Direkt zum Inhalt


Publikationen

  • Fischer, Lars, Kesdogan, Dogan und Dorfer, Laura (2011). Link Globally - Trust Locally.
     Federated Social Web Summit Europe 2011.
  • Ueberschär, Bernd, Schwittek, Widura, Eicker, Stefan, Bourimi, Mohamed, Heupel, Marcel und Kesdogan, Dogan (2011). Mobile applications for the angling community.
     6th World Recreational Fishing Conference (WRFC).
  • Barth, Thomas, Fielenbach, Thomas, Bourimi, Mohamed, Kesdogan, Dogan und Villanueva, Pedro G. (2011). Supporting Distributed Decision Making Using Secure Distributed User Interfaces.
    in: José A. Gallud (eds.) Distributed User Interfaces : Designing Interfaces for the Distributed Ecosystem. Springer London, London, 177—184.
  • Steinmann, S., Mau, G., Bourimi, Mohamed, Schramm-Klein, H. und Kesdogan, Dogan (2011). Tracking Shoppers Behavior At The Point Of Sale By Using End-Users Mobile Devices.
     40. EMAC International Conference, New Technologies and E-Marketing Track.
  • Bourimi, Mohamed, Barth, Thomas, Haake, J. M., Ueberschär, Bernd und Kesdogan, Dogan (2010). AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies.
    , 6409 Human-Centred Software Engineering. Third International Conference, HCSE 2010, Reykjavik, Iceland, October 14-15, 2010. Proceedings. Springer, Berlin, 182—189.
  • Bourimi, Mohamed, Ueberschär, Bernd, Ganglbauer, E., Kesdogan, Dogan, Barth, Thomas, Dax, J. und Heupel, Marcel (2010). Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report.
     International Conference on Information Society (i-Society), London, 28-30 June 2010. IEEE
  • Westermann, Benedikt, Wendolsky, R., Pimenidis, L. und Kesdogan, Dogan (2010). Cryptographic Protocol Analysis of AN.ON.
    , 6052 Financial Cryptography and Data Security. 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers. Springer, Berlin, 114—128.
  • Dax, J., Heupel, Marcel, Bourimi, Mohamed und Kesdogan, Dogan (2010). Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone.
     Sichere Mobilität und Dienstnutzung in künftigen Netzen. 4 . Essener Workshop ? Neue Herausforderungen in der Netzsicherheit ?, 15. /16. April 2010. Abstracts. Univ. Duisburg-Essen, 22—23.
  • Bourimi, Mohamed, Haake, J. M., Heupel, Marcel, Ueberschär, Bernd, Kesdogan, Dogan und Barth, Thomas (2010). Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture.
     International Journal for Infonomics, 3 (4) Infonomics Society, 563—572.
  • Bourimi, Mohamed, Kesdogan, Dogan, Barth, Thomas, Höfke, K. und Abou-Tair, Dhiah (2010). Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy.
     IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, 20-22 Aug. 2010. IEEE
  • Westermann, Benedikt und Kesdogan, Dogan (2010). Introducing Perfect Forward Secrecy for AN.ON.
    , 6164 Networked Services and Applications - Engineering, Control and Management. 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings. Springer, Berlin, 132—142.
  • Pham, Dang Vinh und Kesdogan, Dogan (2009). A Combinatorial Approach for an Anonymity Metric.
    , 5594 Information Security and Privacy. 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Springer, Berlin, 26—43.
  • Camenisch, Jan und Kesdogan, Dogan (2009). iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers.
    , 309 in: Jan Camenisch and Dogan Kesdogan (eds.) Springer, Berlin
  • Bourimi, Mohamed, Kühnel, Falk, Haake, J. M., Abou-Tair, Dhiah und Kesdogan, Dogan (2009). Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems.
    , 5784 Groupware: Design, Implementation, and Use: 15th International Workshop, CRIWG 2009, Peso da Régua, Douro, Portugal, September 13-17, 2009. Proceedings. Springer, Berlin, 100—125.
  • Bourimi, Mohamed, Barth, Thomas, Ueberschär, Bernd und Kesdogan, Dogan (2009). Towards Building User-Centric Privacy-Respecting Collaborative Applications.
    , 53 Intelligent Interactive Assistance and Mobile Multimedia Computing: International Conference, IMC 2009, Rostock-Warnemünde, Germany, November 9-11, 2009. Proceedings. Springer, Berlin, 341—342.
  • Kesdogan, Dogan, Pham, Dang Vinh und Pimenidis, L. (2008). Analyse der Verkettbarkeit in nutzergesteuertem Identitätsmanagement.
     Sicherheit 2008: Tagung der Fachgruppe Sicherheit, Schutz und Zuverlässigkeit in der Gesellschaft für Informatik.
  • Pham, Dang Vinh, Kesdogan, Dogan und Pimenidis, Lexi (2008). Analyse der Verkettbarkeit in nutzergesteuerten Identititätsmanagementsystemen.
    , 128 in: Ammar Alkassar (eds.) Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss. Ges. f. Informatik, Bonn, 17 — 30.
  • Pham, Vinh, Kesdogan, Dogan und Pimenidis, Lexi (2008). Information Disclosure in Identity Management.
     13th Nordic Conference in Secure IT Systems.
  • Kesdogan, Dogan, Pham, Vinh und Pimenidis, L. (2007). Information Disclosure in Identity Management.
     Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007.
  • Kesdogan, Dogan, Agrawal, Dakshi, Pham, Vinh und Rautenbach, Dieter (2006). Fundamental limits on the anonymity provided by the MIX technique.
     Symposium on Security and Privacy, 21-24 May 2006, Berkeley/Oakland, CA, USA. IEEE, 14—99.
  • Clauß, Sebastian, Kesdogan, Dogan, Kölsch, Tobias, Pimenidis, L., Schiffner, Stefan und Steinbrecher, Sandra (2006). Identitätsmanagement und das Risiko der Re-Identifikation.
    , 77 in: Jana Dittmann (eds.) Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006. Ges. f. Informatik, Bonn, 188—191.
  • Kesdogan, Dogan, Kölsch, Tobias und Pimenidis, Lexi (2006). Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis.
    , 23 Quality of Protection. Security Measurements and Metrics. Springer, Berlin, 159—171.
  • Benenson, Zinaida, Freiling, Felix C., Holz, Thorsten, Kesdogan, Dogan und Penso, Lucia Draque (2006). Safety, Liveness, and Information Flow: Dependability Revisited.
    , 81 ARCS '06, 19th International Conference on Architecture of Computing Systems : March 16, 2006, Frankfurt am Main. Workshop proceedings. Ges. f. Informatik, Bonn, 56—65.
  • Kesdogan, Dogan und Palmer, C. (2006). Technical challenges of network anonymity.
     Computer Communications, 29 (3) Elsevier, 306—324.
  • Kesdogan, Dogan und Pimenidis, Lexi (2006). The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach.
    , 23 Quality of Protection. Security Measurements and Metrics. Springer, Berlin, 145—158.
nach oben