internet of Things, trust is relative L Fritsch, AK Groven, T Schulz International Joint Conference on Ambient Intelligence, 267-273, 2011 | 35 | 2011 |
Profiling and location-based services (lbs) L Fritsch Profiling the European Citizen: Cross-Disciplinary Perspectives, 147-168, 2008 | 35 | 2008 |
Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location-BasedService-Angeboten L Fritsch, J Muntermann Mobile Business-Processes, Platforms, Payments, Proceedings zur 5. Konferenz …, 2005 | 27 | 2005 |
Towards ai-powered cybersecurity attack modeling with simulation tools: Review of attack simulators A Jaber, L Fritsch International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2022 | 26 | 2022 |
An Overview of Artificial Intelligence Used in Malware L Fritsch, A Jaber, A Yazidi Symposium of the Norwegian AI Society, 41-51, 2022 | 26 | 2022 |
How much Privilege does an App Need? Investigating Resource Usage of Android Apps N Momen, T Pulls, L Fritsch, S Lindskog The Fifteenth International Conference on Privacy, Security and Trust–PST …, 2017 | 26* | 2017 |
Derived Partial Identities Generated from App Permissions L Fritsch, N Momen Open Identity Summit (OID) 2017, 2017 | 26 | 2017 |
Towards a research road map for the management of privacy risks in information systems L Fritsch, H Abie SICHERHEIT 2008–Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4 …, 2008 | 24 | 2008 |
Privacy and Identity Management. Facing up to Next Steps: 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2. 2 International Summer School, Karlstad A Lehmann, D Whitehouse, S Fischer-Hbner, L Fritsch, C Raab Springer Publishing Company, Incorporated, 2018 | 22* | 2018 |
Exploitation of Public and Private WiFi Coverage for New Business Models T Lindner, L Fritsch, K Plank, K Rannenberg Building the E-Service Society: E-Commerce, E-Business, and E-Government …, 2004 | 22 | 2004 |
Enabling privacy of real-life LBS J Zibuschka, L Fritsch, M Radmacher, T Scherner, K Rannenberg IFIP International Information Security Conference, 325-336, 2007 | 21 | 2007 |