Publications
2024
- A. Richter, P. Kühtreiber, and D. Reinhardt. Application and Utilization of Privacy Indicators and Control Interactions for Smart Watches in an Employee Context. In IFIP SELECT, volume 2, pages 11–13, 2024. [PDF]
- S. Shams, S. Reinke and D. Reinhardt. Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. Proceedings of the 29th Nordic Conference on Secure IT Systems (NordSec), 2024. Accepted for publication.
- C. Warin, V. Pak, and D. Reinhardt. Privacy Perceptions Across the XR Spectrum: An Extended Reality Cross-Platform Comparative Analysis of A Virtual House Tour. Proceedings on Privacy Enhancing Technologies (PoPETs), 2024. [LINK]
- P. Neumann, S. T. Büttner, L. Hernández Acosta, D. Reinhardt and M. Prilla. "I Don't Want Parents to Watch My Lessons" – Privacy Trade-offs in the Use of Telepresence Robots in Schools for Children with Long-term Illnesses. Proceedings of the 23rd Mensch und Computer (MuC), 2024. [PDF]
- S. T. Büttner, P. Neumann, L. Hernández Acosta, D. Reinhardt and M. Prilla. Towards Privacy-friendly Telepresence Robots for Schoolchildren with Long-term Illnesses – User Needs of Relevant User Groups. Proceedings of the 10th Usable Security und Privacy Workshop (MuC workshop), 2024. [LINK]
- L. Hernández Acosta, A. Reinhardt, T. Müller and D. Reinhardt. Beyond Wake Words: Advancing Smart Speaker Protection with Continuous Authentication and Local Profiles. In Proceedings of the 33rd IEEE International Conference on Computer Communications and Networks (ICCCN), 2024. [PDF]
- L. Hernández Acosta and D. Reinhardt. "Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. In Proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2024. [PDF]
- S. Kleber, C. Bungartz, A. Hermann, M. Jahnke P. Herrmann, F. Kargl, A. Mitschele-Thiel, D. Reinhardt and J. Steinberger. Trust in AI and Modeling of Threats against AI in Network Defense. In Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov and Artu Hermann, editors, Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431), Dagstuhl Reports, pages 112–119, 2024. [LINK]
- L. Kqiku and D. Reinhardt. SensitivAlert: Image Sensitivity Prediction in Online Social Networks using Transformer-based Deep Learning Models. Proc. of the 18th International AAAI Conference on Web and Social Media (ICWSM), 2024. [LINK]
- L. Hernández Acosta, A. Dehning, W. G. Oed and D. Reinhardt. No Ears but Aware: Fingerprinting Attacks on Smart Speakers. Proceedings of the 22nd International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Work-in-Progress), 2024. [PDF]
- S. Reinke and D. Reinhardt. Dear Robot, What Do You Know About Me? Enhancing Transparency in Presence of Robots. Proceedings of the 22nd International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom PhD Forum), 2024. [PDF]
- C. Warin, D. Seeger, S. Shams and D. Reinhardt. PrivXR: A Cross-Platform Privacy-Preserving API and Privacy Panel for Extended Reality. Proceedings of the 22nd International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Work-in-Progress), 2024. [PDF]
- S. Huster, M. Hollick, J. Classen. To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux’ Wireless Stacks through VirtIO Devices. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), 2024. [PDF]
2023
- S. T. Büttner, J. C. Gutzmann, C. M. Sourkounis, S. Shams, M. Prilla. Would You Help Me Voluntarily for the Next Two Years? Evaluating Psychological Persuasion Techniques in Human-Robot Interaction. First results of an empirical investigation of the door-in-the-face technique in human-robot interaction. In the adjunct proceedings of the 18th International Conference on Persuasive Technology (PERSUASIVE), 2023. [LINK]
- A. Richter. Employees' Acceptance of Smart Watches in Germany: Privacy-preserving Solutions for Employees and Recommendations for Employers during the Deployment of Smart Watches in Smart Workplaces. Doctoral dissertation, University of Göttingen, 2023. [LINK]
- D. Reinhardt. Lass mich allein! .inf 03.23 - Das Informatik-Magazin, 2023. [LINK]
