Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud48.bht:"
@article{DBLP:journals/dud/AppeltG24, author = {Dominik Appelt and Ines Geissler}, title = {Datenschutzsensibilisierung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {125--127}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1892-8}, doi = {10.1007/S11623-023-1892-8}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/AppeltG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AppenzellerO24, author = {Arno Appenzeller and Berna Orak}, title = {Das Re-Identifikationsrisiko bei der Weitergabe von Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {277--283}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1930-1}, doi = {10.1007/S11623-024-1930-1}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AppenzellerO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BarchnickiM24, author = {Sebastian Barchnicki and Arbnor Memeti}, title = {,,Basispaket Cybersicherheit"}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {16--20}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1873-y}, doi = {10.1007/S11623-023-1873-Y}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BarchnickiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BleckmannBGKM24, author = {Felix Bleckmann and Christopher Boysen and Anika Gehlen and Felix Ku{\ss}maul and Nils Michael}, title = {Mit Sicherheit Vertrauen schaffen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {222--226}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1913-2}, doi = {10.1007/S11623-024-1913-2}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BleckmannBGKM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollS24, author = {Alina Boll and Annika Selzer}, title = {Die Datenschutz-Vorsorge {(DS-V)}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {44--48}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1878-6}, doi = {10.1007/S11623-023-1878-6}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollS24a, author = {Alina Boll and Sarah Stummer}, title = {Erste Schritte im Rahmen der Datenschutz-Vorsorge}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {118--124}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1891-9}, doi = {10.1007/S11623-023-1891-9}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollSS24, author = {Alina Boll and Sarah Stummer and Annika Selzer}, title = {Datenschutz-Vorsorge}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {172--176}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1902-x}, doi = {10.1007/S11623-023-1902-X}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BosseDGSS24, author = {Christian K. Bosse and Florian Dehling and Eduard C. Groen and Simone Salemi and Hartmut Schmitt}, title = {Auf dem Weg zu gebrauchstauglichen Datenschutzl{\"{o}}sungen f{\"{u}}r digitale {\"{O}}kosysteme}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {82--88}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1886-6}, doi = {10.1007/S11623-023-1886-6}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BosseDGSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner24, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {50--59}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1880-z}, doi = {10.1007/S11623-023-1880-Z}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner24a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {190--196}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1906-6}, doi = {10.1007/S11623-023-1906-6}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DehlingLWF24, author = {Florian Dehling and Stefanie Ludborzs and Andreas We{\ss}ner and Rodrigo Falc{\~{a}}o}, title = {Konzepte f{\"{u}}r gebrauchstaugliche Datenschutzfunktionen in digitalen {\"{O}}kosystemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {95--102}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1888-4}, doi = {10.1007/S11623-023-1888-4}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DehlingLWF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dehning24, author = {Oliver Dehning}, title = {Transparenz in der IT-Supply-Chain}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {25--30}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1875-9}, doi = {10.1007/S11623-023-1875-9}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dehning24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dukek24, author = {Martin Dukek}, title = {Ransomware-as-a-Service}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {153--157}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1898-2}, doi = {10.1007/S11623-023-1898-2}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dukek24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EntschewB24, author = {Enrico Entschew and Paul van Brouwershaven}, title = {QWACs in the context of the trust spaces of the browsers and eIDAS 2.0}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {246--250}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1918-x}, doi = {10.1007/S11623-024-1918-X}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EntschewB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fehenberger24, author = {Tobias Fehenberger}, title = {Kryptoagilit{\"{a}}t: Ist die Zeit gekommen?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {21--24}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1874-x}, doi = {10.1007/S11623-023-1874-X}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fehenberger24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FethR24, author = {Denis Feth and Bernd Rauch}, title = {Datentreuh{\"{a}}nder in der Praxis}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {103--109}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1889-3}, doi = {10.1007/S11623-023-1889-3}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FethR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FethSI24, author = {Denis Feth and Hartmut Schmitt and Luigi Lo Iacono}, title = {Daten{\"{o}}konomie trifft Datenschutz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {73}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1883-9}, doi = {10.1007/S11623-023-1883-9}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FethSI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox24, author = {Dirk Fox}, title = {Checks and Balances}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {149}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1896-4}, doi = {10.1007/S11623-023-1896-4}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox24a, author = {Dirk Fox}, title = {Risiko Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {273}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1928-8}, doi = {10.1007/S11623-024-1928-8}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fuchs24, author = {Thomas Fuchs}, title = {EuGH-Urteil zu KI-Entscheidungen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {76}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1884-8}, doi = {10.1007/S11623-023-1884-8}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fuchs24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GajekLS24, author = {Sebastian Gajek and S{\"{o}}ren Langenberg and Christian St{\"{u}}ble}, title = {Confidential Cloud