Search dblp for Publications

export results for "toc:db/journals/dud/dud48.bht:"

 download as .bib file

@article{DBLP:journals/dud/AppeltG24,
  author       = {Dominik Appelt and
                  Ines Geissler},
  title        = {Datenschutzsensibilisierung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {125--127},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1892-8},
  doi          = {10.1007/S11623-023-1892-8},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/AppeltG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AppenzellerO24,
  author       = {Arno Appenzeller and
                  Berna Orak},
  title        = {Das Re-Identifikationsrisiko bei der Weitergabe von Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {277--283},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1930-1},
  doi          = {10.1007/S11623-024-1930-1},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AppenzellerO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarchnickiM24,
  author       = {Sebastian Barchnicki and
                  Arbnor Memeti},
  title        = {,,Basispaket Cybersicherheit"},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {16--20},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1873-y},
  doi          = {10.1007/S11623-023-1873-Y},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BarchnickiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BleckmannBGKM24,
  author       = {Felix Bleckmann and
                  Christopher Boysen and
                  Anika Gehlen and
                  Felix Ku{\ss}maul and
                  Nils Michael},
  title        = {Mit Sicherheit Vertrauen schaffen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {222--226},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1913-2},
  doi          = {10.1007/S11623-024-1913-2},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BleckmannBGKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollS24,
  author       = {Alina Boll and
                  Annika Selzer},
  title        = {Die Datenschutz-Vorsorge {(DS-V)}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {44--48},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1878-6},
  doi          = {10.1007/S11623-023-1878-6},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollS24a,
  author       = {Alina Boll and
                  Sarah Stummer},
  title        = {Erste Schritte im Rahmen der Datenschutz-Vorsorge},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {118--124},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1891-9},
  doi          = {10.1007/S11623-023-1891-9},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollSS24,
  author       = {Alina Boll and
                  Sarah Stummer and
                  Annika Selzer},
  title        = {Datenschutz-Vorsorge},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {172--176},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1902-x},
  doi          = {10.1007/S11623-023-1902-X},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BosseDGSS24,
  author       = {Christian K. Bosse and
                  Florian Dehling and
                  Eduard C. Groen and
                  Simone Salemi and
                  Hartmut Schmitt},
  title        = {Auf dem Weg zu gebrauchstauglichen Datenschutzl{\"{o}}sungen
                  f{\"{u}}r digitale {\"{O}}kosysteme},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {82--88},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1886-6},
  doi          = {10.1007/S11623-023-1886-6},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BosseDGSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner24,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {50--59},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1880-z},
  doi          = {10.1007/S11623-023-1880-Z},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner24a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {190--196},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1906-6},
  doi          = {10.1007/S11623-023-1906-6},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DehlingLWF24,
  author       = {Florian Dehling and
                  Stefanie Ludborzs and
                  Andreas We{\ss}ner and
                  Rodrigo Falc{\~{a}}o},
  title        = {Konzepte f{\"{u}}r gebrauchstaugliche Datenschutzfunktionen in
                  digitalen {\"{O}}kosystemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {95--102},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1888-4},
  doi          = {10.1007/S11623-023-1888-4},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DehlingLWF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dehning24,
  author       = {Oliver Dehning},
  title        = {Transparenz in der IT-Supply-Chain},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {25--30},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1875-9},
  doi          = {10.1007/S11623-023-1875-9},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dehning24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dukek24,
  author       = {Martin Dukek},
  title        = {Ransomware-as-a-Service},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {153--157},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1898-2},
  doi          = {10.1007/S11623-023-1898-2},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dukek24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewB24,
  author       = {Enrico Entschew and
                  Paul van Brouwershaven},
  title        = {QWACs in the context of the trust spaces of the browsers and eIDAS
                  2.0},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {246--250},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1918-x},
  doi          = {10.1007/S11623-024-1918-X},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EntschewB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fehenberger24,
  author       = {Tobias Fehenberger},
  title        = {Kryptoagilit{\"{a}}t: Ist die Zeit gekommen?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {21--24},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1874-x},
  doi          = {10.1007/S11623-023-1874-X},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fehenberger24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FethR24,
  author       = {Denis Feth and
                  Bernd Rauch},
  title        = {Datentreuh{\"{a}}nder in der Praxis},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {103--109},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1889-3},
  doi          = {10.1007/S11623-023-1889-3},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FethR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FethSI24,
  author       = {Denis Feth and
                  Hartmut Schmitt and
                  Luigi Lo Iacono},
  title        = {Daten{\"{o}}konomie trifft Datenschutz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {73},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1883-9},
  doi          = {10.1007/S11623-023-1883-9},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FethSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox24,
  author       = {Dirk Fox},
  title        = {Checks and Balances},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {149},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1896-4},
  doi          = {10.1007/S11623-023-1896-4},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox24a,
  author       = {Dirk Fox},
  title        = {Risiko Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {273},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1928-8},
  doi          = {10.1007/S11623-024-1928-8},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fuchs24,
  author       = {Thomas Fuchs},
  title        = {EuGH-Urteil zu KI-Entscheidungen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {76},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1884-8},