- P. Kühtreiber, V. Pak and D. Reinhardt. "A method like this would be overkill’": Developers' Perceived Issues with Privacy-preserving Computation Methods. Proceedings of the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023. Acceptance rate for full papers: 30%. [PDF]
- S. Shams and D. Reinhardt. Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. Proceedings of the 3rd European Symposium on Usable Security (EuroUSEC), 2023. [PDF]
- D. Reinhardt, R. Ben Bachouch Jacquin, S. Reinke, Y. Parmantier. Deploying Robots in Ambient Assisted Living Environments: Potential Benefits, Challenges and Future Research Directions. Proceedings of the 10th Telehealth and Biomedical Devices Study Conference (JETSAN), 2023. [PDF]
- L. Kqiku and D. Reinhardt. Lengthy Early Morning Instant Messages Reveal More Than You Think: Analysing Interpersonal Relationships using Mobile Communication Metadata. Pervasive and Mobile Computing (PMC), 2023. [PDF]
- L. Hernández Acosta, S. Rahe and D. Reinhardt. Does Cycling Reveal Insights about You? Investigation of User and Environmental Characteristics during Cycling. Proceedings of the 19th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2023. Acceptance rate for full regular papers: 30%. [PDF]
- A. Tillmann, L. Kqiku, D. Reinhardt, C. Weisser, B. Säfken and T. Kneib. Privacy Estimation on Twitter: Modelling the Effect of Latent Topics on Privacy by Integrating XGBoost, Topic and Generalized Additive Models. Proceedings of the 8th IEEE International Conference on Privacy Computing (PriComp), 2023. Acceptance rate for full papers: 23%. [PDF]
2022
- S. Reinke, K. Wolter and M. Prilla. A Participatory Approach to Investigate Potentials of AI based Video Tutorials on Head Mounted Devices. Wirtschaftsinformatik 2022 Proceedings. 6., 2022 [LINK]
- J. Tolsdorf. Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the Right to Informational Self-Determination in Employment. Doctoral dissertation, University of Göttingen, 2022. [LINK]
- C. Hesselmann, D. Reinhardt, J. Gertheiss and J. P. Müller. Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. Proceedings of the 27th Nordic Conference on Secure IT Systems (NordSec), 2022. Acceptance rate for full papers: 22%. [PDF]
- A. Railean. Improving IoT Device Transparency by Means of Privacy Labels. Doctoral dissertation, University of Göttingen, 2022. [LINK]
- P. Kühtreiber, V. Pak and D. Reinhardt. A Survey on Solutions to Support Developers in Privacy-Preserving IoT Development. Pervasive and Mobile Computing (PMC), 2022. [PDF]
- C. Warin and D. Reinhardt. Vision: Usable Privacy for XR in the Era of the Metaverse. Proceedings of the 2nd European Symposium on Usable Security (EuroUSEC), 2022. [PDF]
- L. Kqiku, J. Dieterle and D. Reinhardt. Exploration of a Mobile Design for a Privacy Assistant to Help Users in Sharing Content in Online Social Networks. Proceedings of the 8. Usable Security und Privacy Workshop (MuC workshop), 2022. [LINK]
- L. Kqiku, M. Kühn and D. Reinhardt. From Sentiment to Sensitivity: The Role of Emotions on Privacy Exposure in Twitter. Proceedings of the 2nd ACM Workshop on Open Challenges in Online Social Networks (OASIS, HT workshop), 2022. [PDF]
- P. Kühtreiber, V. Pak and D. Reinhardt. Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing Attitudes. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS), 2022. Acceptance rate for full papers: 28%. [PDF]
- C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp and Z. Mann. Sicherheit 2022: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), volume P-323. Köllen Druck+Verlag GmbH, Bonn, Germany, 2022. [LINK]
- A. Richter, P. Kühtreiber, D. Reinhardt. On the Impact of Information Provided to Employees on their Intention to Disclose Data Collected by Smart Watches to their Employers. Proceedings of the 30th European Conference on Information Systems (ECIS), 2022. Acceptance rate for full papers: 30%. [PDF]
- J. Tolsdorf, F. Dehling and L. Lo Iacono. Data Cart – Designing a Tool for the GDPR-compliant Handling of Personal Data by Employees. Behaviour & Information Technology (BIT), 41(10):2070-2105, 2022.