Computing}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {31--36}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1876-8}, doi = {10.1007/S11623-023-1876-8}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GajekLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geissler24, author = {Ines Geissler}, title = {Virtuelles Weiterleben}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {164--168}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1900-z}, doi = {10.1007/S11623-023-1900-Z}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Geissler24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gola24, author = {Peter Gola}, title = {Zur Ber{\"{u}}cksichtigung einer (Schwer-)Behinderung bei der Bewerbung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {295--303}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1933-y}, doi = {10.1007/S11623-024-1933-Y}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gola24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich24, author = {Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {332--336}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1937-7}, doi = {10.1007/S11623-024-1937-7}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gramlich24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrancF24, author = {Franziska Granc and Arno Fiedler}, title = {Mit Interoperabilit{\"{a}}t zur Europ{\"{a}}ischen Souver{\"{a}}nit{\"{a}}t?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {217--221}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1912-3}, doi = {10.1007/S11623-024-1912-3}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrancF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber24, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {69--72}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1882-x}, doi = {10.1007/S11623-023-1882-X}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gruber24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber24a, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {205--208}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1908-4}, doi = {10.1007/S11623-023-1908-4}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gruber24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HannekeBSH24, author = {Bj{\"{o}}rn Hanneke and Lorenz Baum and Christian H. Schunck and Oliver Hinz}, title = {Privatsph{\"{a}}renfreundliche Plattformgesch{\"{a}}ftsmodelle}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {89--94}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1887-5}, doi = {10.1007/S11623-023-1887-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HannekeBSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HesselJ24, author = {Stefan Hessel and Alexander Jung}, title = {Datenschutzrechtliche Herausforderungen bei der Verwertung von Daten vernetzter Medizinprodukte}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {289--294}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1932-z}, doi = {10.1007/S11623-024-1932-Z}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HesselJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hofmann24, author = {Sebastian Hofmann}, title = {IT-Sicherheitsma{\ss}nahmen beim Versand von E-Mails im Gesch{\"{a}}ftsverkehr}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {310--317}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1922-1}, doi = {10.1007/S11623-024-1922-1}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hofmann24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kamp24, author = {Meike Kamp}, title = {Herausgabe von Mitgliederlisten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {212}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1910-5}, doi = {10.1007/S11623-024-1910-5}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kamp24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber24, author = {Ulrich Kelber}, title = {{IWGDPT} Gemeinsames Statement zur Berlin Group}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {152}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1897-3}, doi = {10.1007/S11623-023-1897-3}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lapp24, author = {Thomas Lapp}, title = {Sichere europ{\"{a}}ische elektronische Identit{\"{a}}ten - eIDAS 2.0}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {213--216}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1911-4}, doi = {10.1007/S11623-024-1911-4}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lapp24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lehmkemper24, author = {Denis Lehmkemper}, title = {Geburtsdatum als Pflichtfeld in Webshops oft rechtswidrig}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {276}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1929-7}, doi = {10.1007/S11623-024-1929-7}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lehmkemper24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LettieriK24, author = {Vanessa Lettieri and Dennis{-}Kenji Kipker}, title = {Synthetische Daten in der medizinischen Forschung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {284--288}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1931-0}, doi = {10.1007/S11623-024-1931-0}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LettieriK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LichtG24, author = {Christoph Licht and Ludwig Gramlich}, title = {Datenschutz bei Meldestellen nach dem Hinweisgeberschutzgesetz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {37--43}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1877-7}, doi = {10.1007/S11623-023-1877-7}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LichtG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LiptakW24, author = {Patrick Liptak and Andreas Wand}, title = {The {PSD2} model as a prototype of trustworthy interface authentication}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {241--245}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1917-y}, doi = {10.1007/S11623-024-1917-Y}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LiptakW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LorenzF24, author = {Ingo Lorenz and Dirk Fox}, title = {Ein Reifegradmodell f{\"{u}}r die Datenschutzorganisation}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {183--187}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1904-8}, doi = {10.1007/S11623-023-1904-8}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LorenzF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen24, author = {Kim Nguyen}, title = {Ein sicheres und vertrauensw{\"{u}}rdiges ID-{\"{O}}kosystem - ein wichtiges Ziel f{\"{u}}r Europa!