![]() | 2009 | |
---|---|---|
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Dang Vinh Pham, Dogan Kesdogan: A Combinatorial Approach for an Anonymity Metric. ACISP 2009: 26-43 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Bourimi, Falk Kühnel, Jörg M. Haake, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan: Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. CRIWG 2009: 110-125 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Daniel Mölle, Stefan Richter, Peter Rossmanith: Breaking Anonymity by Learning a Unique Minimum Hitting Set. CSR 2009: 299-309 |
2008 | ||
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Dang Vinh Pham, Lexi Pimenidis: Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. Sicherheit 2008: 17-30 |
2006 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso: Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan: TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach: Fundamental Limits on the Anonymity Provided by the MIX Technique. IEEE Symposium on Security and Privacy 2006: 86-99 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis: Identitätsmanagement und das Risiko der Re-Identifikation. Sicherheit 2006: 188-191 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Charles Palmer: Technical challenges of network anonymity. Computer Communications 29(3): 306-324 (2006) |
2005 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Claubeta, Dogan Kesdogan, Tobias Kölsch: Privacy enhancing identity management: protection against re-identification and profiling. Digital Identity Management 2005: 84-93 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan: Privacy for Profitable Location Based Services. SPC 2005: 164-178 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Oliver Rattay: Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. Sicherheit 2005: 233-244 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 |
2004 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Lexi Pimenidis: The Hitting Set Attack on Anonymity Protocols. Information Hiding 2004: 326-339 |
2003 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Dakshi Agrawal, Dogan Kesdogan, Stefan Penz: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. IEEE Symposium on Security and Privacy 2003: 16-27 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Dakshi Agrawal, Dogan Kesdogan: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6): 27-34 (2003) |
2002 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Dakshi Agrawal, Stefan Penz: Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Mark Borning, Michael Schmeink: Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? Privacy Enhancing Technologies 2002: 224-238 |
2001 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Borning, Dogan Kesdogan, Otto Spaniol: Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). it+ti - Informationstechnik und Technische Informatik 43(5): 246-253 (2001) |
1999 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Andrei Trofimov, Dirk Trossen: Strategies for Minimizing the Average Cost of Paging on the Air Interface. Kommunikation in Verteilten Systemen 1999: 488-499 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Roland Büschkes, Mark Borning, Dogan Kesdogan: Transaction-based Anomaly Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 129-140 |
1998 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Roland Büschkes, Dogan Kesdogan, Peter Reichl: How to Increase Security in Mobile Networks by Anomaly Detection. ACSAC 1998: 3-12 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba: Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. Computer Performance Evaluation (Tools) 1998: 105-116 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. ESORICS 1998: 295-312 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Jan Egner, Roland Büschkes: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. Information Hiding 1998: 83-98 |
1996 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Simon Hoff, Kai Jakobs, Dogan Kesdogan: Anonymous Mobility Management for Third Generation Mobile Networks. Communications and Multimedia Security 1996: 72-83 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 |