A user study on anonymization techniques for smart video surveillance P Birnstill, D Ren, J Beyerer 2015 12th IEEE International Conference on Advanced Video and Signal Based …, 2015 | 22 | 2015 |
Enforcing privacy through usage-controlled video surveillance P Birnstill, A Pretschner 2013 10th IEEE International Conference on Advanced Video and Signal Based …, 2013 | 22 | 2013 |
Establishing secure communication channels using remote attestation with TPM 2.0 PG Wagner, P Birnstill, J Beyerer Security and Trust Management: 16th International Workshop, STM 2020 …, 2020 | 18 | 2020 |
Usage control in the international data spaces A Eitel, C Jung, R Brandstädter, A Hosseinzadeh, S Bader, C Kühnle, ... Aufl. IDS Association, Berlin, 2021 | 16 | 2021 |
Access control for binary integrity protection using ethereum O Stengele, A Baumeister, P Birnstill, H Hartenstein Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 15 | 2019 |
Enhancing privacy by design from a developer’s perspective C Bier, P Birnstill, E Krempel, H Vagts, J Beyerer Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014 | 15 | 2014 |
Distributed usage control enforcement through trusted platform modules and sgx enclaves PG Wagner, P Birnstill, J Beyerer Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018 | 14 | 2018 |
Introducing remote attestation and hardware-based cryptography to OPC UA P Birnstill, C Haas, D Hassler, J Beyerer 2017 22nd IEEE International Conference on Emerging Technologies and Factory …, 2017 | 13 | 2017 |
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search. M Becker, N Burkart, P Birnstill, J Beyerer Adv. Artif. Intell. Mach. Learn. 1 (2), 90-110, 2021 | 11 | 2021 |
Privacy-preserving surveillance: an interdisciplinary approach P Birnstill, S Bretthauer, S Greiner, E Krempel Int'l Data Priv. L. 5, 298, 2015 | 10 | 2015 |
Towards computer-aided security life cycle management for critical industrial control systems F Patzer, A Meshram, P Birnstill, C Haas, J Beyerer Critical Information Infrastructures Security: 13th International Conference …, 2019 | 8 | 2019 |
Building blocks for identity management and protection for smart environments and interactive assistance systems P Birnstill, J Beyerer Proceedings of the 11th PErvasive Technologies Related to Assistive …, 2018 | 8 | 2018 |
A privacy-aware fall detection system for hospitals and nursing facilities E Krempel, P Birnstill, J Beyerer European Journal for Security Research 2 (2), 83-95, 2017 | 8 | 2017 |
Towards the modelling of complex communication networks in AutomationML F Patzer, A Sarkar, P Birnstill, M Schleipen, J Beyerer 2017 22nd IEEE International Conference on Emerging Technologies and Factory …, 2017 | 8 | 2017 |
Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement P Birnstill KIT Scientific Publishing, 2016 | 8 | 2016 |
Intelligente Videoüberwachung in Kranken-und Pflegeeinrichtungen von morgen: Eine Analyse der Bedingungen nach den Entwürfen der EU-Kommission und des EU-Parlaments für eine DS-GVO S Bretthauer, E Krempel, P Birnstill Computer und Recht 31 (4), 239-264, 2015 | 7 | 2015 |
Datensouveränität für Patienten im Gesundheitswesen: Eine Chance für die medizinische Forschung und den Datenschutz S Bretthauer, A Appenzeller, P Birnstill Datenschutz und Datensicherheit-DuD 45, 173-179, 2021 | 6 | 2021 |
Game-theoretical Model on the GDPR-Market for Lemons? T Zander, A Steinbrück, P Birnstill jipitec 10 (2), 200-208, 2019 | 6 | 2019 |
Privacy preserving surveillance and the tracking paradox S Greiner, P Birnstill, E Krempel, B Beckert, J Beyerer Proceedings, Future Security Conference, 15-19, 2013 | 6 | 2013 |
Challenges of Using Trusted Computing for Collaborative Data Processing PG Wagner, P Birnstill, J Beyerer Security and Trust Management: 15th International Workshop, STM 2019 …, 2019 | 5 | 2019 |