ePub Universit?t Regensburg
2023
- M. Wittig, D. Kesdogan: Detecting web tracking at the network layer, IFIP SEC 2023
- A. Aksoy, D. Kesdogan: Effect of Group Based Synchronization on User Anonymity in Mix Networks, TrustBus 2023
- M. Rossberger, D. Kesdogan: Smart Noise Detection for Statistical Disclosure Attacks, NordSec 2023
- M. Wittig, D. Kesdo?an. "Detecting web tracking at the network layer.", 2023
2021
- M. Rossberger, A. Aksoy, D. Kesdogan: How to apply Database Anonymity Notions to Mix Networks, Lecture Notes in Informatics (LNI) Volume P-314, 2021
- C. Roth, L. St?ger, D. Kesdogan: iTLM: Reducing Time in Traffic with Q-learning and Crowd-sourcing. tbd 2021, Springer
- M. Nitschke, C. Roth, C. Hoyer, D. Kesdogan: Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments. Information Systems Security and Privacy 2021, Springer
- C. Roth, M. Ro?berger, C. Schreyer and D. Kesdo?an, "STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities," 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), Gandia, Spain, 2021
- C. Roth, N. T. Dinh, M. Ro?berger and D. Kesdo?an, "DaRoute: Inferring trajectories from zero-permission smartphone sensors," 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 2021
- Roth, C., St?ger, L., Nitschke, M., H?rmann, M., Kesdogan, D. (2021). iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management
2020
- C. Roth, M. Rossberger, C. Schreyer, D. Kesdogan: STRIDE - Secure Traffic Reporting Infrastructure based on Distributed Entities, IEEE Conference on Communications and Network Security 2020 (CNS)
- C. Roth, T.-D. Ngoc, D. Kesdogan: CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS, International Workshop on Data Science Engineering and its Applications (DSEA), 20. Dez. 2020
- C. Roth, M. Sauer, D. Kesdogan: kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example, Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (DETIPS 2020), 18. Sep. 2020
- C. Roth, M. Nitschke, M. H?rmann, D. Kesdogan: iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management. 9th International Conference on Data Science, Technology and Applications (DATA), 7.- 9. Jul. 2020
- M. Nitschke, C. Roth, C. Hoyer, D. Kesdogan: Harmonized Group Mix for ITS. Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP), Mar. 2020, Valetta, Malta
- Nitschke, M., Roth, C., Hoyer, C., Kesdo?an, D.?Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments, ICISSP 2020
2019
- C. Roth et al.: My Smartwatch is Mine - Machine Learning Based Theft Detection of Smartwatches, Secure IT Systems. NordSec 2019, Springer, Cham (2019)
2018
- D. Kesdogan: Quo Vadis Network Anonymity?, 2018 International Conference on Promising Electronic Technologies (ICPET), IEEE, Deir El-Balah, 2018, pp. 74-79.
- C. Roth, D. Kesdogan: A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones, IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA), 17-24 (2018)
- M. Nitschke et al.: MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zones, Secure IT Systems. NordSec 2018, Springer, Cham, Cham (Switzerland) (2018)
- L. Hartmann: Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality of Service, SICHERHEIT 2018, Gesellschaft für Informatik, Bonn (2018)
- L. Hartmann et al.: Wie vertrauenswürdig k?nnen ISPs sein?, Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung, Springer Fachmedien, Wiesbaden (2018)
- D. Kesdogan?? ?(Ed.):?? ?Open?? ?Problems?? ?in?? ?Network?? ?Security,?? ?IFIP?? ?online Ver?ffentlichung, 2018
2017
- V. Pham, D. Kesdogan: Towards a causality based analysis of anonymity protection in indeterministic mix systems, Computers & Security, Vol 67, pp 350 – 368 (June 2017)
- L. Hartmann et al.: Can the ISP be trusted?, Forum Privatheit: Die Fortentwicklung des Datenschutzes, Berlin, 02.-03. Nov. 2017
- C. Roth, L. Hartmann, D. Kesdogan: PARTS – Privacy-Aware Routing with Transportation Subgraphs, Secure IT Systems (NordSec 2017), Springer, Cham (Switzerland) (2017)
2016
- D. Kesdogan et al.: Dynamische Teilrouten zur anonymen Navigation, Location Based Application and Services (LBAS 2016)
- J. Camenisch, D. Kesdogan (Eds.): Open Problems in Network Security, Lecture Notes in Computer Science (LNCS) 9591, Springer-Verlag, 2016
2015
- F. Karatas, L. Fischer, D. Kesdogan: Considering Interdependent Security Objectives in Service Composition, In Science of Computer Programming, vol. 97, 2015, p. 183– 201
- V. Pham, D. Kesdogan: Towards Relations between the Hitting-Set Attack and the Statistical Disclosure Attack, IFIP SEC 2015 (Best Paper Award)
2013
- Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Dogan Kesdogan, Marcel Heupel
An end-user tailorable generic framework for privacy-preserving location-based mobile applications
To appear in International Journal of Applied Mathematics & Information Sciences (AMIS 2013) - Mohamed Bourimi and Dogan Kesdogan
Experiences by using AFFINE for building collaborative applications for online communities
To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013 - Mohamed Bourimi, Dogan Kesdogan, Marcel Heupel, Dhiah el Diehn I. Abou-Tair, Niki Lambropoulos
PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education
To appear in Journal of Universal Computer Science. Special Issue: Interaction Design in Educational Environments (J.UCS 2013) - Marcel Heupel, Mohamed Bourimi, Do?an Kesdo?an
Trust and Privacy in The di.me Userware
To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013 - Marcel Heupel, Simon Scerri, Mohamed Bourimi and Do?an Kesdo?an
Privacy-preserving concepts for supporting recommendations in decentralized OSNs
Proceedings of the 4th International Workshop on Modeling Social Media / in conjuction with ACM Hypertext 2013, Paris, France
Download here - Fatih Karatas, Thomas Barth, Dogan Kesdogan, Habib M. Fardoun, Pedro G. Villanueva
Uso de interface distribuída para avaliar a tomada de decis?o na nuvem
RTI Magazine, January 2013, pp. 82-89. Available online here. - Fatih Karatas, Mohamed Bourimi, Dogan Kesdogan
Towards Visual Configuration Support For Interdependent Security Goals
To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013 - Fatih Karatas, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Sophie Wrobel
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study
To appear in IEEE Xplore as part of the proceeding of: 10th International Conference on Information Technology : New Generations (ITNG 2013) - Fatih Karatas, Dogan Kesdogan
A Flexible Approach For Considering Interdependent Security Objectives in Service Composition
Proceedings of the 28th Symposium on Applied Computing (ACM SAC 2013), pp. 1919-1926. - Philipp Schwarte, Mohamed Bourimi, Marcel Heupel, Dogan Kesdogan, Rafa Gimenez, Sophie Wrobel, Simon Thiel
Multilaterally secure communication anonymity in decentralized social networking
To appear in IEEE Xplore as part of the proceeding of: 10th International Conference on Information Technology : New Generations (ITNG 2013) - Sophie Wrobel, Mohamed Bourimi, Marcel Heupel, Fabian Herrmann, Massimo Valla
Towards a minimal framework considering privacy and data protection goals for social networking platform providers
The Power of Information Conference '13 Extended Abstracts, Brussels (2013)
More information -
F. Karatas, D. Kesdogan: An Approach for Compliance-aware Service Selection with Genetic Algorithms. In Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC 2013). LNCS series, vol. 8274, Springer, Berlin Heidelberg, 2013, pp. 465–473.
-
F. Karatas, M. Bourimi, D. Kesdogan, P. G. Villanueva, H. Fardoun: Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies. In Lozano, M.-D. et al. (eds.): Distributed User Interfaces: Usability and Collaboration. Springer, Berlin Heidelberg, 2013, pp. 119–127.
