|
|
|
Social and Political Dimensions of Identity |
|
|
3 | (20) |
|
|
Workshop: Privacy Exploits |
|
|
|
A Forensic Framework for Tracing Phishers |
|
|
23 | (14) |
|
|
|
On the Internet, Things Never Go Away Completely-The growing problem of Internet data persistence |
|
|
37 | (14) |
|
|
Privacy in Danger: Let's Google Your Privacy |
|
|
51 | (12) |
|
|
Workshop: Social and Philosophical Aspects of identity |
|
|
|
Self, Script, and Situation: identity in a world of ICTs |
|
|
63 | (14) |
|
|
Moral identification in Identity Management Systems |
|
|
77 | (18) |
|
|
|
|
|
Privacy in the Metaverse-Regulating a complex social construct in a Virtual World |
|
|
95 | (18) |
|
|
Young People's Gender and Identity Work in a Swedish Internet Community |
|
|
113 | (16) |
|
|
Workshop: Ethical and Privacy Aspects of RFID |
|
|
|
Privacy implications of RFID: an assessment of threats and opportunites |
|
|
129 | (14) |
|
|
|
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags |
|
|
143 | (8) |
|
|
|
Implantable RFID Chips-Security versus Ethics |
|
|
151 | (10) |
|
|
Workshop: Privacy and identity in Online Social Networks and Communities |
|
|
|
The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications |
|
|
161 | (14) |
|
|
|
|
Authentication and Transaction Security in E-business |
|
|
175 | (24) |
|
|
Marrying Transparency Tools with User-Controlled Identity Management |
|
|
199 | (24) |
|
|
Workshop: Identity Management |
|
|
|
Identity Deployment and Management in Wireless Mesh Networks |
|
|
223 | (12) |
|
|
|
|
Automating Identity Management and Access Control |
|
|
235 | (10) |
|
|
|
Privacy-friendly Identity Management in eGovernment |
|
|
245 | (14) |
|
|
Generic Predefined Privacy Preferences for Online Applications |
|
|
259 | (18) |
|
|
Workshop: Legal Identity and Identification Aspects |
|
|
|
Data Protection and the Use of Biometric Data in the EU |
|
|
277 | (10) |
|
|
|
|
ICT Implants - The Invasive Future of Identity? |
|
|
287 | (12) |
|
|
Workshop: Privacy-Enhancing Technologies |
|
|
|
Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy |
|
|
299 | (12) |
|
|
|
Traffic Flow Confidentiality in IPsec: Protocol and Implementation |
|
|
311 | (14) |
|
|
|
|
|
|
|
On the Fundamentals of Anonymity Metrics |
|
|
325 | (18) |
|
|
|
A Model-based Analysis of Tunability in Privacy Services |
|
|
343 | (16) |
|
|
|
|
Workshop: Social and Cultural Aspects of Identity |
|
|
|
Digital Identity and Anonymity-Desi Manifestations and Regulation |
|
|
359 | (16) |
|
|
ICT and Social Work: a Question of Identities? |
|
|
375 | (14) |
|
|
Workshop: Identifiers in eHealth |
|
|
|
Putting Identifiers in the Context of eHealth-Introduction of a Model |
|
|
389 | (18) |
|
|
|
|
Workshop: Economical and Organisational Identity Aspects |
|
|
|
Knowledge Based Organization-An identification model |
|
|
407 | (16) |
|
|
Collaborative Knowledge Networks-Lessons to Learn from a Large Automotive Company |
|
|
423 | (10) |
|
|
Workshop: Economical Aspects of Identity Management |
|
|
|
Enterprise Identity Management-What's in it for Organisations? |
|
|
433 | (14) |
|
|
Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services |
|
|
447 | |
|
|
|