Direkt zum Inhalt


Publikationen

  • Fischer, Lars / Dogan Kesdogan / Laura Dorfer  (2011)  Link Globally - Trust Locally
    .
  • Uebersch?r, Bernd / Widura Schwittek / Stefan Eicker / Mohamed Bourimi / Marcel Heupel / Dogan Kesdogan  (2011)  Mobile applications for the angling community
    .
  • Barth, Thomas / Thomas Fielenbach / Mohamed Bourimi / Dogan Kesdogan / Pedro G. Villanueva  (2011)  Supporting Distributed Decision Making Using Secure Distributed User Interfaces
    in: José A. Gallud:Ver?ffentlichungsort: Springer London, Distributed User Interfaces : Designing Interfaces for the Distributed Ecosystem, London. : 177—184.
  • Steinmann, S. / G. Mau / Mohamed Bourimi / H. Schramm-Klein / Dogan Kesdogan  (2011)  Tracking Shoppers Behavior At The Point Of Sale By Using End-Users Mobile Devices
    .
  • Bourimi, Mohamed / Thomas Barth / J. M. Haake / Bernd Uebersch?r / Dogan Kesdogan  (2010)  AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies
    .
  • Bourimi, Mohamed / Bernd Uebersch?r / E. Ganglbauer / Dogan Kesdogan / Thomas Barth / J. Dax / Marcel Heupel  (2010)  Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report
    .
  • Westermann, Benedikt / R. Wendolsky / L. Pimenidis / Dogan Kesdogan  (2010)  Cryptographic Protocol Analysis of AN.ON
    .
  • Dax, J. / Marcel Heupel / Mohamed Bourimi / Dogan Kesdogan  (2010)  Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone
    .
  • Bourimi, Mohamed / J. M. Haake / Marcel Heupel / Bernd Uebersch?r / Dogan Kesdogan / Thomas Barth  (2010)  Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture
    , in: International Journal for Infonomics Bd. 3 Nr. 4: S. 563—572.
  • Bourimi, Mohamed / Dogan Kesdogan / Thomas Barth / K. H?fke / Dhiah Abou-Tair  (2010)  Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy
    .
  • Westermann, Benedikt / Dogan Kesdogan  (2010)  Introducing Perfect Forward Secrecy for AN.ON
    .
  • Pham, Dang Vinh / Dogan Kesdogan  (2009)  A Combinatorial Approach for an Anonymity Metric
    .
  • Camenisch, Jan / Dogan Kesdogan  (2009)  iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers
    in: Jan Camenisch and Dogan Kesdogan:Ver?ffentlichungsort: Springer,, Berlin..
  • Bourimi, Mohamed / Falk Kühnel / J. M. Haake / Dhiah Abou-Tair / Dogan Kesdogan  (2009)  Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems
    .
  • Bourimi, Mohamed / Thomas Barth / Bernd Uebersch?r / Dogan Kesdogan  (2009)  Towards Building User-Centric Privacy-Respecting Collaborative Applications
    .
  • Kesdogan, Dogan / Dang Vinh Pham / L. Pimenidis  (2008)  Analyse der Verkettbarkeit in nutzergesteuertem Identit?tsmanagement
    .
  • Pham, Dang Vinh / Dogan Kesdogan / Lexi Pimenidis  (2008)  Analyse der Verkettbarkeit in nutzergesteuerten Identitit?tsmanagementsystemen
    in: Ammar Alkassar:Ver?ffentlichungsort: Ges. f. Informatik, Sicherheit 2008: Sicherheit, Schutz und Zuverl?ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss, Bonn. : 17 — 30.
  • Pham, Vinh / Dogan Kesdogan / Lexi Pimenidis  (2008)  Information Disclosure in Identity Management
    .
  • Kesdogan, Dogan / Vinh Pham / L. Pimenidis  (2007)  Information Disclosure in Identity Management
    .
  • Kesdogan, Dogan / Dakshi Agrawal / Vinh Pham / Dieter Rautenbach  (2006)  Fundamental limits on the anonymity provided by the MIX technique
    .
  • Clau?, Sebastian / Dogan Kesdogan / Tobias K?lsch / L. Pimenidis / Stefan Schiffner / Sandra Steinbrecher  (2006)  Identit?tsmanagement und das Risiko der Re-Identifikation
    in: Jana Dittmann:Ver?ffentlichungsort: Ges. f. Informatik, Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006, Bonn. : 188—191.
  • Kesdogan, Dogan / Tobias K?lsch / Lexi Pimenidis  (2006)  Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis
    .
  • Benenson, Zinaida / Felix C. Freiling / Thorsten Holz / Dogan Kesdogan / Lucia Draque Penso  (2006)  Safety, Liveness, and Information Flow: Dependability Revisited
    .
  • Kesdogan, Dogan / C. Palmer  (2006)  Technical challenges of network anonymity
    , in: Computer Communications Bd. 29 Nr. 3: S. 306—324.
  • Kesdogan, Dogan / Lexi Pimenidis  (2006)  The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach
    .
nach oben