2012
- Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Dogan Kesdogan, Marcel Heupel
A generic location-based mobile application framework supporting privacy-preserving end-user tailorability
Proceedings of: International Confernce on Future Generation Communication 2012, At London, UK Download Paper - Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, D. Abou-Tair, Fabian Hermann and Simon Thiel
Using distributed user interfaces in collaborative, secure and privacy-preserving software environments
International Journal of Human-Computer Interaction Volume 28, Issue 11, 2012 Download Paper - M. Bourimi, M. Heupel, B. Westermann, D. Kesdogan, R. Gimenez, M. Planagumà, F. Karatas and P. Schwarte
Towards transparent anonymity for user-controlled servers supporting collaborative scenarios
Information Technology: New Generations (ITNG), 2012 Ninth International Conference on. Download paper - Mohamed Bourimi, Simon Scerri, Keith Cortis, Ismael Rivera, Marcel Heupel, and Simon Thiel
Integrating multi-source User Data to enhance Privacy in Social Interaction
Proceedings of the first Joint Conference between the HCI community of Spain and the HCI community of Mexico: Interaccion 2012 and Mexican Conference MexIHC 2012, ACM Digital Library Download Paper - Mohamed Bourimi, Pedro Villanueva, Yassin Daanoun and Medya Miran
Towards better support for collaborative research by using DUIs with mobile devices: SocialTV navigation design case study
Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 9-12, ISBN-10: 84-695-3318-5 , Download proceedings - Lars Fischer, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Rafael Gimenez
Enhancing Privacy in Collaborative Scenarios Utilising a Flexible Proxy Layer
Proceedings of: International Confernce on Future Generation Communication 2012, At London, UK Download Paper - J. Gulden, T. Barth, F. Karatas and D. Kesdogan
Erh?hung der Sicherheit von Lebensmittelwarenketten durch Modell-getriebene Prozess-Implementierung
Angenommen bei der MKWI 2012, Teilkonferenz "Kommunikations- und Kooperationssysteme, Track "Digitale Netzwerke in unsicheren Umwelten", 29.2.-2.3.2012 in Braunschweig - M. Heupel, M. Bourimi, D. Kesdogan, T. Barth, P. Schwarte and P. G. Villanueva
Enhancing security and usability of DUI based collaboration with proof based credential systems
Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 23-26, ISBN-10: 84-695-3318-5 , Download proceedings - Marcel Heupel, Lars Fischer, Mohamed Bourimi, Dogan Kesdogan, Simon Scerri, Fabian Hermann and Rafael Gimenez
Context-aware, trust-based access control for the digital.me userware
New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on. Download paper - F. Karatas, T. Barth, D. Kesdogan, H. M. Fardoun and P. G. Villanueva
Using Distributed User Interfaces to Evaluate Decision Making in Cloud Deployment
Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 17-22, ISBN-10: 84-695-3318-5 , Download proceedings - Fatih Karatas, Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, Rafael Gimenez, Widura Schwittek, and Marc Planaguma
Towards Secure and At-Runtime Tailorable Customer-Driven Public Cloud Deployment
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. Download paper - Simon Scerri, Keith Cortis, Ismael Rivera, Fabian Hermann, and Mohamed Bourimi
di.me: Context-Aware, Privacy-Sensitive Management of the Integrated Personal Information Sphere
In Proceedings of the EU Project Networking Track at ESWC 2012. - Mark Stegelmann and Dogan Kesdogan
GridPriv: A Smart Metering Architecture Offering k-Anonymity
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, Download paper - Mark Stegelmann and Dogan Kesdogan
Location Privacy for Vehicle-to-Grid Interaction through Battery Management
Information Technology: New Generations (ITNG), 2012 Ninth International Conference on, Download paper - Ricardo Tesoriero, Mohamed Bourimi, Fatih Karatas, Thomas Barth, Pedro G. Villanueva, and Philipp Schwarte
Model-Driven Privacy and Security in Multi-modal Social Media UIs
Modeling and Mining Ubiquitous Social Media Lecture Notes in Computer Science Volume 7472, 2012, pp 158-181 . Springer, Heidelberg (2012)Download paper - Simon Thiel, Mohamed Bourimi, Rafael Giménez, Simon Scerri, Andreas Schuller, Massimo Valla, Sophie Wrobel, Cristina Frà and Fabian Hermann
A requirements-driven approach towards decentralized social networks
Future Information Technology, Application, and Service Lecture Notes in Electrical Engineering, 2012, Volume 164, Part 6, 709-718, DOI: 10.1007/978-94-007-4516-2_75 Download paper
2011
- Thomas Barth, Thomas Fielenbach, Mohamed Bourimi, Dogan Kesdogan and Pedro G. Villanueva
Supporting Distributed Decision Making Using Secure Distributed User Interfaces
Proceedings of Distributed User Interfaces 2011 CHI Workshop, held in conjuction with CHI 2011 conference.
In J.A. Gallud et al. (eds.), Distributed User Interfaces: Designing Interfaces for the Distributed Ecosystem, Human-Computer Interaction Series ? Springer-Verlag London Limited 2011
, Download paper - M. Bourimi, M. Heupel, D. Kesdogan and T. Fielenbach
Enhancing Usability of Privacy-Respecting Authentication and Authorization in Mobile Social Settings by Using Idemix
Scientific research paper (ger. Wissenschaftlicher Artikel) in the context of the EU FP7 project di.me, 2011, OPUS Siegen URL: dokumentix.ub.uni-siegen.de/opus/volltexte/2011/483/ URN-Resolver of the German National Library: nbn-resolving.de/urn:nbn:de:hbz:467-4839
Download paper - Mohamed Bourimi, Simon Scerri, Marc Planaguma, Marcel Heupel, Fatih Karatas and Pillip Schwarte
A two-level approach to ontology-based access control in pervasive personal servers
Scientific research paper (ger. Wissenschaftlicher Artikel) in the context of the EU FP7 project di.me, 2011, OPUS Siegen URL: dokumentix.ub.uni-siegen.de/opus/volltexte/2011/578/ URN-Resolver of the German National Library: nbn-resolving.de/urn:nbn:de:hbz:467-5789
Download paper - M. Bourimi, G. Mau, S. Steinmann, D. Klein, S. Templin, D. Kesdogan and H. Schramm-Klein
A Privacy-Respecting Indoor Localization Approach For Identifying Shopper Paths By Using End-Users Mobile Devices
in Eighth International Conference on Information Technology: New Generations, (ITNG) 2011
Download paper - Mohamed Bourimi, J?rn Ossowski, Dhiah Abou-Tair, Stephan Berlik and D. Abu-Saymeh
Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs
New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, (NTMS) 2011
Download paper - Mohamed Bourimi, Ricardo Tesoriero, Pedro G. Villanueva, Fatih Karatas, Philipp Schwarte
Privacy and Security in Multi-modal User Interface Modeling for Social Media
Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom), (SocialCom/PASSAT) 2011
Download paper - Lars Fischer, Do?an Kesdo?an and Laura Dorfer
Link Globally-Trust Locally
Federated Social Web Summit, , Berlin (Germany). June 3rd-5th 2011.
Visit the agenda and download the paper - M. Heupel and D. Kesdogan
Towards usable interfaces for proof based access rights on mobile devices
OPEN PROBLEMS IN NETWORK SECURITY Lecture Notes in Computer Science, 2011, Volume 7039/2012, 15-27, DOI: 10.1007/978-3-642-27585-2_2
, Download paper - Dang Vinh Pham, Joss Wright, Dogan Kesdogan
A Practical Complexity-Theoretic Analysis of Mix Systems
European Symposium on Research in Computer Security (ESORICS). LNCS Volume 6879. 2011 - Simon Scerri, Rafael Gimenez, Fabian Herman, Mohamed Bourimi and Simon Thiel
digital.me, towards an integrated Personal Information Sphere
Federated Social Web Summit, , Berlin (Germany). June 3rd-5th 2011.
Visit the agenda and download the paper - S. Steinmann, G. Mau, M. Bourimi, H. Schramm-Klein and D. Kesdogan
TRACKING SHOPPERS BEHAVIOR AT THE POINT OF SALE BY USING END-USERS MOBILE DEVICES
40th EMAC International Conference, New Technologies and E-Marketing Track, 2011
Click here for more information - Benedikt Westermann, Lars Fischer, Dang Vinh Pham
50 Bucks Attack on Tor
Nordic Conference in Secure IT Systems (NordSec). 2011 - B. Westermann and D. Kesdogan
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection
To appear 15th Internation Conference on Financial Cryptography and Data Security (FC2011). Feb, 2011. - Bernd Uebersch?r, Widura Schwittek, Stefan Eicker, Mohamed Bourimi, Marcel Heupel and Dogan Kesdogan
Mobile applications for the angling community
To appear in the proceedings of 6th World Recreational Fishing Conference, August 1-4, 2011, Berlin
Click here for more information
2010
- M. Bourimi, T. Barth, J. M. Haake, B. Uebersch?r and D. Kesdogan
AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies
Published in Proceedings of the 3rd Conference on Human-Centred Software Engineering (HCSE), 2010
Download paper - Mohamed Bourimi, J?rg M. Haake, Marcel Heupel Bernd Uebersch?r, Dogan Kesdogan and Thomas Barth
Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture
To appear in the International Journal for Infonomics (IJI), Volume 3, Issue 4, p. 563 - 572, December 2010
Click here for more information (author list not yet updated!) - M. Bourimi, D. Kesdogan, T. Barth, K. H?fke and D. Abou-Tair.
Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy
Published in Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on , 2010
Download paper - M. Bourimi, B. Ueberschaer, E. Ganglbauer, D. Kesdogan, T. Barth, J. Dax and M. Heupel.
Building Usable and Privacy-Preserving Mobile Collaborative Applications for Real-Life Communities: A Case Study Based Report
Published in Proceedings of International Conference on Information Society (i-Society), 2010
Download paper - J. Dax, M. Heupel, M. Bourimi and D. Kesdogan.
Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone
Essener Workshop zur Netzsicherheit 2010 (EWNS10), 2010
Click here for more information - M. Heupel
Porting and evaluating the performance of IDEMIX and TOR anonymity on modern smartphones
Diploma thesis, in the context of the digital.me project
Download thesis - B. Westermann, R. Wendolsky, L. Pimenidis and D. Kesdogan.
Cryptographic Protocol Analysis of AN.ON
Appeared in Proceedings of the 14th International Conference of Financial Cryptography and Data Security, 2010
Download paper - B. Westermann and D. Kesdogan.
Introducing Perfect Forward Secrecy for AN.ON
Appeared in Proceedings of Eunice 2010
Download paper
2009
- D. el Diehn I. Abou-Tair, L. Pimenidis, J. Schomburg and B. Westermann.
Usability Inspection of Anonymity Networks
Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, August 25-27, Saint John, New Brunswick, Canada, 2009.
Download paper - M. Bourimi, T. Barth, B. Uebersch?r and D. Kesdogan.
Towards Building User-Centric Privacy-Respecting Collaborative Applications
International Conference on Intelligent Interactive Assistance and Mobile Multimedia Computing,
CCIS 53, Springer-Verlag, Berlin, 2009, pp. 390-340.
Download paper - M. Bourimi, F. Kühnel, J. M. Haake, D. el Diehn I. Abou-Tair and D. Kesdogan.
Tailoring collaboration according privacy needs in real-identity collaborative systems
In the 15th Collaboration Researchers' International Workshop on Groupware, CRIWG 2009, September 13-17, Peso da Régua, Douro, Portugal, volume 5784 of Lecture Notes in Computer Science, pages 110–125. Springer, 2009.
Download paper - L. Boursas, M. Bourimi, W. Hommel and D. Kesdogan.
Enhancing Trust in SOA Based Collaborative Environments
3rd International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud, Springer Verlag, Berlin, 2009.
Download paper - J. Camenisch and D. Kesdogan.
iNetSec 2009-Open Research Problems in Network Security
In Proceedings of IFIP WG 11.4 International Workshop Zurich, Switzerland, April 2009 - A. Panchenko, B. Westermann, L. Pimenidis and C. Andersson.
SHALON: Lightweight Anonymization based on Open Standards
Proceedings of 18th Internatonal Conference on Computer Communications and Networks, 2009.
Download paper - V. Pham and D. Kesdogan.
A Combinatorial Approach for an Anonymity Metric
Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, 1-3 July 2009. - V. Pham and J. Wright.
Discussing Anonymity Metrics for Mix Based Anonymity Approaches
iNetSec 2009 - Open Research Problems in Network Security, Zurich, Switzerland, April 2009. - B. Westermann.
Security Analysis of AN.ON’s Payment Scheme
Proceedings of NordSec, 2009.
Download paper - B. Westermann, A. Panchenko and L. Pimenidis.
A Kademlia-based Node Lookup System for Anonymization Networks
Proceedings of International Conference on Information Security and Assurance, 2009.
Download paper
2008
- L. Pimenidis, B. Westermann and V. Wetzelaer.
A Context Aware Network-IDS
Proceedings of the 13th Nordic Workshop on Secure IT Systems, 2008
Download paper - D. Kesdogan, V. Pham and L. Pimenidis.
Analyse der Verkettbarkeit in nutzergesteuertem Identit?tsmanagement
In Proceedings of Fachtagung GI Sicherheit, Saarbrücken, Germany, 2008. - D. el D. I. Abou-Tair.
An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.
Dissertation, Aachen, Germany, Shaker Verlag, Informatik, ISBN 978-3-8322-7817-5, 2008. - V. Pham.
Analysis of the Anonymity Set of Chaumian Mixes
In Proceedings of 13th Nordic Workshop on Secure IT-Systems, Kongens Lyngby, Denmark, 9-10 October 2008. - B. Westermann.
