At a crossroads: "Personhood" and digital identity in the information society, 2008. ,
A roadmap for research on identity in the information society, Identity in the information society, pp.71-87, 2008. ,
Playing the identity card -surveillance, security and identification in global perspective, 2008. ,
The path dependency of national electronic identities, Identity in the Information Society, vol.33, issue.67, 2010. ,
DOI : 10.1007/978-3-642-01820-6_6
Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries, Identity in the Information Society, vol.33, issue.6/7, 2010. ,
DOI : 10.1007/978-3-531-90673-7
Identifying citizens -ID cards as Surveillance, 2009. ,
The Tools of Government in the Digital Age, Public Policy and Politics Hampshire, 2007. ,
DOI : 10.1007/978-1-137-06154-6
Electronic identity management in e-Government 2.0: Exploring a system innovation exemplified by Austria, Information Polity, vol.15, issue.12, pp.139-152, 2010. ,
Identity Management in Information Age Government Exploring Concepts, Definitions, Approaches and Solutions, Research Report, 2008. ,
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management ? A Consolidated Proposal for Terminology version 0.33, 2010. ,
DOI : 10.1007/3-540-44702-4_1
Identity management of e-ID, privacy and security in Europe. A human rights view, Information Security Technical Report, vol.13, issue.2, pp.71-75, 2008. ,
DOI : 10.1016/j.istr.2008.07.001
Datenschutz im 21. Jahrhundert In: Aus Politik und Zeitgeschichte Band 5-6 (Digitalisierung und Datenschutz, pp.9-15, 2006. ,
Lifelong Privacy: Privacy and Identity Management for Life, Privacy and Identity Management for Life, pp.1-17, 2010. ,
DOI : 10.1007/978-3-642-14282-6_1
URL : https://hal.archives-ouvertes.fr/hal-01061067
Privacy features of European eID card specifications, Network Security, vol.2008, issue.8, 2009. ,
DOI : 10.1016/S1353-4858(08)70097-7
Auswirkungen der EU-DL Richtlinie auf die E-Gov-Welt, Jahrbuch Datenschutzrecht und E-Government. Neuer wissenschaftl, pp.267-283, 2008. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
How Unique Is Your Web Browser? Electronic Frontier Foundation, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.9914
Nine principles for assessing whether privacy is protected in a surveillance society, Identity in the information society, IDIS), vol.1, issue.1, pp.1-22, 2008. ,
Surveillance as social sorting -privacy, risk and digital discrimination, Routledge, 2003. ,
Delete: The Virtue of Forgetting in the Digital Age, 2009. ,
Vanish: Increasing Data Privacy with Self-Destructing Data, Proceedings of the USENIX Security Symposium, 2009. ,
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs, 2009. ,
Profiling and the rule of law, Identity in the Information Society, vol.8, issue.11, pp.55-70, 2008. ,
DOI : 10.4337/9781847204301
Freedom of information ? a comparative legal survey, UNESCO, 2008. ,