The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kai Rannenberg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kai Rannenberg, Giovanni Iachello
    Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:107-0 [Conf]
  2. Jan Muntermann, Heiko Rossnagel, Kai Rannenberg
    Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:361-376 [Conf]
  3. Giovanni Iachello, Kai Rannenberg
    Protection Profiles for Remailer Mixes. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:181-230 [Conf]
  4. Stefan Figge, Gregor Schrott, Jan Muntermann, Kai Rannenberg, S.-H. Chun
    Earning m-oney - a situation based approach for mobile business models. [Citation Graph (0, 0)][DBLP]
    ECIS, 2003, pp:- [Conf]
  5. Jan Muntermann, Heiko Rossnagel, Kai Rannenberg
    Mobile Brokerage Infrastructures - Capabilities and Security Requirements. [Citation Graph (0, 0)][DBLP]
    ECIS, 2005, pp:- [Conf]
  6. Kai Rannenberg
    How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:37-54 [Conf]
  7. Klaus R. Dittrich, Wolfgang König, Andreas Oberweis, Kai Rannenberg, Wolfgang Wahlster
    Vorwort der Herausgeber. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:3-10 [Conf]
  8. Kurt Geihs, Norbert Gronau, Sonja Martens, Kai Rannenberg, Thomas Schwotzer
    Mobile Benutzer - Mobiles Wissen - Mobiles Internet. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2003, pp:347-348 [Conf]
  9. Rüdiger Grimm, Hubert B. Keller, Kai Rannenberg
    Vorwort. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:3- [Conf]
  10. Kai Rannenberg
    Identitätsmanagement in Mobilkommunikationssystemen und ihren Anwendungen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2005, pp:522- [Conf]
  11. Thomas Lindner, Lothar Fritsch, Kilian Plank, Kai Rannenberg
    Exploitation of Public and Private WiFi Coverage for New Business Models. [Citation Graph (0, 0)][DBLP]
    I3E, 2004, pp:131-148 [Conf]
  12. Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
    Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:579-587 [Conf]
  13. Stefan Figge, Kai Rannenberg
    Inviting New Players To The Multimedia M-Commerce Arena: An approach to enhance the current m-Commerce business model with regard to emerging DVB-T networks. [Citation Graph (0, 0)][DBLP]
    MOBIS, 2004, pp:311-322 [Conf]
  14. Kai Rannenberg
    Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security. [Citation Graph (0, 0)][DBLP]
    Security and Control of Information Technology in Society, 1993, pp:113-128 [Conf]
  15. Kai Rannenberg, Andreas Albers, Stefan Figge, Mike Radmacher, Heiko Rossnagel
    Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen. [Citation Graph (0, 0)][DBLP]
    MCTA, 2005, pp:9-16 [Conf]
  16. Kai Rannenberg
    IT Security Certification and Criteria. Progress, Problems and Perspectives. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:1-10 [Conf]
  17. Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg
    Individual management of personal reachability in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:164-174 [Conf]
  18. Michael Sobirey, Simone Fischer-Hübner, Kai Rannenberg
    Pseudonymous audit for privacy enhanced intrusion detection. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:151-163 [Conf]
  19. Martin Meyer, Kai Rannenberg
    Eine Bewertung der "Information Technology Security Evaluation Criteria". [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:243-258 [Conf]
  20. Kai Rannenberg
    Evaluationskriterien zur IT-Sicherheit - Entwicklung und Perspektiven in der Normung und außerhalb. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:45-68 [Conf]
  21. Kai Rannenberg
    Identity management in mobile applications - Unobtrusive but already effective. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:7, n:9, pp:- [Journal]
  22. Kai Rannenberg, Dirk Fox
    Privacy Points. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 1999, v:23, n:2, pp:- [Journal]
  23. Kai Rannenberg
    Sicherung internetbasierter Unternehmenskommunikation. [Citation Graph (0, 0)][DBLP]
    HMD - Praxis Wirtschaftsinform., 1999, v:209, n:, pp:53-52 [Journal]
  24. Günter Müller, Kai Rannenberg
    Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:1, pp:46-48 [Journal]
  25. Kai Rannenberg
    Electronic Commerce und Mehrseitige Sicherheit: Baustellen, Fortschritte und Perspektiven. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 2000, v:15, n:4, pp:193-206 [Journal]
  26. Kai Rannenberg
    Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 2000, v:42, n:6, pp:489-498 [Journal]
  27. Mike Radmacher, Jan Zibuschka, Tobias Scherner, Lothar Fritsch, Kai Rannenberg
    Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik (1), 2007, pp:237-254 [Conf]

  28. Enabling Privacy of Real-Life LBS. [Citation Graph (, )][DBLP]


Search in 0.069secs, Finished in 0.071secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002