2009 | ||
---|---|---|
28 | Dang Vinh Pham, Dogan Kesdogan: A Combinatorial Approach for an Anonymity Metric. ACISP 2009: 26-43 | |
27 | Mohamed Bourimi, Falk Kühnel, Jörg M. Haake, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan: Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. CRIWG 2009: 110-125 | |
26 | Dogan Kesdogan, Daniel Mölle, Stefan Richter, Peter Rossmanith: Breaking Anonymity by Learning a Unique Minimum Hitting Set. CSR 2009: 299-309 | |
2008 | ||
25 | Dogan Kesdogan, Dang Vinh Pham, Lexi Pimenidis: Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. Sicherheit 2008: 17-30 | |
2006 | ||
24 | Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso: Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 | |
23 | Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan: TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 | |
22 | Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach: Fundamental Limits on the Anonymity Provided by the MIX Technique. IEEE Symposium on Security and Privacy 2006: 86-99 | |
21 | Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis: Identitätsmanagement und das Risiko der Re-Identifikation. Sicherheit 2006: 188-191 | |
20 | Dogan Kesdogan, Charles Palmer: Technical challenges of network anonymity. Computer Communications 29(3): 306-324 (2006) | |
2005 | ||
19 | Sebastian Claubeta, Dogan Kesdogan, Tobias Kölsch: Privacy enhancing identity management: protection against re-identification and profiling. Digital Identity Management 2005: 84-93 | |
18 | Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan: Privacy for Profitable Location Based Services. SPC 2005: 164-178 | |
17 | Dogan Kesdogan, Oliver Rattay: Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. Sicherheit 2005: 233-244 | |
16 | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 | |
2004 | ||
15 | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389 | |
14 | Dogan Kesdogan, Lexi Pimenidis: The Hitting Set Attack on Anonymity Protocols. Information Hiding 2004: 326-339 | |
2003 | ||
13 | Dakshi Agrawal, Dogan Kesdogan, Stefan Penz: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. IEEE Symposium on Security and Privacy 2003: 16-27 | |
12 | Dakshi Agrawal, Dogan Kesdogan: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6): 27-34 (2003) | |
2002 | ||
11 | Dogan Kesdogan, Dakshi Agrawal, Stefan Penz: Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 | |
10 | Dogan Kesdogan, Mark Borning, Michael Schmeink: Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? Privacy Enhancing Technologies 2002: 224-238 | |
2001 | ||
9 | Mark Borning, Dogan Kesdogan, Otto Spaniol: Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). it+ti - Informationstechnik und Technische Informatik 43(5): 246-253 (2001) | |
1999 | ||
8 | Dogan Kesdogan, Andrei Trofimov, Dirk Trossen: Strategies for Minimizing the Average Cost of Paging on the Air Interface. Kommunikation in Verteilten Systemen 1999: 488-499 | |
7 | Roland Büschkes, Mark Borning, Dogan Kesdogan: Transaction-based Anomaly Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 129-140 | |
1998 | ||
6 | Roland Büschkes, Dogan Kesdogan, Peter Reichl: How to Increase Security in Mobile Networks by Anomaly Detection. ACSAC 1998: 3-12 | |
5 | Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba: Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. Computer Performance Evaluation (Tools) 1998: 105-116 | |
4 | Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. ESORICS 1998: 295-312 | |
3 | Dogan Kesdogan, Jan Egner, Roland Büschkes: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. Information Hiding 1998: 83-98 | |
1996 | ||
2 | Simon Hoff, Kai Jakobs, Dogan Kesdogan: Anonymous Mobility Management for Third Generation Mobile Networks. Communications and Multimedia Security 1996: 72-83 | |
1 | Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 |