default search action
Sven Wohlgemuth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2009
- [b2]Sven Wohlgemuth:
Privatsphäre durch die Delegation von Rechten. Vieweg+Teubner 2009, pp. I-X, 1-190 - [b1]Sven Wohlgemuth:
Privatsphäre durch die Delegation von Rechten. University of Freiburg, 2009, ISBN 978-3-8348-0721-2, pp. 1-190
Journal Articles
- 2023
- [j13]Kazuo Takaragi, Takashi Kubota, Sven Wohlgemuth, Katsuyuki Umezawa, Hiroki Koyanagi:
Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 325-332 (2023) - 2018
- [j12]Sven Wohlgemuth, Kazuo Takaragi:
Privacy-Enhancing Trust Infrastructure for Process Mining. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 149-156 (2018) - 2014
- [j11]Sven Wohlgemuth, Stefan Sackmann, Noboru Sonehara, A Min Tjoa:
Security and privacy in business networking. Electron. Mark. 24(2): 81-88 (2014) - 2013
- [j10]Klaus Rechert, Konrad Meier, Richard M. Zahoransky, Dennis Wehrle, Dirk von Suchodoletz, Benjamin Greschbach, Sven Wohlgemuth, Isao Echizen:
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers. IEEE Syst. J. 7(2): 211-222 (2013) - 2011
- [j9]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Sustainable Cloud Computing. Bus. Inf. Syst. Eng. 3(3): 129-131 (2011) - [j8]Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes. Bus. Inf. Syst. Eng. 3(3): 155-162 (2011) - [j7]Sebastian Haas, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Aspects of privacy for electronic health records. Int. J. Medical Informatics 80(2): e26-e31 (2011) - [j6]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking. J. Inf. Hiding Multim. Signal Process. 2(3): 270-281 (2011) - [j5]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Nachhaltiges Computing in Clouds. Wirtschaftsinf. 53(3): 123-125 (2011) - [j4]Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen. Wirtschaftsinf. 53(3): 151-158 (2011) - 2010
- [j3]Sven Wohlgemuth, Isao Echizen, Günter Müller, Noboru Sonehara:
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte). it Inf. Technol. 52(6): 350-355 (2010) - 2003
- [j2]Sven Wohlgemuth, Daniela Gerd tom Markotten, Uwe Jendricke, Günter Müller:
DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik". it Inf. Technol. 45(1): 46-54 (2003) - [j1]Daniela Gerd tom Markotten, Sven Wohlgemuth, Günter Müller:
Mit Sicherheit zukunftsfähig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik". Prax. Inf.verarb. Kommun. 26(1): 5-14 (2003)
Conference and Workshop Papers
- 2023
- [c23]Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi:
Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. CSR 2023: 212-218 - 2022
- [c22]Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi:
Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. ARES 2022: 154:1-154:7 - 2019
- [c21]Sven Wohlgemuth, Katsuyuki Umezawa, Yusuke Mishina, Kazuo Takaragi:
Competitive Compliance with Blockchain. PerCom Workshops 2019: 967-972 - 2015
- [c20]Sven Wohlgemuth:
Resilience by Usable Security. MuC (Workshopband) 2015: 667-676 - 2014
- [c19]Sven Wohlgemuth:
Adaptive User-Centered Security. CD-ARES 2014: 94-109 - [c18]Sven Wohlgemuth:
Is Privacy Supportive for Adaptive ICT Systems? iiWAS 2014: 559-570 - [c17]Sven Wohlgemuth:
Resilience as a New Enforcement Model for IT Security Based on Usage Control. IEEE Symposium on Security and Privacy Workshops 2014: 31-38 - 2013
- [c16]Pham Thi Bach Hue, Nguyen Dinh Thuc, Dong Thi Bich Thuy, Isao Echizen, Sven Wohlgemuth:
Protecting Access Pattern Privacy in Database Outsourcing Service. AINA Workshops 2013: 922-928 - [c15]Pham Thi Bach Hue, Thuc Dinh Nguyen, Dong Thi Bich Thuy, Isao Echizen, Sven Wohlgemuth:
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service. I3E 2013: 25-37 - 2012
- [c14]Ammar Alkassar, Steffen Schulz, Christian Stüble, Sven Wohlgemuth:
Securing Smartphone Compartments: Approaches and Solutions. ISSE 2012: 260-268 - 2011
- [c13]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. ARES 2011: 645-649 - [c12]Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, Isao Echizen:
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery. iThings/CPSCom 2011: 514-519 - [c11]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - [c10]Klaus Rechert, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara:
User Centric Privacy in Mobile Communication Scenarios. SAINT 2011: 202-207 - 2010
- [c9]Van H. Dang, Sven Wohlgemuth, Hiroshi Yoshiura, Thuc Dinh Nguyen, Isao Echizen:
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram. FGIT-UNESST 2010: 17-30 - [c8]Pham Thi Bach Hue, Sven Wohlgemuth, Isao Echizen, Dong Thi Bich Thuy, Nguyen Dinh Thuc:
Fine-Grained Access Control for Electronic Health Record Systems. FGIT-UNESST 2010: 31-38 - [c7]Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 - [c6]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. SEC 2010: 241-252 - 2009
- [c5]Sven Wohlgemuth, Günter Müller, Noboru Sonehara, Isao Echizen:
On Observable Delegation of Personal Data by Watermarking. CCNC 2009: 1-5 - [c4]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking. ICE-B 2009: 27-32 - [c3]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-aware Delegation of Personal Data using Digital Watermarking. IIH-MSP 2009: 56-59 - 2006
- [c2]Sven Wohlgemuth, Günter Müller:
Privacy with Delegation of Rights by Identity Management. ETRICS 2006: 175-190 - 2003
- [c1]Günter Müller, Sven Wohlgemuth:
Sichere IT-Systeme. GI Jahrestagung (1) 2003: 87-90
Parts in Books or Collections
- 2009
- [p1]Maike Gilliot, Vashek Matyas, Sven Wohlgemuth:
Privacy and Identity. The Future of Identity in the Information Society 2009: 351-390
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint