Cited By
View all- Kolenbrander JHusmann EHenshaw CRheault EBoswell MMichaels A(2024)Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy ExperimentationJournal of Cybersecurity and Privacy10.3390/jcp40300264:3(546-571)Online publication date: 11-Aug-2024
- Denecke KReichenpfader DWilli DKennel KBonel HNairz KCihoric NPapaux Dvon Tengg-Kobligk H(2024)Person-based design and evaluation of MIA, a digital medical interview assistant for radiologyFrontiers in Artificial Intelligence10.3389/frai.2024.14311567Online publication date: 16-Aug-2024
- Javed YSajid A(2024)A Systematic Review of Privacy Policy LiteratureACM Computing Surveys10.1145/369839357:2(1-43)Online publication date: 1-Oct-2024
- Show More Cited By