|
Search the dblp DataBase
Dogan Kesdogan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Roland Büschkes, Dogan Kesdogan, Peter Reichl
How to Increase Security in Mobile Networks by Anomaly Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:3-12 [Conf]
- Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP] ARCS Workshops, 2006, pp:56-65 [Conf]
- Simon Hoff, Kai Jakobs, Dogan Kesdogan
Anonymous Mobility Management for Third Generation Mobile Networks. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:72-83 [Conf]
- Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba
Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. [Citation Graph (0, 0)][DBLP] Computer Performance Evaluation (Tools), 1998, pp:105-116 [Conf]
- Sebastian Claubeta, Dogan Kesdogan, Tobias Kölsch
Privacy enhancing identity management: protection against re-identification and profiling. [Citation Graph (0, 0)][DBLP] Digital Identity Management, 2005, pp:84-93 [Conf]
- Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:295-312 [Conf]
- Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:34-48 [Conf]
- Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
User Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (2), 2004, pp:385-389 [Conf]
- Roland Büschkes, Mark Borning, Dogan Kesdogan
Transaction-based Anomaly Detection. [Citation Graph (0, 0)][DBLP] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:129-140 [Conf]
- Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:53-69 [Conf]
- Dogan Kesdogan, Jan Egner, Roland Büschkes
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. [Citation Graph (0, 0)][DBLP] Information Hiding, 1998, pp:83-98 [Conf]
- Dogan Kesdogan, Lexi Pimenidis
The Hitting Set Attack on Anonymity Protocols. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:326-339 [Conf]
- Dogan Kesdogan, Andrei Trofimov, Dirk Trossen
Strategies for Minimizing the Average Cost of Paging on the Air Interface. [Citation Graph (0, 0)][DBLP] Kommunikation in Verteilten Systemen, 1999, pp:488-499 [Conf]
- Dogan Kesdogan, Mark Borning, Michael Schmeink
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2002, pp:224-238 [Conf]
- Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:39-48 [Conf]
- Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
Secure Multi-Party Computation with Security Modules. [Citation Graph (0, 0)][DBLP] Sicherheit, 2005, pp:41-52 [Conf]
- Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis
Identitätsmanagement und das Risiko der Re-Identifikation. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:188-191 [Conf]
- Dogan Kesdogan, Oliver Rattay
Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. [Citation Graph (0, 0)][DBLP] Sicherheit, 2005, pp:233-244 [Conf]
- Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
- Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:86-99 [Conf]
- Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
Privacy for Profitable Location Based Services. [Citation Graph (0, 0)][DBLP] SPC, 2005, pp:164-178 [Conf]
- Dogan Kesdogan, Charles Palmer
Technical challenges of network anonymity. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:306-324 [Journal]
- Dakshi Agrawal, Dogan Kesdogan
Measuring Anonymity: The Disclosure Attack. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:6, pp:27-34 [Journal]
A Combinatorial Approach for an Anonymity Metric. [Citation Graph (, )][DBLP]
Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. [Citation Graph (, )][DBLP]
Breaking Anonymity by Learning a Unique Minimum Hitting Set. [Citation Graph (, )][DBLP]
Cryptographic Protocol Analysis of AN.ON. [Citation Graph (, )][DBLP]
Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. [Citation Graph (, )][DBLP]
Introducing Perfect Forward Secrecy for AN.ON. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|