The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dogan Kesdogan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Roland Büschkes, Dogan Kesdogan, Peter Reichl
    How to Increase Security in Mobile Networks by Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:3-12 [Conf]
  2. Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
    Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP]
    ARCS Workshops, 2006, pp:56-65 [Conf]
  3. Simon Hoff, Kai Jakobs, Dogan Kesdogan
    Anonymous Mobility Management for Third Generation Mobile Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:72-83 [Conf]
  4. Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba
    Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation (Tools), 1998, pp:105-116 [Conf]
  5. Sebastian Claubeta, Dogan Kesdogan, Tobias Kölsch
    Privacy enhancing identity management: protection against re-identification and profiling. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:84-93 [Conf]
  6. Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen
    Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:295-312 [Conf]
  7. Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:34-48 [Conf]
  8. Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
    User Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2004, pp:385-389 [Conf]
  9. Roland Büschkes, Mark Borning, Dogan Kesdogan
    Transaction-based Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:129-140 [Conf]
  10. Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
    Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:53-69 [Conf]
  11. Dogan Kesdogan, Jan Egner, Roland Büschkes
    Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:83-98 [Conf]
  12. Dogan Kesdogan, Lexi Pimenidis
    The Hitting Set Attack on Anonymity Protocols. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:326-339 [Conf]
  13. Dogan Kesdogan, Andrei Trofimov, Dirk Trossen
    Strategies for Minimizing the Average Cost of Paging on the Air Interface. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1999, pp:488-499 [Conf]
  14. Dogan Kesdogan, Mark Borning, Michael Schmeink
    Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:224-238 [Conf]
  15. Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:39-48 [Conf]
  16. Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
    Secure Multi-Party Computation with Security Modules. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:41-52 [Conf]
  17. Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis
    Identitätsmanagement und das Risiko der Re-Identifikation. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:188-191 [Conf]
  18. Dogan Kesdogan, Oliver Rattay
    Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:233-244 [Conf]
  19. Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
    Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
  20. Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
    Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:86-99 [Conf]
  21. Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
    Privacy for Profitable Location Based Services. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:164-178 [Conf]
  22. Dogan Kesdogan, Charles Palmer
    Technical challenges of network anonymity. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:306-324 [Journal]
  23. Dakshi Agrawal, Dogan Kesdogan
    Measuring Anonymity: The Disclosure Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:27-34 [Journal]

  24. A Combinatorial Approach for an Anonymity Metric. [Citation Graph (, )][DBLP]


  25. Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. [Citation Graph (, )][DBLP]


  26. Breaking Anonymity by Learning a Unique Minimum Hitting Set. [Citation Graph (, )][DBLP]


  27. Cryptographic Protocol Analysis of AN.ON. [Citation Graph (, )][DBLP]


  28. Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. [Citation Graph (, )][DBLP]


  29. Introducing Perfect Forward Secrecy for AN.ON. [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002