| 2009 | ||
|---|---|---|
| 28 | Dang Vinh Pham, Dogan Kesdogan: A Combinatorial Approach for an Anonymity Metric. ACISP 2009: 26-43 | |
| 27 | Mohamed Bourimi, Falk Kühnel, Jörg M. Haake, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan: Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. CRIWG 2009: 110-125 | |
| 26 | Dogan Kesdogan, Daniel Mölle, Stefan Richter, Peter Rossmanith: Breaking Anonymity by Learning a Unique Minimum Hitting Set. CSR 2009: 299-309 | |
| 2008 | ||
| 25 | Dogan Kesdogan, Dang Vinh Pham, Lexi Pimenidis: Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. Sicherheit 2008: 17-30 | |
| 2006 | ||
| 24 | Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso: Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 | |
| 23 | Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan: TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 | |
| 22 | Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach: Fundamental Limits on the Anonymity Provided by the MIX Technique. IEEE Symposium on Security and Privacy 2006: 86-99 | |
| 21 | Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis: Identitätsmanagement und das Risiko der Re-Identifikation. Sicherheit 2006: 188-191 | |
| 20 | Dogan Kesdogan, Charles Palmer: Technical challenges of network anonymity. Computer Communications 29(3): 306-324 (2006) | |
| 2005 | ||
| 19 | Sebastian Claubeta, Dogan Kesdogan, Tobias Kölsch: Privacy enhancing identity management: protection against re-identification and profiling. Digital Identity Management 2005: 84-93 | |
| 18 | Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan: Privacy for Profitable Location Based Services. SPC 2005: 164-178 | |
| 17 | Dogan Kesdogan, Oliver Rattay: Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. Sicherheit 2005: 233-244 | |
| 16 | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 | |
| 2004 | ||
| 15 | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389 | |
| 14 | Dogan Kesdogan, Lexi Pimenidis: The Hitting Set Attack on Anonymity Protocols. Information Hiding 2004: 326-339 | |
| 2003 | ||
| 13 | Dakshi Agrawal, Dogan Kesdogan, Stefan Penz: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. IEEE Symposium on Security and Privacy 2003: 16-27 | |
| 12 | Dakshi Agrawal, Dogan Kesdogan: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6): 27-34 (2003) | |
| 2002 | ||
| 11 | Dogan Kesdogan, Dakshi Agrawal, Stefan Penz: Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 | |
| 10 | Dogan Kesdogan, Mark Borning, Michael Schmeink: Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? Privacy Enhancing Technologies 2002: 224-238 | |
| 2001 | ||
| 9 | Mark Borning, Dogan Kesdogan, Otto Spaniol: Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). it+ti - Informationstechnik und Technische Informatik 43(5): 246-253 (2001) | |
| 1999 | ||
| 8 | Dogan Kesdogan, Andrei Trofimov, Dirk Trossen: Strategies for Minimizing the Average Cost of Paging on the Air Interface. Kommunikation in Verteilten Systemen 1999: 488-499 | |
| 7 | Roland Büschkes, Mark Borning, Dogan Kesdogan: Transaction-based Anomaly Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 129-140 | |
| 1998 | ||
| 6 | Roland Büschkes, Dogan Kesdogan, Peter Reichl: How to Increase Security in Mobile Networks by Anomaly Detection. ACSAC 1998: 3-12 | |
| 5 | Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba: Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. Computer Performance Evaluation (Tools) 1998: 105-116 | |
| 4 | Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. ESORICS 1998: 295-312 | |
| 3 | Dogan Kesdogan, Jan Egner, Roland Büschkes: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. Information Hiding 1998: 83-98 | |
| 1996 | ||
| 2 | Simon Hoff, Kai Jakobs, Dogan Kesdogan: Anonymous Mobility Management for Third Generation Mobile Networks. Communications and Multimedia Security 1996: 72-83 | |
| 1 | Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 | |