2008 |
11 | EE | Bernhard Riedl,
Veronika Grascher,
Mathias Kolb,
Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
ARES 2008: 39-46 |
10 | EE | Bernhard Riedl,
Veronika Grascher,
Stefan Fenz,
Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications.
HICSS 2008: 255 |
9 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
JSW 3(2): 23-32 (2008) |
2007 |
8 | EE | Bernhard Riedl,
Thomas Neubauer,
Gernot Goluch,
Oswald Boehm,
Gert Reinauer,
Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data.
ARES 2007: 318-324 |
7 | EE | Thomas Neubauer,
Gernot Goluch,
Bernhard Riedl:
A research agenda for Autonomous Business Process Management.
ARES 2007: 670-680 |
6 | EE | Gernot Goluch,
Andreas Ekelhart,
Stefan Fenz,
Stefan Jakoubi,
Bernhard Riedl,
Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems.
ARES 2007: 730-740 |
5 | EE | Stefan Fenz,
Gernot Goluch,
Andreas Ekelhart,
Bernhard Riedl,
Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
PRDC 2007: 381-388 |
4 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data.
PRDC 2007: 397-400 |
3 | | Bernhard Riedl,
Gernot Goluch,
Stefan Pöchlinger,
Edgar R. Weippl:
A Comparative Literature Review on RFID Security and Privacy.
iiWAS 2007: 213-222 |
2 | | Bernhard Riedl,
Oliver Jorns:
Secure Access to Emergency Data in an e-Health Architecture.
iiWAS 2007: 297-306 |
2005 |
1 | EE | Dietmar Winkler,
Bernhard Riedl,
Stefan Biffl:
Improvement of Design Specifications with Inspection and Testing.
EUROMICRO-SEAA 2005: 222-231 |