What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marit Hansen
Google Scholar
7
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/sp
Protection Goals for Privacy Engineering.
Marit Hansen
Meiko Jensen
Martin Rost
2013
conf/ccs
Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads.
Thomas Groß
Marit Hansen
2008
journals/istr
Identity management throughout one's whole life.
Marit Hansen
Andreas Pfitzmann
Sandra Steinbrecher
2007
conf/sec
An analysis of security and privacy issues relating to RFID enabled ePassports.
Eleni Kosta
Martin Meints
Marit Hansen
Mark Gasson
2006
journals/istr
What user-controlled identity management should learn from communities.
Katrin Borcea-Pfitzmann
Marit Hansen
Katja Liesebach
Andreas Pfitzmann
Sandra Steinbrecher
2004
journals/istr
Privacy-enhancing identity management.
Marit Hansen
Peter Berlich
Jan Camenisch
Sebastian Clauß
Andreas Pfitzmann
Michael Waidner
2002
journals/compsec
The Open Source approach opportunities and limitations with respect to security and privacy.
Marit Hansen
Kristian Köhntopp
Andreas Pfitzmann
Coauthors
Andreas Pfitzmann
(4)
Eleni Kosta
(1)
Jan Camenisch
(1)
Katja Liesebach
(1)
Katrin Borcea-Pfitzmann
(1)
Kristian Köhntopp
(1)
Marit Hansen
(7)
Mark Gasson
(1)
Martin Meints
(1)
Martin Rost
(1)
Meiko Jensen
(1)
Michael Waidner
(1)
Peter Berlich
(1)
Sandra Steinbrecher
(2)
Sebastian Clauß
(1)
Thomas Groß
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to