default search action
Erik Buchmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Vincent Freiberger, Erik Buchmann:
Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies. IWSPA@CODASPY 2024: 15-22 - [c59]Anika Hannemann, Benjamin Friedl, Erik Buchmann:
Differentially Private Multi-Label Learning Is Harder Than You'd Think. EuroS&P Workshops 2024: 40-47 - [c58]Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann:
Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs. ICCS (4) 2024: 279-293 - [c57]Mario Hoffmann, Erik Buchmann:
ChatSEC - Towards Enhancing Security Vulnerability Reports for Non-Experts. MuC (Workshopband) 2024 - [c56]Victor Jüttner, Arthur Fleig, Erik Buchmann:
ChatAnalysis: Can GPT-4 undermine Privacy in Smart Homes with Data Analysis? MuC (Workshopband) 2024 - [i6]Vincent Freiberger, Erik Buchmann:
Fairness Certification for Natural Language Processing and Large Language Models. CoRR abs/2401.01262 (2024) - [i5]Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann:
Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs. CoRR abs/2402.14527 (2024) - [i4]Vincent Freiberger, Erik Buchmann:
Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies. CoRR abs/2403.08115 (2024) - 2023
- [c55]Erik Buchmann, Andreas Thor:
Online Exams in the Era of ChatGPT. DELFI 2023: 15 - [c54]Victor Jüttner, Erik Buchmann:
Die Entwicklung eines digitalen Praktikums der Cybersicherheit im Bereich "Smart Home". DELFI 2023: 23 - [c53]Anika Hannemann, Erik Buchmann:
Is Homomorphic Encryption Feasible for Smart Mobility? FedCSIS 2023: 523-532 - [c52]Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün:
A Privacy-Preserving Framework for Collaborative Machine Learning with Kernel Methods. TPS-ISA 2023: 82-90 - [i3]Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün:
A Privacy-Preserving Federated Learning Approach for Kernel methods. CoRR abs/2306.02677 (2023) - [i2]Anika Hannemann, Erik Buchmann:
Is Homomorphic Encryption Feasible for Smart Mobility? CoRR abs/2306.04195 (2023) - [i1]Victor Jüttner, Martin Grimmer, Erik Buchmann:
ChatIDS: Explainable Cybersecurity Using Generative AI. CoRR abs/2306.14504 (2023) - 2022
- [c51]Christoph Haar, Erik Buchmann:
IoT Security With INFINITE: The 3-Dimensional Internet Of Things Maturity Model. IOTSMS 2022: 1-8 - 2021
- [c50]Christoph Haar, Erik Buchmann:
Securing Orchestrated Containers with BSI Module SYS.1.6. ICISSP 2021: 676-683 - [c49]Erik Buchmann, Serda Hauser:
Text Mining for Standardized Quality Criteria of Natural-Language IT-Requirements. RE 2021: 390-395
2010 – 2019
- 2019
- [j19]Erik Buchmann, Susanne Eichhorn:
Auskunftsersuchen nach Art. 15 DSGVO. Datenschutz und Datensicherheit 43(2): 65-70 (2019) - [c48]Marcin Robak, Erik Buchmann:
How to Extract Workflow Privacy Patterns from Legal Documents. AITM/ISM@FedCSIS 2019: 214-234 - [c47]Christoph Haar, Erik Buchmann:
Fane: A Firewall Appliance For The Smart Home. FedCSIS 2019: 449-458 - [c46]Marcin Robak, Erik Buchmann:
Deriving Workflow Privacy Patterns from Legal Documents. FedCSIS 2019: 555-563 - [c45]Christoph Haar, Erik Buchmann:
IT-Grundschutz für die Container-Virtualisierung mit dem neuen BSI-Baustein SYS 1.6. GI-Jahrestagung 2019: 479-492 - [c44]Erik Buchmann, Franziska Plate:
Ende-zu-Ende-Sicherheit für die multimodale Mobilität in einer Smart City. GI-Jahrestagung 2019: 493-506 - 2018
- [c43]Alexandra Janssen, Franziska Plate, Dominik Schneider, Erik Buchmann, Jürgen Anke:
Entwicklung eines Beschreibungsschemas für Workflow Privacy Patterns. MKWI 2018: 357-368 - [c42]Erik Buchmann, Andreas Hartmann, Stephanie Bauer:
Informationssicherheitskonzept nach IT-Grundschutz für Containervirtualisierung in der Cloud. Sicherheit 2018: 235-248 - 2017
- [j18]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to Quantify the Impact of Lossy Transformations on Event Detection. Big Data Res. 9: 84-97 (2017) - [j17]Gregor Hollmig, Matthias Horne, Simon Leimkühler, Frederik Schöll, Carsten Strunk, Adrian Englhardt, Pavel Efros, Erik Buchmann, Klemens Böhm:
An evaluation of combinations of lossy compression and change-detection approaches for time-series data. Inf. Syst. 65: 65-77 (2017) - [c41]Erik Buchmann, Jürgen Anke:
Privacy Patterns in Business Processes. GI-Jahrestagung 2017: 793-798 - 2016
- [b2]Erik Buchmann:
Privacy-aware and reliable sensor-data management. Karlsruhe University, Germany, 2016 - [j16]Johann-Christoph Freytag, Erik Buchmann, Theo Härder:
Editorial. Datenbank-Spektrum 16(2): 103-106 (2016) - [j15]Christopher Oßner, Erik Buchmann, Klemens Böhm:
Identifying defective nodes in wireless sensor networks. Distributed Parallel Databases 34(4): 591-610 (2016) - [c40]Karl Lorey, Erik Buchmann, Klemens Böhm:
TEAL: Transparent Encryption for the Database Abstraction Layer. CAiSE Forum 2016: 145-152 - [c39]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Towards provable privacy guarantees using rechargeable energy-storage devices. e-Energy 2016: 7:1-7:14 - 2015
- [j14]Erik Buchmann:
Wie kann man Privatheit messen? Datenschutz und Datensicherheit 39(8): 510-514 (2015) - [j13]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Individual privacy constraints on time-series data. Inf. Syst. 54: 74-91 (2015) - [j12]Erik Buchmann, Patrick Erik Bradley, Klemens Böhm:
Deriving Bounds on the Size of Spatial Areas. Open J. Databases 2(1): 1-16 (2015) - [j11]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Martin Spoo:
Efficient and secure exact-match queries in outsourced databases. World Wide Web 18(3): 567-605 (2015) - [c38]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to quantify the impact of lossy transformations on change detection. SSDBM 2015: 17:1-17:11 - [c37]Stephan Kessler, Erik Buchmann, Klemens Böhm:
Deploying and Evaluating Pufferfish Privacy for Smart Meter Data. UIC/ATC/ScalCom 2015: 229-238 - 2014
- [j10]Stephan Kessler, Erik Buchmann, Thorben Burghardt, Klemens Böhm:
Pattern-sensitive Time-series Anonymization and its Application to Energy-Consumption Data. Open J. Inf. Syst. 1(1): 3-22 (2014) - [c36]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Kai Richter:
FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing - Exploratory Paper. CAiSE 2014: 120-135 - [c35]Pavel Efros, Erik Buchmann, Klemens Böhm:
FRESCO: A Framework to Estimate the Energy Consumption of Computers. CBI (1) 2014: 199-206 - 2013
- [j9]Erik Buchmann, Klemens Böhm, Thorben Burghardt, Stephan Kessler:
Re-identification of Smart Meter data. Pers. Ubiquitous Comput. 17(4): 653-662 (2013) - [c34]Shawn Merrill, Nilgun Basalp, Joachim Biskup, Erik Buchmann, Chris Clifton, Bart Kuijpers, Walied Othman, Erkay Savas:
Privacy through Uncertainty in Location-Based Services. MDM (2) 2013: 67-72 - [c33]Erik Buchmann, Stephan Kessler, Patrick Jochem, Klemens Böhm:
The Costs of Privacy in Local Energy Markets. CBI 2013: 198-207 - 2011
- [j8]Erik Buchmann, Nesime Tatbul, Mario A. Nascimento:
Query processing in sensor networks. Distributed Parallel Databases 29(1-2): 1-2 (2011) - 2010
- [j7]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling:
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc Sens. Wirel. Networks 9(1-2): 85-107 (2010) - [j6]Markus Bestehorn, Christian von der Weth, Erik Buchmann, Klemens Böhm:
Fault-tolerant query processing in structured P2P-systems. Distributed Parallel Databases 28(1): 33-66 (2010) - [j5]Carsten Orwat, Oliver Raabe, Erik Buchmann, Arun Anandasivam, Johann Christoph Freytag, Natali Helberger, Kei Ishii, Bernd Lutterbeck, Dirk Neumann, Thomas Otter:
Software als Institution und ihre Gestaltbarkeit. Inform. Spektrum 33(6): 626-633 (2010) - [j4]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Impact assessment in public policy: Towards a Web 2.0 application. Inf. Polity 15(1-2): 33-50 (2010) - [c32]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm:
Finding misplaced items in retail by clustering RFID data. EDBT 2010: 501-512 - [c31]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Collaborative data privacy for the web. EDBT/ICDT Workshops 2010 - [c30]Clemens Heidinger, Erik Buchmann, Matthias Huber, Klemens Böhm, Jörn Müller-Quade:
Privacy-Aware Folksonomies. ECDL 2010: 156-167 - [c29]Markus Bestehorn, Klemens Böhm, Erik Buchmann, Stephan Kessler:
Energy-efficient processing of spatio-temporal queries in wireless sensor networks. GIS 2010: 340-349 - [c28]Erik Buchmann:
Data Privacy in Novel Ubiquitous Computing Applications. KIT-Nachwuchswissenschaftler-Symposium 2010: 79-86 - [c27]Mirco Stern, Klemens Böhm, Erik Buchmann:
Processing continuous join queries in sensor networks: a filtering approach. SIGMOD Conference 2010: 267-278 - [c26]Markus Bestehorn, Klemens Böhm, Patrick Erik Bradley, Erik Buchmann:
Deriving Spatio-temporal Query Results in Sensor Networks. SSDBM 2010: 6-23 - [c25]Thorben Burghardt, Erik Buchmann, Klemens Böhm, Jürgen Kühling, S. Bohnen, Anastasios Sivridis:
Tackling Compliance Deficits of Data-Protection Law with User Collaboration - A Feasibility Demonstration with Human Participants. CEC 2010: 120-127 - [e1]Takahiro Hara, Vladimir Zadorozhny, Erik Buchmann:
Wireless Sensor Network Technologies for the Information Explosion Era. Studies in Computational Intelligence 278, Springer 2010, ISBN 978-3-642-13964-2 [contents]
2000 – 2009
- 2009
- [j3]Mirco Stern, Erik Buchmann, Klemens Böhm:
A Wavelet Transform for Efficient Consolidation of Sensor Relations with Quality Guarantees. Proc. VLDB Endow. 2(1): 157-168 (2009) - [c24]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Towards collaborative web-based impact assessment. D.GO 2009: 190-198 - [c23]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Fabian Hueske, Klemens Böhm:
Towards materialized view selection for distributed databases. EDBT 2009: 1088-1099 - [c22]Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, Anastasios Sivridis:
A Study on the Lack of Enforcement of Data Protection Acts. e-Democracy 2009: 3-12 - [c21]Mirco Stern, Erik Buchmann, Klemens Böhm:
Towards Efficient Processing of General-Purpose Joins in Sensor Networks. ICDE 2009: 126-137 - [c20]Thorben Burghardt, Erik Buchmann, Jens Müller, Klemens Böhm:
Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services. OTM Conferences (1) 2009: 304-321 - 2008
- [c19]Zinaida Benenson, Markus Bestehorn, Erik Buchmann, Felix C. Freiling, Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. ADHOC-NOW 2008: 279-292 - [c18]Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton:
Collaborative Search and User Privacy: How Can They Be Reconciled?. CollaborateCom 2008: 85-99 - [c17]Thorben Burghardt, Andreas Walter, Erik Buchmann, Klemens Böhm:
PRIMO - Towards Privacy Aware Image Sharing. Web Intelligence/IAT Workshops 2008: 21-24 - [c16]Hagen Höpfner, Erik Buchmann:
Towards Compact Operator Trees for Query Indexing. ICSOFT (ISDM/ABF) 2008: 174-179 - [c15]Erik Buchmann, Klemens Böhm, Oliver Raabe:
Privacy2.0: Towards Collaborative Data-Privacy Protection. IFIPTM 2008: 247-262 - [c14]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm:
Tagmark: reliable estimations of RFID tags for business processes. KDD 2008: 999-1007 - [c13]Thorben Burghardt, Erik Buchmann, Klemens Böhm:
Discovering the Scope of Privacy Needs in Collaborative Search. Web Intelligence 2008: 910-913 - 2007
- [j2]Klemens Böhm, Erik Buchmann:
Free riding-aware forwarding in Content-Addressable Networks. VLDB J. 16(4): 463-482 (2007) - [c12]Erik Buchmann:
Trust Mechanisms and Reputation Systems. Algorithms for Sensor and Ad Hoc Networks 2007: 325-336 - 2006
- [b1]Erik Buchmann:
Erkennung und Vermeidung von unkooperativem Verhalten in Peer-to-Peer-Datenstrukturen. Otto-von-Guericke University Magdeburg, Germany, 2006, pp. I-VI, 1-159 - [c11]Erik Buchmann, Klemens Böhm, Christian von der Weth:
Towards Truthful Feedback in P2P Data Structures. OTM Conferences (1) 2006: 498-515 - [p2]Jens Nimis, Peter C. Lockemann, Karl-Heinz Krempels, Erik Buchmann, Klemens Böhm:
Towards Dependable Agent Systems. Multiagent Engineering 2006: 465-501 - [p1]Erik Buchmann:
Erkennung und Vermeidung von unkooperativem Verhalten in Peer-to-Peer-Datenstrukturen. Ausgezeichnete Informatikdissertationen 2006: 19-28 - 2005
- [j1]Sven Apel, Erik Buchmann:
Biology-Inspired Optimizations of Peer-to-Peer Overlay Networks. Prax. Inf.verarb. Kommun. 28(4): 199-205 (2005) - [c10]Erik Buchmann, Klemens Böhm:
Efficient Evaluation of Nearest-Neighbor Queries in Content-Addressable Networks. From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments 2005: 31-40 - [c9]Philipp Rösch, Christian von der Weth, Kai-Uwe Sattler, Erik Buchmann:
Verteilte Anfrageverarbeitung in DHT-basierten P2P-Systemen. BTW 2005: 165-174 - [c8]Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann:
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. CNSR 2005: 319-326 - [c7]Philipp Rösch, Kai-Uwe Sattler, Christian von der Weth, Erik Buchmann:
Best Effort Query Processing in DHT-based P2P Systems. ICDE Workshops 2005: 1186 - [c6]Erik Buchmann, Sven Apel, Gunter Saake:
Piggyback Meta-Data Propagation in Distributed Hash Tables. WEBIST 2005: 72-81 - 2004
- [c5]Erik Buchmann, Klemens Böhm:
FairNet - How to Counter Free Riding in Peer-to-Peer Data Structures. CoopIS/DOA/ODBASE (1) 2004: 337-354 - [c4]Erik Buchmann, Klemens Böhm:
How to Run Experiments with Large Peer-to-Peer Data Structure. IPDPS 2004 - 2003
- [c3]Erik Buchmann, Klemens Böhm:
Effizientes Routing in verteilten skalierbaren Datenstrukturen. BTW 2003: 334-343 - 2002
- [c2]Erik Buchmann, Hagen Höpfner, Kai-Uwe Sattler:
An Extensible Storage Manager for Mobile DBMS. BalticDB&IS 2002: 103-116 - [c1]Erik Buchmann:
Konzeption eines erweiterbaren Speichermanagers für leichtgewichtige, mobile DBMS. Grundlagen von Datenbanken 2002
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint