Lothar Fritsch

Associate Professor - Digital Security
Image of Lothar Fritsch
Norwegian version of this page
Mobile phone +47 96885758
Username
Visiting address Gaustadalléen 23B 0373 Oslo
Postal address Postboks 1080 Blindern 0316 Oslo

I'm an associae professor in information security. My research focuses on Privacy enhancing technologies, PET, data protection, cryptography, PKI, mobile signatures, mobile computing, mobile communications, m-commerce, e-commerce, location-based services, context-aware computing. In my academic teaching I focus on cyber security, identity management, information privacy and on topics in security and privacy maagement. 

Tags: Information security, information privacy, cyber security, computer security

Publications

My publications are regisered in several non-synchronized national databases - therefore my Cristin-record is not showing the full publication list. A more complete overview can be found on DBLP and Google Scholar, while my recent publications with my Swedish affiliation are registered in DIVA.

 

You can follow me on LinkedIn where I frequently post on the topics of information privacy and cybersecurity.

 

  • Wairimu, Samuel; Iwaya, Leonardo Horn; Fritsch, Lothar & Lindskog, Stefan (2024). On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review. IEEE Access. ISSN 2169-3536. 12, p. 19625–19650. doi: 10.1109/ACCESS.2024.3360864.
  • Iwaya, Leonardo Horn; Nordin, Anna; Fritsch, Lothar; Børøsund, Elin; Johansson, Margareta & Varsi, Cecilie [Show all 7 contributors for this article] (2023). Early Labour App: Developing a practice-based mobile health application for digital early labour support. International Journal of Medical Informatics. ISSN 1386-5056. 177. doi: 10.1016/j.ijmedinf.2023.105139. Full text in Research Archive
  • Fritsch, Lothar (2023). Electronic identity mass compromize: Options for recovery. In Roßnagel, Heiko; Schunk, Christian H. & Günther, Jochen (Ed.), Open Identity Summit 2023. Gesellschaft für Informatik. ISSN 978-3-88579-729-6. p. 141–146. doi: 10.18420/OID2023_13.
  • Fritsch, Lothar; Alzarqawee, Aws Naser Jaber & Yazidi, Anis (2023). An overview of artificial intelligence used in malware. In Zouganeli, Evi; Yazidi, Anis; Borges Moreno e Mello, Gustavo & Lind, Pedro (Ed.), Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, Norway, May 31-June 1, 2022, Revised Selected Papers. Springer Nature. ISSN 9783031170294.
  • Alzarqawee, Aws Naser Jaber & Fritsch, Lothar (2023). Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators. In Leonard, Barolli (Eds.), Advances on P2P, Parallel, Grid, Cloud and Internet Computing Proceedings of the 17th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2022). Springer. ISSN 978-3-031-19945-5. p. 249–257. doi: https:/doi.org/10.1007/978-3-031-19945-5_25.
  • Wairimu, Samuel & Fritsch, Lothar (2022). Modelling privacy harms of compromised personal medical data - beyond data breach, ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM). ISSN 978-1-4503-9670-7. p. 1–9. doi: 10.1145/3538969.3544462.
  • Fritsch, Lothar; Mecaliff, Marie; Opdal, Kathinka; Rundgreen, Mathias & Sachse, Toril S. (2022). Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks. In Roßnagel, Heiko; Schunk, Christian H. & Mödersheim, Sebastian (Ed.), Open Identity Summit 2022, LNI Volume P325. Gesellschaft für Informatik. ISSN 978-3-88579-719-7. p. 15–26. doi: 10.18420/OID2022_01.
  • Naser Jaber, Aws; Fritsch, Lothar & Haugerud, Hårek (2022). Improving Phishing Detection with the Grey Wolf Optimizer , 2022 International Conference on Electronics, Information, and Communication (ICEIC 2022) . IEEE (Institute of Electrical and Electronics Engineers). ISSN 9781665409353. doi: 10.1109/ICEIC54506.2022.9748592.
  • Nordin, Anna; Ängeby, Karin & Fritsch, Lothar (2022). Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management. In Ur Rehman, Masood & Zoha, Ahmed (Ed.), Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. Springer. ISSN 978-3-030-95592-2. p. 168–175. doi: https:/doi.org/10.1007/978-3-030-95593-9_14.
  • Alzarqawee, Aws Naser Jaber & Fritsch, Lothar (2021). COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks. In Jiamset, Keerapat; Kamolphiwong, Sinchai; Pongbangpho, Supakorn & Cheawsuwan, Thitirath (Ed.), 25th International Computer Science and Engineering Conference (ICSEC). IEEE (Institute of Electrical and Electronics Engineers). ISSN 978-1-6654-1197-4. p. 434–442. doi: 10.1109/ICSEC53205.2021.9684603.
  • Bisztray, Tamas; Gruschka, Nils; Bourlai, Thirimachos & Fritsch, Lothar (2021). Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks. In Brömme, Arslan; Busch, Christoph; Damer, Naser; Dantcheva, Antitza; Gomez-Barrero, Marta; Raja, Kiran; Rathgeb, Christian; Sequeira, Ana F. & Uhl, Andreas (Ed.), Proceedings of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG2021). Gesellschaft für Informatik. ISSN 978-1-6654-2693-0. p. 81–90.
  • Zibuschka, Jan & Fritsch, Lothar (2021). Mapping Identity Management in Data Lakes. In Roßnagel, Heiko; Schunk, Christian & Mödersheim, Sebastian (Ed.), Open Identity Summit 2021 Proceedings. Gesellschaft für Informatik. ISSN 978-3-88579-706-7.
  • Fritsch, Lothar & Gruschka, Nils (2021). Extraction and Accumulation of Identity Attributes from the Internet of Things. In Roßnagel, Heiko; Schunk, Christian & Mödersheim, Sebastian (Ed.), Open Identity Summit 2021 Proceedings. Gesellschaft für Informatik. ISSN 978-3-88579-706-7. Full text in Research Archive
  • Hatamian, Majid; Wairimu, Samuel; Momen, Nurul & Fritsch, Lothar (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering. ISSN 1382-3256. 26. doi: 10.1007/s10664-020-09934-4.
  • Bisztray, Tamas; Gruschka, Nils; Mavroeidis, Vasileios & Fritsch, Lothar (2020). Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. In Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian & Hühnlein, Detlef (Ed.), Open Identity Summit 2020. Gesellschaft für Informatik. ISSN 978-3-88579-699-2. p. 185–192. doi: 10.18420/ois2020_17.
  • Momen, Nurul & Fritsch, Lothar (2020). App-generated digital identities extracted through Android permission-based data access - a survey of app privacy, Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Springer Berlin/Heidelberg. ISSN 978-3-88579-695-4. p. 15–28. doi: 10.18420/sicherheit2020_01.
  • Momen, Nurul; Hatamian, Majid & Fritsch, Lothar (2019). Did App Privacy Improve After the GDPR? IEEE Security and Privacy. ISSN 1540-7993. doi: 10.1109/MSEC.2019.2938445.
  • Fritsch, Lothar (2018). How Big Data helps SDN with data protection and privacy. In Taheri, Javid (Eds.), Big Data and Software Defined Networks. The Institution of Engineering and Technology. ISSN 978-1-78561-304-3. p. 339–351.
  • Schulz, Trenton & Fritsch, Lothar (2014). Accessibility and Inclusion Requirements for Future e-Identity Solutions. In Miesenberger, Klaus; Fels, Deborah; Archambault, Dominique; Peňáz, Petr & Zagler, Wolfgang (Ed.), Computers Helping People with Special Needs - Proceedings of the 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014; Bind 2. Springer Lecture Notes on Computer Science (LNCS) 8648. Springer. ISSN 978-3-319-08598-2. p. 316–323. doi: 10.1007/978-3-319-08596-8_50.
  • Schulz, Trenton & Fritsch, Lothar (2013). Identifying Trust Strategies in the Internet of Things. In Schulz, Trenton (Eds.), Proceedings of the User-Centered Trust in Interactive Systems Workshop: a Workshop from NordiCHI 2012. Norwegian Computing Center. ISSN 978-82-539-0538-9. p. 19–23.
  • Paintsil, Ebenezer & Fritsch, Lothar (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. In Furnell, Steven; Lambrinoudakis, Costas & Lopez, Javier (Ed.), Trust, Privacy, and Security in Digital Business. Springer. ISSN 978-3-642-40342-2. p. 48–61. doi: 10.1007/978-3-642-40343-9_5.
  • Røssvoll, Till Halbach & Fritsch, Lothar (2013). Trustworthy and Inclusive Identity Management for Applications in Social Media. In Kurosu, Masaaki (Eds.), Human-Computer Interaction. Users and Contexts of Use. Springer. ISSN 978-3-642-39264-1. p. 68–77. doi: 10.1007/978-3-642-39265-8_8.
  • Røssvoll, Till Halbach & Fritsch, Lothar (2013). Reducing the User Burden of Identity Management: A Prototype Based Case Study for a Social-Media Payment Application. In Miller, Leslie (Eds.), ACHI 2013, The Sixth International Conference on Advances in Computer-Human Interactions. IARIA. ISSN 978-1-61208-250-9. p. 364–370.
  • Paintsil, Ebenezer & Fritsch, Lothar (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems. In Fischer-Hübner, Simone; Leeuw, Elisabeth de & Mitchell, Chris (Ed.), Policies and Research in Identity Management. Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer. ISSN 978-3-642-37282-7. p. 97–99. doi: 10.1007/978-3-642-37282-7_8.
  • Zibuschka, Jan & Fritsch, Lothar (2012). A hybrid approach for highly available & secure storage of pseudo-SSO credentials. In Jøsang, Audun & Carlsson, Bengt (Ed.), Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings. Springer. ISSN 978-3-642-34209-7. p. 169–183. doi: 10.1007/978-3-642-34210-3_12.
  • Kohlweiss, Markulf & Fritsch, Lothar (2012). Privatsphäre trotz intelligenter Zähler. digma - Zeitschrift für Datenrecht und Informationssicherheit. ISSN 1424-9944. 12(1), p. 22–26.
  • Fritsch, Lothar; Groven, Arne-Kristian & Schulz, Trenton (2012). On the Internet of Things, Trust is Relative. Communications in Computer and Information Science (CCIS). ISSN 1865-0929. 277, p. 267–273. doi: 10.1007/978-3-642-31479-7_46.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). Taxonomy of Privacy and Security Risks Contributing Factors. In Fischer-Hübner, Simone; Duquenoy, Penny; Hansen, Marit; Leenes, Ronald & Zhang, Ge (Ed.), Privacy and Identity Management for Life. 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. Springer. ISSN 9783642207686. p. 52–63.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). A Taxonomy of Privacy and Security Risks Contributing Factors. IFIP Advances in Information and Communication Technology. ISSN 1868-4238. 352, p. 52–63. doi: 10.1007/978-3-642-20769-3_5.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). Towards Legal Privacy Risk Assessment Automation in Social Media, INFORMATIK 2011 - Informatik schafft Communities. Gesellschaft für Informatik. ISSN 978-3-88579-286-4.
  • Fritsch, Lothar (2011). Security and privacy engineering for corporate use of social community platforms, INFORMATIK 2011 - Informatik schafft Communities. Gesellschaft für Informatik. ISSN 978-3-88579-286-4.
  • Scherner, Tobias & Fritsch, Lothar (2011). Technology Assurance, Digital Privacy. Springer. ISSN 978-3-642-19049-0. p. 597–608.
  • Solheim, Ivar; Dale, Øystein; Fritsch, Lothar; Røssvoll, Till Halbach; Holmqvist, Knut & Tjøstheim, Ingvar (2010). Search and navigation as retrieval strategies in large photo collections. In Doherty, Aiden R.; Gurrin, Cathal; Jones, Gareth J.F. & Smeaton, Alan F. (Ed.), Proceedings of the Information Access for Personal Media Archives Workshop (IAPMA2010). Milton Keynes. ISSN 1872327869.
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 6264, p. 129–140.
  • Fritsch, Lothar; Fuglerud, Kristin Skeide & Solheim, Ivar (2010). Towards Inclusive Identity Management. Identity in the Information Society. ISSN 1876-0678. 3(3), p. 515–538. doi: 10.1007/s12394-010-0075-6. Full text in Research Archive
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing. In Katsikas, Sokratis K.; Lopez, Javier & Soriano, Miguel (Ed.), TrustBus, Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, Lecture Notes in Computer Science 6264. Springer. ISSN 978-3-642-15151-4.
  • Fritsch, Lothar (2009). Business risks from naive use of RFID in tracking, tracing and logistics. In Wissendheit, U & Hollstein, T (Ed.), RFID SysTech 2009 - ITG Fachbericht 216. VDE Verlag GmbH. ISSN 978-3-8007-3168-8.
  • Fritsch, Lothar; Groven, Arne-Kristian & Strand, Lars Kristoffer (2009). A holistic approach to Open-Source VoIP security: Preliminary results from the EUX2010SEC project. In Bestak, Robert; Laurent, George; Zaborovsky, Vladimir S. & Dini, Cosmin (Ed.), Proceedings of the The Eighth International Conference on Networks (ICN) 2009. International Academy, Research and Industry Association (IARIA). ISSN 978-0-7695-3552-4. p. 275–280 .
  • Fritsch, Lothar; Groven, Arne-Kristian; Strand, Lars Kristoffer; Leister, Wolfgang & Hagalisletto, Anders Moen (2009). A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project. International journal on advances in security. ISSN 1942-2636. 2(2&3), p. 129–141.
  • Fritsch, Lothar & Abie, Habtamu (2008). Towards a Research Road Map for the Management of Privacy Risks in Information Systems. In Alkassar, Ammar & Siekmann, Jörg (Ed.), Lecture Notes in Informatics. Bonner Köllen Verlag. ISSN 978-3-88579-222-2.
  • Fritsch, Lothar (2007). Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering. Journal of Theoretical and Applied Electronic Commerce Research. ISSN 0718-1876. 2,3.

View all works in Cristin

  • Fritsch, Lothar; Hassan, Ismail & Paintsil, Ebenezer (2023). Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings . Springer. ISBN 978-3-031-47747-8. 352 p.
  • de Leeuw, Elisabeth; Fischer-Hübner, Simone & Fritsch, Lothar (2010). Second IFIP WG 11.6 Working Conference, IDMAN 2010. Springer. ISBN 978-3-642-17302-8. 145 p.
  • Fritsch, Lothar (2009). Privatsphäre per Design - Privatsphäre respektierende Infrastrukturen für verteilte Mehrparteien-Geschäftsmodelle und Dienste. Lothar Fritsch, Oslo. ISBN 9788249703098. 104 p.
  • Fritsch, Lothar (2008). Profiling and Location-Based Services, In: Hildebrandt, Mireille; Gutwirth, Serge (Eds.): Profiling the European Citizen - Cross-Disciplinary Perspectives. Springer.

View all works in Cristin

  • Salbu, Magnus; Fritsch, Lothar; Jøsang, Audun; Haugstveit, Geir; Holmen, Emil & Hoel, Odmund [Show all 7 contributors for this article] (2023). Kritisk til bakgrunnssjekker: Kan føre til diskriminering. [Newspaper]. Universitas.
  • Øye, Olav-Johan & Fritsch, Lothar (2022). Slik kan du unngå dataangrep . [Business/trade/industry journal]. Forskning.no.
  • Ellen Synnøve, Viseth; Fritsch, Lothar & Marques, Nuno (2022). Anklager NSM for å senke terskelen for diskriminering mot russere . [Business/trade/industry journal]. Teknisk Ukeblad.
  • Fritsch, Lothar & Julie, Solvin Jacobsen (2022). Hva er hacking? Viten + Snakkis podcast @ OsloMet. [Internet]. Vitenogsnakkis.oslomet.no.
  • Hegnar, Emma Victoria; Brustad, Emilie & Fritsch, Lothar (2022). Ekspert om hackerangrepet: - Kan ha vært en avledningsmanøver. [Newspaper]. Dagbladet.
  • Fritsch, Lothar (2021). Battlefield of cyber weapons - The future war of connected smart things and algorithms.
  • Fritsch, Lothar (2021). Perspectives on Source Protection - Privacy risk .
  • Tilman, Baumgärtel & Fritsch, Lothar (2021). Piazza virtuale ion the Internet - Interview with Lothar Fritsch, 18.03.2019. [Internet]. https://vangoghtv.hs-mainz.de/?portfolio=piazza-virtuale-onl.
  • Zibuschka, Jan & Fritsch, Lothar (2021). Mapping Identity Management in Data Lakes.
  • Fritsch, Lothar; Tjøstheim, Ingvar & Kitkowska, Agnieszka (2018). I’m Not That Old Yet! The Elderly and Us in HCI and Assistive Technology.
  • Fritsch, Lothar (2015). Information privacy: Technology, principles, and challenges .
  • Fritsch, Lothar (2014). Management of Privacy Risks in Information Systems.
  • Fritsch, Lothar (2014). Big Data - implications for corporate strategy and security.
  • Fritsch, Lothar (2014). Research innovations for electronic identities: Privacy and Security.
  • Fritsch, Lothar (2014). E-ID, Sosiale Medier,industristandarder- nytteverdi og risiko. Innføring i populære e-ID-systemer.
  • Fritsch, Lothar (2014). The metered self vs. managed healthcare IoT - a reality check.
  • Fritsch, Lothar (2014). Helsedata, e-helse, IKT og personvern - hvor oppstår og lagres det helsedata? Health data, e-health, ICT and privacy - where is health data created, and where is it kept?
  • Grønli, Kristen Straumsheim; Hellman, Riitta; Fuglerud, Kristin Skeide & Fritsch, Lothar (2014). Snart kan passordene bestå av lyder, bilder og mønster - Norske forskere vil gjøre nett-tjenester tilgjengelig for alle. [Internet]. Teknisk Ukeblad.
  • Grønli, Kristin Straumsheim; Fritsch, Lothar; Hellman, Riitta & Fuglerud, Kristin Skeide (2014). Utestengt fra nettjenester. [Internet]. Forsnkningsrådet.no.
  • Fritsch, Lothar; Grønli, Kristen Straumsheim & Snekkenes, Einar (2014). Identifisering uten hamstring av persondata. [Internet]. Forskningsrådet.no.
  • Fritsch, Lothar; Grønli, Christin Straumsheim & Snekkenes, Einar (2014). Vi gir for mye info om oss selv på nett. [Internet]. Forskning.no.
  • Fritsch, Lothar (2013). The Clean Privacy Ecosystem of the Future Internet. Future Internet. ISSN 1999-5903. 5(1), p. 34–45. doi: 10.3390/fi5010034.
  • Schulz, Trenton & Fritsch, Lothar (2012). Identifying Trust Strategies in the Internet of Things.
  • Fritsch, Lothar (2012). Scientific Writing and Publishing - An introduction for new PhD students at NR. A course on writing guidlines, publication channels, and program committees as part of your publication strategy.
  • Roßnagel, Heiko; Camenisch, Jan; Fritsch, Lothar; Houdeau, Detlef; Hühnlein, Detlef & Lehmann, Anja [Show all 8 contributors for this article] (2012). FutureID – Shaping the Future of Electronic Identity.
  • Fritsch, Lothar (2012). Trust and Privacy in the Internet of Things in the User’s View - Keynote talk on "Future Trends and Challenges" track.
  • Fritsch, Lothar (2012). Undesirable side effects: From NFC to IoT.
  • Fritsch, Lothar (2011). Identifisering, Autentisering, Autorisering - Identifisering, Autentisering, Autorisering.
  • Fritsch, Lothar (2011). Motbør for mobilbillett - Intervjuet av Bjørn Egil Halvorsen. Ukjent.
  • Hagalisletto, Anders Moen & Fritsch, Lothar (2011). Mobilnett-kollapsen: Vi må leve med risikoen (kronikk). Ukjent.
  • Fritsch, Lothar (2011). Management of Privacy Risks in Information Systems.
  • Fritsch, Lothar (2011). Privacy and Regulatory Requirements.
  • Fritsch, Lothar (2011). Sikkerhet og Personvern i Sosiale Medier - Utfordringer i bedriftens IKT-strategi.
  • Fritsch, Lothar (2011). Information Security in Social Media - Challenges for Corporate IT strategy.
  • Hagalisletto, Anders Moen & Fritsch, Lothar (2011). Mobilnett-kollapsen: Vi må leve med risikoen. Forskning.no. ISSN 1891-635X.
  • Fritsch, Lothar (2011). Economics of Cybersecurity - Economic perspectives on Information Security.
  • Fritsch, Lothar (2011). Motbør for mobilbillett. [Newspaper]. Aften.
  • Fritsch, Lothar (2011). Eliteskrekk. [Newspaper]. Dagens Næringsliv.
  • Fritsch, Lothar (2011). Identifisering, Autentisering, Autorisering - forskjeller og implikasjoner i e-ID-anvendelser.
  • Skomedal, Åsmund & Fritsch, Lothar (2010). Høringsuttalelse Cybersikkerhet. Ukjent.
  • Fritsch, Lothar (2010). Nettverksbygging og tverrfaglighet med EU ”Network of Excellence”.
  • Fritsch, Lothar (2009). Intervju: GPS-peiling av eldre - utfordringer i sikkerhet og personvern.
  • Fritsch, Lothar (2009). Business security and privacy risk of RFID.
  • Fritsch, Lothar (2009). Inclusive Identity Management.
  • Tjøstheim, Ingvar & Fritsch, Lothar (2009). Doing surveys where it matters - the GPS-age and privacy. How the MR industry can do surveys where the action is and at the same time deal with location data and privacy.
  • Skomedal, Åsmund & Fritsch, Lothar (2008). IT-Governance. IMT4571, part of Master of Science in Information Security program.
  • Fritsch, Lothar (2008). Tools and Methods for Information Privacy.
  • Fritsch, Lothar; Fuglerud, Kristin Skeide & Solheim, Ivar (2008). 1st IDIS workshop 2008.
  • Fritsch, Lothar (2007). Privacy Principals and some business considerations.
  • Fritsch, Lothar; Toresson, Ludwig; Shaker, Maher & Olars, Sebastian (2020). Privacy impact self-assessment app. Karlstads Universitet.
  • Tjøstheim, Ingvar; Leister, Wolfgang; Mork, Heidi Camilla & Fritsch, Lothar (2016). Research Directions for Studying Users’ Privacy Awareness. Norsk Regnesentral.
  • Fritsch, Lothar & Abie, Habtamu (2013). 2nd PETweb II & ASSET joint PhD Seminar. Norsk Regnesentral.
  • Schulz, Trenton; Fritsch, Lothar; Schlehahn, Eva; Hansen, Marit & Zwingelberg, Harald (2013). FutureID Deliverable D22.7 Accessibility and Inclusion Requirements. Norsk Regnesentral.
  • Fritsch, Lothar & Snekkenes, Einar (2013). Alternative Approaches to Privacy Risk Assessment: Summary of the PETweb II VERDIKT project sponsored by the Research Council of Norway (2009-2013). Norsk Regnesentral. ISSN 978-82-539-0539-6. 1(1029).
  • Paintsil, Ebenezer; Fritsch, Lothar & Snekkenes, Einar (2013). Privacy and Security Risks Analysis of Identity Management Systems. Gjøvik University College. ISSN 978-82-93269-23-6. 1(1-2013).
  • Fritsch, Lothar (2012). Privacy visualization requirements in the Internet of Things - A uTRUSTit FP7 ICT project note, 7.9.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2012). Documentation of the 3rd PETweb II PhD student workshop - Joint PhD student workshop of the VERDIKT PETweb II and ASSET projects in Gjøvik, 13.9.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2012). Documentation of the 2nd PETweb II PhD student workshop - 2-day PhD student workshop of the VERDIKT PETweb II projects in Rømskog, 19.3.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Utprøving av Buypass e-ID og Altinn.no - Resultat av smartkort-studie i e-Me prosjekt. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Social Media, e-ID and Privacy - Background for the e-Me project. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Social Media, e-ID and Privacy - Background for the e-Me project. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Utprøving av Buypass e-ID og Altinn.no - Resultat av smartkort-studie i e-Me prosjekt. Norsk Regnesentral.
  • Schulz, Trenton; Fritsch, Lothar; Solheim, Ivar; Tjøstheim, Ingvar; Petró, Dániel & Arfwedson, Henrik [Show all 7 contributors for this article] (2011). uTRUSTit Deliverable D2.2 Definition of User Scenarios. Norwegian Computing Center.
  • Fritsch, Lothar & Fuglerud, Kristin Skeide (2010). Time and Usability as Upper Boundary in Friend and Family Security and Privacy. Norsk Regnesentral.
  • Fritsch, Lothar & Paintsil, Ebenezer (2010). 1st PhD retreat documentation - Minutes of the PETweb II PhD workshop, April 15-16, 2010. Norsk Regnesentral.
  • Fritsch, Lothar (2009). PhD recruiting - PETweb II recruitment activities and results. Norsk Regnesentral.
  • Fritsch, Lothar & Groven, Arne-Kristian (2009). VoIP stakeholder profiling: Public stakeholders and infrastructure owners. Norsk Regnesentral.
  • Fuglerud, Kristin Skeide; Reinertsen, Arthur; Fritsch, Lothar & Dale, Øystein (2009). Universell utforming av IKT-baserte løsninger for registrering og autentisering: Resultater fra forprosjekt. Norsk Regnesentral.
  • Holmqvist, Knut; Solheim, Ivar; Fritsch, Lothar; Dale, Øystein & Halbach, Till (2009). Search vs Navigation in Mariage Image Retrieval. Norsk Regnesentral.
  • Naumann, Ingo; Hogben, Giles; Fritsch, Lothar; Benito, Raúl; Dean, Roger & Gould, Jonathon [Show all 15 contributors for this article] (2008). ENISA position paper: Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID).
  • Naumann, Ingo; Hogben, Giles; Fritsch, Lothar; Benito, Raúl; Dean, Roger & Gould, Jonathon [Show all 15 contributors for this article] (2008). Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID) (ENISA position paper).
  • Fretland, Truls; Fritsch, Lothar & Groven, Arne-Kristian (2008). State of the Art of Digital Rights Management - A MARIAGE project report. Norsk Regnesentral. ISSN 978-82-539-0528-0.
  • Benito, Raúl; Dean, Roger; Fritsch, Lothar; Hoepman, Jaap-Henk; Lazar, Steve & Leitold, Herbert [Show all 14 contributors for this article] (2008). Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID). European Network and Information Security Agency.

View all works in Cristin

Published Dec. 2, 2019 2:53 PM - Last modified Dec. 11, 2019 2:11 PM

Research groups