  doi          = {10.1007/S11623-023-1884-8},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fuchs24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GajekLS24,
  author       = {Sebastian Gajek and
                  S{\"{o}}ren Langenberg and
                  Christian St{\"{u}}ble},
  title        = {Confidential Cloud Computing},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {31--36},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1876-8},
  doi          = {10.1007/S11623-023-1876-8},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GajekLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geissler24,
  author       = {Ines Geissler},
  title        = {Virtuelles Weiterleben},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {164--168},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1900-z},
  doi          = {10.1007/S11623-023-1900-Z},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Geissler24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gola24,
  author       = {Peter Gola},
  title        = {Zur Ber{\"{u}}cksichtigung einer (Schwer-)Behinderung bei der
                  Bewerbung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {295--303},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1933-y},
  doi          = {10.1007/S11623-024-1933-Y},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gola24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich24,
  author       = {Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {332--336},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1937-7},
  doi          = {10.1007/S11623-024-1937-7},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrancF24,
  author       = {Franziska Granc and
                  Arno Fiedler},
  title        = {Mit Interoperabilit{\"{a}}t zur Europ{\"{a}}ischen Souver{\"{a}}nit{\"{a}}t?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {217--221},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1912-3},
  doi          = {10.1007/S11623-024-1912-3},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrancF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber24,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {69--72},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1882-x},
  doi          = {10.1007/S11623-023-1882-X},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber24a,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {205--208},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1908-4},
  doi          = {10.1007/S11623-023-1908-4},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HannekeBSH24,
  author       = {Bj{\"{o}}rn Hanneke and
                  Lorenz Baum and
                  Christian H. Schunck and
                  Oliver Hinz},
  title        = {Privatsph{\"{a}}renfreundliche Plattformgesch{\"{a}}ftsmodelle},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {89--94},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1887-5},
  doi          = {10.1007/S11623-023-1887-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HannekeBSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HesselJ24,
  author       = {Stefan Hessel and
                  Alexander Jung},
  title        = {Datenschutzrechtliche Herausforderungen bei der Verwertung von Daten
                  vernetzter Medizinprodukte},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {289--294},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1932-z},
  doi          = {10.1007/S11623-024-1932-Z},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HesselJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hofmann24,
  author       = {Sebastian Hofmann},
  title        = {IT-Sicherheitsma{\ss}nahmen beim Versand von E-Mails im Gesch{\"{a}}ftsverkehr},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {310--317},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1922-1},
  doi          = {10.1007/S11623-024-1922-1},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hofmann24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kamp24,
  author       = {Meike Kamp},
  title        = {Herausgabe von Mitgliederlisten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {212},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1910-5},
  doi          = {10.1007/S11623-024-1910-5},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kamp24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber24,
  author       = {Ulrich Kelber},
  title        = {{IWGDPT} Gemeinsames Statement zur Berlin Group},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {152},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1897-3},
  doi          = {10.1007/S11623-023-1897-3},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lapp24,
  author       = {Thomas Lapp},
  title        = {Sichere europ{\"{a}}ische elektronische Identit{\"{a}}ten
                  - eIDAS 2.0},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {213--216},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1911-4},
  doi          = {10.1007/S11623-024-1911-4},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lapp24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lehmkemper24,
  author       = {Denis Lehmkemper},
  title        = {Geburtsdatum als Pflichtfeld in Webshops oft rechtswidrig},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {276},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1929-7},
  doi          = {10.1007/S11623-024-1929-7},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lehmkemper24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LettieriK24,
  author       = {Vanessa Lettieri and
                  Dennis{-}Kenji Kipker},
  title        = {Synthetische Daten in der medizinischen Forschung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {284--288},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1931-0},
  doi          = {10.1007/S11623-024-1931-0},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LettieriK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LichtG24,
  author       = {Christoph Licht and
                  Ludwig Gramlich},
  title        = {Datenschutz bei Meldestellen nach dem Hinweisgeberschutzgesetz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {37--43},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1877-7},
  doi          = {10.1007/S11623-023-1877-7},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LichtG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LiptakW24,
  author       = {Patrick Liptak and
                  Andreas Wand},
  title        = {The {PSD2} model as a prototype of trustworthy interface authentication},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {241--245},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1917-y},
  doi          = {10.1007/S11623-024-1917-Y},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LiptakW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LorenzF24,
  author       = {Ingo Lorenz and
                  Dirk Fox},
  title        = {Ein Reifegradmodell f{\"{u}}r die Datenschutzorganisation},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {183--187},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1904-8},
  doi          = {10.1007/S11623-023-1904-8},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LorenzF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen24,
  author       = {Kim Nguyen},
  title        = {Ein sicheres und vertrauensw{\"{u}}rdiges ID-{\"{O}}kosystem
                  - ein wichtiges Ziel f{\"{u}}r Europa!},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {209},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1909-y},
  doi          = {10.1007/S11623-024-1909-Y},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri24,
  author       = {Thomas Petri},
  title        = {Informationelle Selbstbestimmung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {128--129},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1893-7},
  doi          = {10.1007/S11623-023-1893-7},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann24,
  author       = {Norbert Pohlmann},
  title        = {Aktuelle Herausforderungen der IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1869-7},
  doi          = {10.1007/S11623-023-1869-7},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann24a,
  author       = {Norbert Pohlmann},
  title        = {Die Notwendigkeit von neuen IT-Sicherheitskonzepten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {5--10},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1871-0},
  doi          = {10.1007/S11623-023-1871-0},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR24,
  author       = {Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Regulierung und B{\"{u}}rokratie},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {49},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1879-5},
  doi          = {10.1007/S11623-023-1879-5},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer24,
  author       = {Helmut Reimer},
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {60--69},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1881-y},
  doi          = {10.1007/S11623-023-1881-Y},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer24a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {197--205},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1907-5},
  doi          = {10.1007/S11623-023-1907-5},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SalemiH24,
  author       = {Simone Salemi and
                  Ajla Hajric},
  title        = {K{\"{o}}nnen Datensch{\"{u}}tzer aus Konzepten des sexuellen
                  Konsenses lernen?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {177--182},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1903-9},
  doi          = {10.1007/S11623-023-1903-9},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SalemiH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittSI24,
  author       = {Hartmut Schmitt and
                  Christian H. Schunck and
                  Luigi Lo Iacono},
  title        = {Daten{\"{o}}konomie in digitalen {\"{O}}kosystemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {77--81},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1885-7},
  doi          = {10.1007/S11623-023-1885-7},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchmittSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulmannW24,
  author       = {Haya Schulmann and
                  Michael Waidner},
  title        = {Wie Deutschland zur Cybernation wird},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {11--15},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1872-z},
  doi          = {10.1007/S11623-023-1872-Z},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchulmannW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwalmM24,
  author       = {Steffen Schwalm and
                  Kersten Mueller},
  title        = {Qualifizierte Ledger - der Durchbruch f{\"{u}}r Blockchain},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {227--231},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1914-1},
  doi          = {10.1007/S11623-024-1914-1},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchwalmM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SeegebarthBK24,
  author       = {Christian Seegebarth and
                  Paul Bastian and
                  Micha Kraus},
  title        = {Enabling attribute attestations},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {237--240},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1916-z},
  doi          = {10.1007/S11623-024-1916-Z},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SeegebarthBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpechtRiemenschneiderH24,
  author       = {Louisa Specht{-}Riemenschneider and
                  Bernadette Heineking},
  title        = {Datenverarbeitung in sicheren Verarbeitungsumgebungen am Beispiel
                  von MRT-Gehirnscans},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {110--117},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1890-x},
  doi          = {10.1007/S11623-023-1890-X},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SpechtRiemenschneiderH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SteffesZ24,
  author       = {Bianca Steffes and
                  Anna Zichler},
  title        = {Deepfakes in Videoverhandlungen vor Gericht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {158--163},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1899-1},
  doi          = {10.1007/S11623-023-1899-1},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SteffesZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinebach24,
  author       = {Martin Steinebach},
  title        = {KI-generierte Abbildungen von Kindesmissbrauch},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {304--309},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1934-x},
  doi          = {10.1007/S11623-024-1934-X},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steinebach24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld24,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Kunstfreiheit und Pers{\"{o}}nlichkeitsschutz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {169--171},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1901-y},
  doi          = {10.1007/S11623-023-1901-Y},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wand24,
  author       = {Andreas Wand},
  title        = {Die geldw{\"{a}}scherechtliche Identifizierung durch eIDAS-Mittel},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {232--236},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1915-0},
  doi          = {10.1007/S11623-024-1915-0},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wand24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WegenerG24,
  author       = {Christoph Wegener and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {268--272},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1921-2},
  doi          = {10.1007/S11623-024-1921-2},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WegenerG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert24,
  author       = {Thilo Weichert},
  title        = {Ausl{\"{a}}nderzentralregister},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {188--189},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1905-7},
  doi          = {10.1007/S11623-023-1905-7},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24,
  title        = {45. Informationsfreiheitskonferenz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {4},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1870-1},
  doi          = {10.1007/S11623-023-1870-1},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24a,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {130--137},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1894-6},
  doi          = {10.1007/S11623-023-1894-6},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24b,
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {138--148},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1895-5},
  doi          = {10.1007/S11623-023-1895-5},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24c,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {251--260},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1919-1},
  doi          = {10.1007/S11623-023-1919-1},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24d,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {261--268},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1920-3},
  doi          = {10.1007/S11623-024-1920-3},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24e,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {318--324},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1935-9},
  doi          = {10.1007/S11623-024-1935-9},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24f,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {5},
  pages        = {325--332},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1936-8},
  doi          = {10.1007/S11623-024-1936-8},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics