default search action
Pascal Birnstill
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation. ARES 2024: 159:1-159:11 - 2023
- [c17]Maximilian Becker, Vishwesh Vishwesh, Pascal Birnstill, Finn Schwall, Sihan Wu, Jürgen Beyerer:
RIXA - Explaining Artificial Intelligence in Natural Language. ICDM (Workshops) 2023: 875-884 - 2021
- [j5]Maximilian Becker, Nadia Burkart, Pascal Birnstill, Jürgen Beyerer:
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search. Adv. Artif. Intell. Mach. Learn. 1(2): 90-110 (2021) - [j4]Sebastian Bretthauer, Arno Appenzeller, Pascal Birnstill:
Datensouveränität für Patienten im Gesundheitswesen. Datenschutz und Datensicherheit 45(3): 173-179 (2021) - [c16]Nico Piatkowski, Johannes Sebastian Mueller-Roemer, Peter Hasse, Adam Bachorek, Tim Werner, Pascal Birnstill, Andreas Morgenstern, Lutz Stobbe:
Generative Machine Learning for Resource-Aware 5G and IoT Systems. ICC Workshops 2021: 1-6 - 2020
- [c15]Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0. STM 2020: 73-89
2010 – 2019
- 2019
- [j3]Tim Zander, Anne Steinbrück, Pascal Birnstill:
Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten. Datenschutz und Datensicherheit 43(5): 270-275 (2019) - [c14]Oliver Stengele, Andreas Baumeister, Pascal Birnstill, Hannes Hartenstein:
Access Control for Binary Integrity Protection using Ethereum. SACMAT 2019: 3-12 - [c13]Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
Challenges of Using Trusted Computing for Collaborative Data Processing. STM 2019: 107-123 - 2018
- [c12]Florian Patzer, Ankush Meshram, Pascal Birnstill, Christian Haas, Jürgen Beyerer:
Towards Computer-Aided Security Life Cycle Management for Critical Industrial Control Systems. CRITIS 2018: 45-56 - [c11]Pascal Birnstill, Jürgen Beyerer:
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems. PETRA 2018: 292-296 - [c10]Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves. SACMAT 2018: 85-91 - [p1]Pascal Birnstill, Christoph Bier, Paul Georg Wagner, Jürgen Beyerer:
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking. Computer and Network Security Essentials 2018: 445-460 - 2017
- [j2]Paul Georg Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer:
Auf dem Weg zu datenschutzfreundlichen Dashcams. Datenschutz und Datensicherheit 41(3): 159-164 (2017) - [c9]Paul Georg Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer, Jürgen Beyerer:
Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement of External Anonymization. DPM/CBT@ESORICS 2017: 183-201 - [c8]Pascal Birnstill, Christian Haas, Daniel Hassler, Jürgen Beyerer:
Introducing remote attestation and hardware-based cryptography to OPC UA. ETFA 2017: 1-8 - [c7]Florian Patzer, Aranya Sarkar, Pascal Birnstill, Miriam Schleipen, Jürgen Beyerer:
Towards the modelling of complex communication networks in AutomationML. ETFA 2017: 1-8 - 2016
- [b1]Pascal Birnstill:
Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement. Karlsruhe Institute of Technology, Germany, 2016, ISBN 978-3-7315-0538-9, pp. 1-270 - [c6]Paul Georg Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer, Jürgen Beyerer:
Privacy-Dashcam - Datenschutzfreundliche Dashcams durch Erzwingen externer Anonymisierung. GI-Jahrestagung 2016: 427-440 - 2015
- [j1]Sebastian Bretthauer, Erik Krempel, Pascal Birnstill:
Intelligente Videoüberwachung in Kranken- und Pflegeeinrichtungen von morgen. Comput. und Recht 31(4): 239-264 (2015) - [c5]Pascal Birnstill, Daoyuan Ren, Jürgen Beyerer:
A user study on anonymization techniques for smart video surveillance. AVSS 2015: 1-6 - 2013
- [c4]Pascal Birnstill, Alexander Pretschner:
Enforcing privacy through usage-controlled video surveillance. AVSS 2013: 318-323 - 2012
- [c3]Christoph Bier, Pascal Birnstill, Erik Krempel, Hauke Vagts, Jürgen Beyerer:
Enhancing Privacy by Design from a Developer's Perspective. APF 2012: 73-85 - [c2]Christoph Bier, Pascal Birnstill, Erik Krempel, Hauke Vagts, Jürgen Beyerer:
How Is Positive-Sum Privacy Feasible? Future Security 2012: 265-268 - 2010
- [c1]Pascal Birnstill, Pengfei Di, Thomas Fuhrmann:
Using asymmetric links to improve SSR's routing performance. Med-Hoc-Net 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint