Direkt zum Inhalt


Publikationen

  • Fort, Milan, Freiling, Felix, Penso, Lucia Draque, Benenson, Zinaida und Kesdogan, Dogan (2006). TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
    , 4189 Computer Security ? ESORICS 2006. 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings. Springer, Berlin, 34—48.
  • Benenson, Zinaida, Gärtner, Felix und Kesdogan, Dogan (2005). An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks.
     Proceeedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005). IEEE, 158—165.
  • Fritsch, Lothar, Kölsch, Tobias, Kohlweiss, Markulf und Kesdogan, Dogan (2005). Mit IDM und Mittler zu mehr Privatsphäre in LBS.
    , 324 in: Jörg Roth (eds.) Ortsbezogene Anwendungen und Dienste : 2. GI/ITG KuVS Fachgespräch, Stuttgart 2005.06.16-17. FernUniversität, Fachbereich Informatik, Hagen, 58—62.
  • Clauß, Sebastian, Kesdogan, Dogan, Kölsch, Tobias, Pimenidis, L., Schiffner, Stefan und Steinbrecher, Sandra (2005). Privacy Enhanced Identity Management: Design Considerations and Open Problems.
     DIM '05. Proceedings of the 2005 ACM Workshop on Digital Identity Management, Nov. 11, George Mason University, Fairfax, VA, USA. ACM, New York, 84—93.
  • Kölsch, Tobias, Fritsch, Lothar, Kohlweiss, Markulf und Kesdogan, Dogan (2005). Privacy for Profitable Location Based Services.
    , 3450 Security in Pervasive Computing. 2nd Internat. Conf., SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings. Springer, Berlin, 164—178.
  • Benenson, Zinaida, Gärtner, Felix und Kesdogan, Dogan (2005). Secure Multi-Party Computation with Security Modules.
    , P-62 in: Hannes Federrath (eds.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Köllen, Bonn
  • Kesdogan, Dogan und Rattay, O. (2005). Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web (= Security Evaluation of Anonymity Techniques).
    , P-62 in: Hannes Federrath (eds.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Köllen, Bonn
  • Kesdogan, Dogan und Pimenidis, Lexi (2005). The Hitting Set Attack on Anonymity Protocols.
    , 3200 Information Hiding. 6th Internat. Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers. Springer, Berlin, 326—339.
  • Benenson, Zinaida, Gärtner, Felix und Kesdogan, Dogan (2004). User Authentication in Sensor Networks (extended abstract).
    , 50-51 in: Peter Daman (eds.) Informatik 2004 : Informatik verbindet : Beitra?ge der 34. Jahrestagung der Gesellschaft fu?r Informatik e.V. (GI), Ulm, 20. - 24. September 2004. Ges. f. Informatik, Bonn
  • Kesdogan, Dogan, Agrawal, Dakshi und Penz, Stefan (2003). Limits of Anonymity in Open Environments.
    , 2578 Information Hiding. 5th Internat. Workshop, IH 2002 Noordwijkerhout, The Netherlands, Oct. 7-9, 2002 Revised Papers. Springer, Berlin, 53—69.
  • Agrawal, Dakshi und Kesdogan, Dogan (2003). Measuring Anonymity: The Disclosure Attack.
     IEEE security & privacy, 1 (6) IEEE, 27—34.
  • Agrawal, Dakshi, Kesdogan, Dogan und Penz, Stefan (2003). Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
     SP '03 : Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11-14 May 2003, Oakland, CA, USA. IEEE CS Press, Washington, DC, 16—27.
  • Kesdogan, Dogan, Borning, Max und Schmeink, Michael (2003). Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?.
    , 2482 Privacy Enhancing Technologies : 2nd Internat. Worksh., PET 2002, San Francisco, CA, USA, April 14?15, 2002. Revised Papers. Springer, Berlin, 224—238.
  • Borning, Mark, Kesdogan, Dogan und Spaniol, Otto (2001). Anonymität und Unbeobachtbarkeit im Internet (= Anonymity and unobservability in the Internet).
     Information technology : it, 43 (4) Oldenbourg, 254—263.
  • Kesdogan, Dogan, Borning, Mark und Schmeink, Michael (2001). Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW (=Anonymous Surfing on the World Wide Web).
     Verlässliche IT-Systeme : Sicherheit in komplexen IT-Infrastrukturen. Vieweg, Wiesbaden, 37—54.
  • Boursas, Latifa, Bourimi, Mohamed, Hommel, Wolfgang und Kesdogan, Dogan (2001). Enhancing Trust in SOA Based Collaborative Environments.
    , 71 Systems and Virtualization Management. Standards and the Cloud Third International DMTF Academic Alliance Workshop, SVM 2009, Wuhan, China, September 22-23, 2009. Revised Selected Papers. Springer, Berlin, 94—102.
  • Kesdogan, Dogan (2001). Evaluation of Anonymity Providing Techniques using Queuning Theory.
     Proceedings / LCN 2001, 26th Annual IEEE Conference on Local Computer Networks : 14 - 16 November 2001, Tampa, Florida. IEEE CS Press, Los Alamitos, Calif.
  • Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith und Singh, Muninder (2001). How to go Shopping on the World Wide Web without having your Privacy Violated.
     4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA, 529—240.
  • Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith, Singh, Moninder und Spraragen, Susan L. (2001). Personal Information Management and Distribution.
     4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA
  • Borning, Mark und Kesdogan, Dogan (2001). Privacy in E-Commerce.
     International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES).
  • Kesdogan, Dogan (2000). Privacy im Internet : vertrauenswürdige Kommunikation in offenen Umgebungen.
     Braunschweig, Vieweg
  • Kesdogan, Dogan und Schäffter, M. (2000). Übersicht und Bewertung von VPN-Produktlösungen (=Overview and Evaluation of VPN Solutions).
    , 90 7. Workshop Sicherheit in Vernetzten Systemen : 8. und 9. März 2000, Hamburg ( DFN-CERT). Verein zur Förderung eines Deutschen Forschungsnetzes, Berlin
  • Büschkes, Roland, Haustein, Tobias und Kesdogan, Dogan (1999). Active Intrusion Detection - An Approach To Dynamic Risk Management.
     Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec?99).
  • Kesdogan, Dogan und Büschkes, Roland (1999). Klassifizierung von Anonymisierungstechniken (= Classification of Anonymization Techniques).
     Sicherheitsinfrastrukturen : Grundlagen, Realisierungen, rechtliche Aspekte, Anwendungen. Vieweg, Braunschweig, 331—332.
  • Büschkes, Roland und Kesdogan, Dogan (1999). Privacy Enhanced Intrusion Detection.
     Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München
nach oben