The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hannes Federrath: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Oliver Berthold, Hannes Federrath, Stefan Köpsell
    Web MIXes: A System for Anonymous and Unobservable Internet Access. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:115-129 [Conf]
  2. Stefan Köpsell, Rolf Wendolsky, Hannes Federrath
    Revocable Anonymity. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:206-220 [Conf]
  3. Hannes Federrath, Stefan Köpsell, Heinrich Langos
    Anonyme und unbeobachtbare Kommunikaton im Internet. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:481-487 [Conf]
  4. Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    MIXes in Mobile Communication Systems: Location Management with Privacy. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:121-135 [Conf]
  5. Jan Zöllner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf
    Modeling the Security of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:344-354 [Conf]
  6. Hannes Federrath, Elke Franz, Anja Jerichow, Jan Müller, Andreas Pfitzmann
    Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:77-91 [Conf]
  7. Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:39-48 [Conf]
  8. Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg
    Individual management of personal reachability in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:164-174 [Conf]
  9. Simone Dimler, Hannes Federrath, Thomas Nowey, Klaus Plößl
    Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung - Eine empirirsche Untersuchung. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:18-21 [Conf]
  10. Klaus Plößl, Hannes Federrath, Thomas Nowey
    Schutzmöglichkeiten gegen Phishing. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:161-164 [Conf]
  11. Thomas Nowey, Hannes Federrath, Christian Klein, Klaus Plößl
    Ansätze zur Evaluierung von Sicherheitsinvestitionen. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:15-26 [Conf]
  12. Hannes Federrath
    Privacy Enhanced Technologies: Methods - Markets - Misuse. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:1-9 [Conf]
  13. Klaus Plößl, Hannes Federrath, Thomas Nowey
    Protection Mechanisms Against Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:20-29 [Conf]
  14. J. Thees, Hannes Federrath
    Methoden zum Schutz von Verkehrsdaten in Funknetzen. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:181-0 [Conf]
  15. Oliver Berthold, Hannes Federrath
    CookieCooker - Cookies tauschen - Profile vermischen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:5, pp:- [Journal]
  16. Hannes Federrath
    Umkodierende Mixe. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:3, pp:- [Journal]
  17. Hannes Federrath, Marit Hansen
    Anonym - total (l)egal? [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:3, pp:- [Journal]
  18. Hannes Federrath, Marit Hansen
    Wer bin ich? [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:5, pp:- [Journal]
  19. Hannes Federrath, Andreas Pfitzmann
    Gliederung und Systematisierung von Schutzzielen in IT-Systemen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:12, pp:- [Journal]
  20. Stefan Köpsell, Hannes Federrath, Marit Hansen
    Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:3, pp:- [Journal]
  21. Katrin Borcea, Hannes Federrath, Olaf Neumann, Alexander Schill
    Entwicklung und Einsatz multimedialer Werkzeuge für die Internet-unterstützte Lehre. [Citation Graph (0, 0)][DBLP]
    Praxis der Informationsverarbeitung und Kommunikation, 2000, v:23, n:3, pp:- [Journal]
  22. Rolf Wendolsky, Dominik Herrmann, Hannes Federrath
    Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:233-253 [Conf]

  23. Collection of Quantitative Data on Security Incidents. [Citation Graph (, )][DBLP]


  24. Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner. [Citation Graph (, )][DBLP]


  25. A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  26. A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. [Citation Graph (, )][DBLP]


  27. Preventing Profile Generation in Vehicular Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002