- A. Richter, P. Kühtreiber, D. Reinhardt. Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches. Proceedings of the 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2022. Acceptance rate for full papers: 23%. [PDF]
- M. Bachmann, L. Hernández Acosta, J. Götz, D. Reinhardt and K. David. Collisions Avoidance for Vulnerable Road Users: Privacy versus Survival?. Proceedings of the 5th International Workshop on Intelligent Transportation and Autonomous Vehicles Technologies (ITAVT, NOMS workshop), 2022. [PDF]
- L. Hernández Acosta and D. Reinhardt. Enhanced Privacy for Voice-Controlled Digital Assistants. Proceedings of the 20th International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom PhD Forum), 2022. [PDF]
- L. Hernández Acosta and D. Reinhardt. Multi-User Privacy with Voice-Controlled Digital Assistants. Proceedings of the 20th International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Work-in-Progress), 2022. [PDF]
- L. Hernández Acosta and D. Reinhardt. A Survey on Privacy Issues and Solutions for Voice-controlled Digital Assistants. Pervasive and Mobile Computing (PMC), 2022. [PDF]
- J. Tolsdorf, D. Reinhardt, L. Lo Iacono. Employees’ Privacy Perceptions: Exploring the Dimensionality and Antecedents of Personal Data Sensitivity and Willingness to Disclose. Proceedings on Privacy Enhancing Technologies (PoPETs), 2022(2):68--94, 2022. Acceptance rate for full papers: 26%. [LINK]
- A. Richter, P. Kühtreiber, D. Reinhardt. Exploration of Factors that can Impact the Willingness of Employees to Share Smart Watch Data with their Employers. Privacy and Identity Management. Between Data Protection and Security, 2022. [PDF]
2021
- C. I. Wickramasinghe and D. Reinhardt. A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage and Disclosure in Own Smart Home Environments. Proceedings of the 18th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2021. [PDF]
- P. Murmann, M. Beckerle, S. Fischer-Hübner and D. Reinhardt. Reconciling the What, When and How of Privacy Notifications in Fitness Tracking Scenarios. Pervasive and Mobile Computing (PMC), 2021. [LINK]
- F. Dehling, D. Feth, S. Polst, B. Steffes and J. Tolsdorf. Components and Architecture for the Implementation of Technology-driven Employee Data Protection. Proceedings of the 18th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), 2021. Acceptance rate for full papers: 37%.
- S. Wiefling, J. Tolsdorf and L. Lo Iacono. Privacy Considerations for Risk-based Authentication Systems. Proceedings of the 7th IEEE International Workshop on Privacy Engineering (IWPE), 2021. [LINK]
- P. Kühtreiber and D. Reinhardt. Usable Differential Privacy for the Internet-of-Things. Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021. [PDF]
- D. Reinhardt, M. Khurana and L. Hernández Acosta. "I still Need my Privacy": Exploring the Level of Comfort and Privacy Preferences of German-speaking Older Adults in the Case of Mobile Assistant Robots. Pervasive and Mobile Computing (PMC), 2021. [PDF]
- J. Tolsdorf, F. Dehling, D. Reinhardt and L. Lo Iacono. Exploring Mental Models of the Right to Informational Self-Determination of Office Workers in Germany. Proceedings on Privacy Enhancing Technologies (PoPETs), 2021(3):5–27, 2021. Acceptance rate for full papers: 17%. [LINK]
- J. Tolsdorf, M. Fischer and L. Lo Iacono. A Case Study on the Implementation of the Right of Access in Privacy Dashboards. Proceedings of the 9th Annual Privacy Forum (APF), 2021. Acceptance rate for full papers: 21%. [PDF]
- A. Railean and D. Reinhardt. Improving the Transparency of Privacy Terms Updates. Proceedings of the 9th Annual Privacy Forum (APF), 2021. Acceptance rate for full papers: 21%. [PDF]
- D. Reinhardt. Privacy in Mobile Participatory Sensing. Encyclopedia of Cryptography, Security and Privacy, 2021.
- J. Tolsdorf, F. Dehling, und D. Feth. Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen. Datenschutz und Datensicherheit (DuD), 45(1):33–39, 2021. [LINK]
- S. Polst, J. Tolsdorf, F. Dehling, und D. Feth. Verarbeitung von Beschäftigtendaten. Datenschutz und Datensicherheit (DuD), 45(1):19–22, 2021. [LINK]
2020
- J. Tolsdorf, F. Dehling and L. Lo Iacono. Take Back Control! The Use of Mental Models to Develop Privacy Dashboards. ITG News, 8(3):15–20, 2020. [LINK]
- J. Tolsdorf and L. Lo Iacono. Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces. Proceedings of the 5th IEEE European Workshop on Usable Security (EuroUSEC, EuroSPW), 2020. [LINK]
- B. Alhaji, J. Beecken, R. Ehlers, J. Gertheiss, F. Merz, J. P. Müller, M. Prilla, A. Rausch, A. Reinhardt, D. Reinhardt, C. Rembe, N.-O. Rohweder, C. Schwindt, S. Westphal, J. Zimmermann. Engineering Human-Machine Teams for Trusted Collaboration. Big Data and Cognitive Computing (BDCC), 2020. [LINK]
- A. Railean and D. Reinhardt. OnLITE: On-line Label for IoT Transparency Enhancement. Proceedings of the 25th Nordic Conference on Secure IT Systems (NordSec), 2020. Acceptance rate for full papers: 33%. [PDF]
- J. Quintero, A. Railean and Z. Benenson. Acceptance Factors of Car Insurance Innovations: The Case of Usage-Based Insurance. Journal of Traffic and Logistics Engineering 8(2):45-55, 2020. [LINK]
- L. Hernández Acosta and D. Reinhardt. Smart Speakers and Privacy: Users’ Perspectives. VDE dialog - The Technology Magazine, 04:8–10, 2020. [PDF]
- D. Reinhardt. Alles oder nichts? Über die Mittel zum Schutz der Demokratie in einer digitalen Welt. Jahresbericht des Weisenrats für Cyber-Sicherheit 2020, 2020. [PDF]
- J. Tolsdorf, C. K. Bosse, A. Dietrich, D. Feth, H. Schmitt, Privatheit Am Arbeitsplatz - Transparenz Und Selbstbestimmung Bei Arbeit 4.0. Datenschutz und Datensicherheit (DuD), 44(3):176-181, 2020. [PDF]
- A. Richter. Do Privacy Concerns Prevent Employees’ Acceptance of Smart Wearables and Collaborative Robots?. Proceedings of the 10th Fachtagung Sicherheit, Schutz und Zuverlässigkeit (SICHERHEIT), 2020. [PDF]
- D. Reinhardt, H. Langweg, B. C. Witt, M. Fischer. Sicherheit 2020: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), volume P-301. Köllen Druck+Verlag GmbH, Bonn, Germany, 2020. [LINK]
- C. Bettini, S. Kanhere, M. Langheinrich, A. Misra and D. Reinhardt. Is Privacy Regulation Slowing Down Research on Pervasive Computing?. IEEE Computer Magazine, 53(6):44-52, 2020. [PDF]
- C. I. Wickramasinghe and D. Reinhardt. A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects. Privacy and Identity Management. Data for Better Living: AI and Privacy, 2020. [PDF]
- A. Richter, A. Reinhardt and D. Reinhardt. Privacy-Preserving Human-Machine Co-Existence on Smart Factory Shop Floors. Proceedings of the 2nd International Workshop on Simulation Science (SimScience 2019), 2020. [PDF]
- J. Tolsdorf, F. Dehling. In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions. Proceedings of the 1st Asian Workshop on Usable Security (AsiaUSEC, FC workshop), 2020.
2019
- A. Railean and D. Reinhardt. OnLITE: Online Label For Internet of Things Transparency Enhancement. Proceedings of the Open Day for Privacy, Usability and Transparency (PUT), 2019. [PDF]
- B. Leiding, A. Bochem and L. Hernández Acosta. Automated Sensor-Fusion Based Emergency Rescue for Remote and Extreme Sport Activities. Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019. [PDF]
- P. Murmann, D. Reinhardt and S. Fischer-Hübner. To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth Services. Proceedings of the 34th IFIP International Information Security and Privacy Conference (IFIP SEC), 2019. Acceptance rate for full papers: 18%. [PDF]
2018
- D. Reinhardt and F. Dürr. Opportunities and Risks of Delegating Sensing Tasks to the Crowd. Handbook of Mobile Data Privacy, 2018.
- A. Railean and D. Reinhardt. Let there be LITE: Design and Evaluation of a Label for IoT Transparency Enhancement. Proceedings of the 20th ACM International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI Adjunct), 2018. [PDF]
- D. Reinhardt and D. Sauveron. Data Security and Privacy in the Internet-of-Things. Information Security: Foundations, Technologies and Applications, Chap. 14, IET Digital Library, 2018.
- H. Langweg, M. Meier, B. C. Witt and D. Reinhardt. Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), volume 281. Köllen Druck+Verlag GmbH, Bonn, Germany, 2018. [LINK]
- M. Häring, D. Reinhardt and Y. Omlor. Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users. Proceedings of the 16th IEEE International Conference on Pervasive Computing and Communications (PerCom Work-in-Progress), 2018. [PDF]
- N. Gruschka, L. Lo Iacono, J. Tolsdorf. Classification of Android App Permissions: Tell Me What App You Are and I Tell You What You Are Allowed to Do. Proceedings of the 17th European Conference on Information Warfare and Security (ECCWS), 2018.
- A. Railean and D. Reinhardt. Life-long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-cycle of IoT Devices. Privacy and Identity Management. The Smart Revolution, 2018. [PDF]
2017
- H.V. Nguyen, J. Tolsdorf, L. Lo Iacono. On the Security Expressiveness of REST-based API Definition Languages. Proceedings of the 14th International Conference On Trust, Privacy and Security In Digital Business (TrustBus), 2017.
- C. Hartlage and D. Reinhardt. APRIM: An Account and PeRsonal Information Manager. Proceedings of the 35st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Late-Breaking Work), 2017. [PDF]
2016
- D. Reinhardt, M. Michalak and R. Lokaiczyk. Job Alerts in the Wild: Study of Expectations and Effects of Location-based Notifications in an Existing Mobile Crowdsourcing Application. Proceedings of the 13th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services ](MobiQuitous), 2016. [PDF]
- D. Reinhardt and I. Manyugin. OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications. Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN), 2016. Acceptance rate: 28%. [PDF]
- A. Reinhardt and D. Reinhardt. Detecting Anomalous Electrical Appliance Behavior based on Motif Transition Likelihood Matrices. Proceedings of the 7th IEEE International Conference on Smart Grid Communications (SmartGridComm), 2016. [PDF]
- M. Meier, D. Reinhardt and S. Wendzel. Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), volume 256. Köllen Druck+Verlag GmbH, Bonn, Germany, 2016. [LINK]
- D. Reinhardt and C. Heinig. Survey-based Exploration of Attitudes to Participatory Sensing Tasks in Location-based Gaming Communities. Pervasive and Mobile Computing (PMC), 27:27–36, 2016. [PDF]
- D. Christin. Privacy in Mobile Participatory Sensing: Current Trends and Future Challenges. Journal of Systems and Software (JSS), 116:57–68, 2016. [PDF]
2015
- D. Reinhardt, F. Engelmann and M. Hollick. Can I Help You Setting Your Privacy? A Survey-based Exploration of Users Attitudes towards Privacy Suggestions. Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM), 2015. Acceptance rate for full papers: 30%. [PDF]
- D. Reinhardt, F. Engelmann, A. Moerov and M. Hollick. Show Me Your Phone, I Will Tell You Who Your Friends Are: Analyzing Smartphone Data To Identify Social Relationships. Proceedings of the 14th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), 2015. [PDF]
- I. Diaconita, A. Reinhardt, D. Christin and C. Rensing. Inferring Smartphone Positions Based on Collecting the Environment’s Response to Vibration Motor Actuation. Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM Workshops), Symposium on QoS and Security for Wireless and Mobile Networks, 2015. [PDF]
- A. Reinhardt, G. Konstantinou, D. Egarter, D. Christin. Worried About Privacy? Let Your PV Converter Cover Your Electricity Consumption Fingerprints. Proceedings of the 6th IEEE International Conference on Smart Grid Communications (SmartGridComm), Symposium on Cyber Security and Privacy, 2015. [PDF]
- A. Reinhardt, F. Englert and D. Christin. Averting the Privacy Risks of Smart Metering by Local Data Preprocessing. Pervasive and Mobile Computing (PMC), 16(0):171–183, 2015. [PDF]
- D. Christin, D. Bub, A. Moerov and S. Kasem-Madani. A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Applications. Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015. [PDF]
2014
- A. Reinhardt, D. Christin and S. S. Kanhere. Can Smart Plugs Predict Electric Power Consumption? A Case Study. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2014. Acceptance rate for full papers: 19%. [PDF]
- I. Diaconita, A. Reinhardt, D. Christin and C. Rensing. Bleep Bleep! Determining Smartphone Locations by Opportunistically Recording Notification Sounds. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2014. Acceptance rate for full papers: 19%. [PDF]
- A. Reinhardt, S. Zöller and D. Christin. Wireless Sensor Networks and Their Applications: Where Do We Stand? And Where Do We Go? Proceedings of the 13th GI/ITG KuVS Fachgespräch ,,Drahtlose Sensornetze” (FGSN), 2014. [PDF]
- D. Christin, F. Engelmann and M. Hollick. Usable Privacy for Mobile Sensing Applications. Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), 2014. Acceptance rate for full papers: 24%. [PDF]
- D. Christin, D. R. Pons-Sorolla, M. Hollick and S. S. Kanhere. TrustMeter: A Trust Assessment Framework for Collaborative Path Hiding in Participatory Sensing Applications. Proceedings of the 9th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014. [PDF]
- I. Diaconita, A. Reinhardt, F. Englert, D. Christin and R. Steinmetz. Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations. Proceedings of the 1st IEEE Symposium on Activity and Context Modeling and Recognition (ACOMORE, PerCom workshop), 2014. [PDF]
2013
- D. Christin, M. Michalak, M. Hollick. Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings. Proceedings of the 11th International Conference on Advances in Mobile Computing and Multimedia (MoMM), 2013. Acceptance rate: 30%. [PDF]
- Z. Benenson, D. Christin, A. De Luca, S. Fischer-Hübner, T. Heimann and J. Meyer. Consequence-based Privacy Decisions: a New Way to Better Privacy Management. In Alessandro Acquisti, Ioannis Krontiris, Marc Langheinrich and Martina Angela Sasse, editors, “My Life, Shared” – Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312), Dagstuhl Reports, 2013. [PDF]
- D. Christin, C. Roßkopf and M. Hollick. uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments. Pervasive and Mobile Computing, 9(5):695-707, 2013. [PDF]
- A. Reinhardt, F. Englert, D. Christin. Enhancing User Privacy by Prepocessing Distributed Smart Meter Data. Proceedings of the 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), 2013. Acceptance rate: 31%. [PDF]
- A. Reinhardt, D. Christin, S. S. Kanhere. Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching. Proceedings of 5th ACM Workshop on Embedded Systems for Energy-Efficient Buildings (BuildSys, SenSys workshop), 2013. [PDF]
- Best demo award: A. Reinhardt, D. Christin, K. Li, S. S. Kanhere, J. Zhang. Smarter Building for the Smart Grid? Let them Forecast Their Power Consumption. Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN demo), 2013. [PDF]
- D. Christin, A. Reinhardt, M. Hollick. On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications. Proceedings of the 38th Annual IEEE Conference on Local Computer Networks (LCN), 2013. Acceptance rate: 26%. [PDF]
- D. Christin, C. Büchner, N. Leibecke. What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications. Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE, LCN workshop), 2013. [PDF]
- D. Christin, C. Roßkopf, M. Hollick, L. A. Martucci and S. S. Kanhere. IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications. Pervasive and Mobile Computing, 9(3), 353-371, 2013. [PDF]
- M. Kauer, B. Franz, T. Pfeiffer, M. Heine and D. Christin. Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion. Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress), 2013. [PDF]
- A. Reinhardt, D. Christin and R. Steinmetz. Pre-Allocating Code Mappings for Energy-Efficient Data Encoding in Wireless Sensor Networks. Proceedings of the 9th IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS, PerCom workshop), 2013. Acceptance rate: 31%. [PDF]
- D. Christin and M. Hollick. Roadmap for Privacy Protection in Mobile Sensing Applications. In Serge Gutwirth, Ronald Leenes, Paul de Hert and Yves Poullet, editors, European Data Protection: Coming of Age. Springer Netherlands, 2013.
- D. Christin, P. Sánchez López, A. Reinhardt, M. Hollick and M. Kauer. Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications. Information Security Technical Report, 17(3):105-116, 2013. [PDF]
2012
- D. Christin, A. Reinhardt, M. Hollick and K. Trumpold. Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications. Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), 2012. Acceptance rate: 21%. [PDF]
- Best paper candidate: D. Christin, C. Büttner and N. Repp. CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt. Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp, LCN workshop), 2012. Acceptance rate: 20%. [PDF]
- D. Christin, P. Sánchez López, A. Reinhardt, M. Hollick and M. Kauer. Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. Proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP), 2012. Acceptance rate: 25%. [PDF]
- D. Christin, A. Bentolila and M. Hollick. Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences. Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU, Pervasive workshop), 2012. [PDF]
- D. Christin, C. Roßkopf, M. Hollick, L. A. Martucci and S. S. Kanhere. IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications. Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012. Acceptance rate: 11%. [PDF]
- D. Christin, D. R. Pons-Sorolla, S. S. Kanhere and M. Hollick. TrustMeter: A Trust Assessment Framework for Collaborative Path Hiding in Participatory Sensing Applications. Technical Report TR-SEEMOO-2012-02, Technische Universität Darmstadt, October 2012.
2011
- D. Christin, A. Reinhardt, S. S. Kanhere and M. Hollick. A Survey on Privacy in Mobile Participatory Sensing Applications. Journal of Systems and Software, 84(11):1928–1946, 2011. [PDF]
- D. Christin, J. Guillemet, A. Reinhardt, M. Hollick and S. S. Kanhere. Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications. Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011. Acceptance rate: 15% (without shepherding). [PDF]
- D. Christin, T. Freudenreich and M. Hollick. A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks. Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU, Pervasive workshop), 2011.
[PDF] - D. Christin and M. Hollick. We Must Move – We Will Move: On Mobile Phones as Sensing Platforms. Proceedings of the 10th GI/ITG KuVS Fachgespräch ,,Drahtlose Sensornetze” (FGSN), 2011. [PDF]
- M. Hollick and D. Christin. Fünf Milliarden Sensoren: Chancen und Gefahren. Proceedings of the 5. Essener Workshop ,,Neue Herausforderungen in der Netzsicherheit”, 2011. [PDF]
2010
- D. Christin, P. S. Mogre and M. Hollick. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives. Future Internet, 2(2):96–125, 2010. [PDF]
- A. Reinhardt, D. Christin, M. Hollick, J. Schmitt, P. S. Mogre and R. Steinmetz. Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks. Proceedings of the 7th European Conference on Wireless Sensor Networks (EWSN), 2010. Acceptance rate: 19%. [PDF]
- D. Christin, M. Hollick and M. Manulis. Security and Privacy Objectives for Sensing Applications in Wireless Community Networks. Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN), 2010. [PDF]
- D. Christin. Impenetrable Obscurity vs. Informed Decisions: Privacy Solutions for Participatory Sensing. Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications (PerCom workshop), 2010. [PDF]
- D. Christin, A. Reinhardt, S. S. Kanhere and M. Hollick. Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks. Proceedings of the 9th GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze” (FGSN), 2010. [PDF]
2009
- A. Reinhardt, D. Christin, M. Hollick and R. Steinmetz. On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks. Proceedings of the 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp, LCN Workshop), 2009. Acceptance rate: 36%. [PDF]
- D. Christin, A. Reinhardt, P. S. Mogre and R. Steinmetz. Wireless Sensor Networks and the Internet of Things: Selected Challenges. Proceedings of the 8th GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze” (FGSN), 2009. [PDF]