}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {209}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1909-y}, doi = {10.1007/S11623-024-1909-Y}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri24, author = {Thomas Petri}, title = {Informationelle Selbstbestimmung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {128--129}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1893-7}, doi = {10.1007/S11623-023-1893-7}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann24, author = {Norbert Pohlmann}, title = {Aktuelle Herausforderungen der IT-Sicherheit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1869-7}, doi = {10.1007/S11623-023-1869-7}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann24a, author = {Norbert Pohlmann}, title = {Die Notwendigkeit von neuen IT-Sicherheitskonzepten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {5--10}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1871-0}, doi = {10.1007/S11623-023-1871-0}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR24, author = {Norbert Pohlmann and Helmut Reimer}, title = {Regulierung und B{\"{u}}rokratie}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {49}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1879-5}, doi = {10.1007/S11623-023-1879-5}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer24, author = {Helmut Reimer}, title = {DuD Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {60--69}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1881-y}, doi = {10.1007/S11623-023-1881-Y}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer24a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {197--205}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1907-5}, doi = {10.1007/S11623-023-1907-5}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SalemiH24, author = {Simone Salemi and Ajla Hajric}, title = {K{\"{o}}nnen Datensch{\"{u}}tzer aus Konzepten des sexuellen Konsenses lernen?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {177--182}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1903-9}, doi = {10.1007/S11623-023-1903-9}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SalemiH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmittSI24, author = {Hartmut Schmitt and Christian H. Schunck and Luigi Lo Iacono}, title = {Daten{\"{o}}konomie in digitalen {\"{O}}kosystemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {77--81}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1885-7}, doi = {10.1007/S11623-023-1885-7}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchmittSI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulmannW24, author = {Haya Schulmann and Michael Waidner}, title = {Wie Deutschland zur Cybernation wird}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {11--15}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1872-z}, doi = {10.1007/S11623-023-1872-Z}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchulmannW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchwalmM24, author = {Steffen Schwalm and Kersten Mueller}, title = {Qualifizierte Ledger - der Durchbruch f{\"{u}}r Blockchain}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {227--231}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1914-1}, doi = {10.1007/S11623-024-1914-1}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchwalmM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SeegebarthBK24, author = {Christian Seegebarth and Paul Bastian and Micha Kraus}, title = {Enabling attribute attestations}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {237--240}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1916-z}, doi = {10.1007/S11623-024-1916-Z}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SeegebarthBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SpechtRiemenschneiderH24, author = {Louisa Specht{-}Riemenschneider and Bernadette Heineking}, title = {Datenverarbeitung in sicheren Verarbeitungsumgebungen am Beispiel von MRT-Gehirnscans}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {110--117}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1890-x}, doi = {10.1007/S11623-023-1890-X}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SpechtRiemenschneiderH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SteffesZ24, author = {Bianca Steffes and Anna Zichler}, title = {Deepfakes in Videoverhandlungen vor Gericht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {158--163}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1899-1}, doi = {10.1007/S11623-023-1899-1}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SteffesZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steinebach24, author = {Martin Steinebach}, title = {KI-generierte Abbildungen von Kindesmissbrauch}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {304--309}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1934-x}, doi = {10.1007/S11623-024-1934-X}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steinebach24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld24, author = {Marie{-}Theres Tinnefeld}, title = {Kunstfreiheit und Pers{\"{o}}nlichkeitsschutz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {169--171}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1901-y}, doi = {10.1007/S11623-023-1901-Y}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wand24, author = {Andreas Wand}, title = {Die geldw{\"{a}}scherechtliche Identifizierung durch eIDAS-Mittel}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {232--236}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1915-0}, doi = {10.1007/S11623-024-1915-0}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wand24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WegenerG24, author = {Christoph Wegener and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {268--272}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1921-2}, doi = {10.1007/S11623-024-1921-2}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WegenerG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert24, author = {Thilo Weichert}, title = {Ausl{\"{a}}nderzentralregister}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {188--189}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1905-7}, doi = {10.1007/S11623-023-1905-7}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weichert24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24, title = {45. Informationsfreiheitskonferenz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {4}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1870-1}, doi = {10.1007/S11623-023-1870-1}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24a, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {130--137}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1894-6}, doi = {10.1007/S11623-023-1894-6}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24b, title = {DuD Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {138--148}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1895-5}, doi = {10.1007/S11623-023-1895-5}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24c, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {251--260}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1919-1}, doi = {10.1007/S11623-023-1919-1}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24d, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {261--268}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1920-3}, doi = {10.1007/S11623-024-1920-3}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24e, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {318--324}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1935-9}, doi = {10.1007/S11623-024-1935-9}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24f, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {5}, pages = {325--332}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1936-8}, doi = {10.1007/S11623-024-1936-8}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.