Ein einfaches Anonymisierungsverfahren basierend auf offenen Standards
In Informatiktage, pages 231–233, 2008. - B. Westermann.
Entwicklung und Evaluation eines einfachen und effizienten Anonymisierungsverfahrens basierend auf offenen Standards
Master's thesis, RWTH Aachen, Januar 2008.
2007
- D. Kesdogan, V. Pham and L. Pimenidis.
Information Disclosure in Identity Management
In Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007. - D. el Diehn I. Abou-Tair, S. Berlik and U. Kelter.
Enforcing Privacy by Means of an Ontology Driven XACML Framework.
In The Third International Symposium on Information Assurance and Security, IAS 2007, Aug 29 - Aug 31, Manchester, United Kingdom, pages 279-284, IEEE CS Press, 2007.
2006
- Zinaida Benenson, Milan Fort, Felix Freiling, Dogan Kesdogan, Lucia Draque Penso
TrustedPals: Secure Multiparty Computation Implemented with SmartCards
ESORICS 2006: 11th European Symposium On Research In Computer Security, Hamburg, Germany, September 18-20, 2006. - Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
Fundamental Limits on the Anonymity Provided by the MIX Technique
The 2006 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2006 - Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
Safety, Liveness, and Information Flow: Dependability Revisited
ARCS Workshop: Dependability and Fault Tolerance, Frankfurt 2006. - Dogan Kesdogan, Charles Palmer
Technical Challenges of Network Anonymity
Computer Communications, Internet Security, Elsevier, Volume 29, Issue 3, 1 February 2006, Pages 306-324 - Sebastian Clau?, Dogan Kesdogan, Tobias K?lsch, Lexi Pimenidis, Stefan Schiffner, Sandra Steinbrecher
Identit?tsmanagement und das Risiko der Re-Identifikation
Sicherheit 2006, 3. Jahrestagung, Fachbereich Sicherheit der Gesellschaft für Informatik, Magdeburg, Februray 2006. - D. el Diehn I. Abou-Tair and J. Niere.
An Architecture for Integrating Heterogeneous University Applications that Supports Monitoring.
In The 2nd International Conference on Trends in Enterprise Application Architecture, TEAA 2006, Nov 29 - Dec 1, Berlin, Germany, volume 4473 of Lecture Notes in Computer Science, pages 16-24, 2006. Springer-Verlag Berlin Heidelberg, 2006. - D. el Diehn I. Abou-Tair and S. Berlik.
An ontology-based approach for managing and maintaining privacy in information systems.
In The 5th Int. Conf. on Ontologies, DataBases, and Applications of Semantics, ODBASE 2006, Oct 31 - Nov 2, Montpellier, France, volume 4275 of Lecture Notes in Computer Science, pages 983-994, 2006. Springer-Verlag Berlin Heidelberg, 2006. - D. el Diehn I. Abou-Tair
A Framework Ensuring Privacy in a Distributed Environment.
In The 4th Annual Conference on Privacy, Security and Trust, PST 2006, Oct 30 - Nov 1, Markham/Toronto, Ontario, Canada
2005
- Sebastian Clau?, Dogan Kesdogan, Tobias K?lsch, Lexi Pimenidis, Stefan Schiffner, Sandra Steinbrecher
Privacy Enhanced Identity Management: Design Considerations and Open Problems
ACM CCS2005 Workshop on Digital Identity Management, Fairfax, USA. November 2005 - Dogan Kesdogan, Lexi Pimenidis, Tobias K?lsch
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis
First Workshop on Quality of Protection, Milan, Italy. September 2005 - Dogan Kesdogan, Lexi Pimenidis
The Lower Bound of Attacks on Anonymity Systems -- A Unicity Distance Approach
First Workshop on Quality of Protection, Milan, Italy. September 2005 - Tobias K?lsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
Mit IDM und Mittler zu mehr Privatsph?re in LBS.
Ortsbezogene Anwendungen und Dienste, Fachgespr?ch der GI-Fachgruppe KuVS
Download paper - Tobias K?lsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
Privacy for Profitable Location Based Services
2nd International Conference on Security in Pervasive Computing Boppard, Lecture Notes on Computer Science (LNCS), Germany, April 2005 - Dogan Kesdogan, O. Rattay
Security Evaluation of Anonymity Techniques (in German)
SICHERHEIT 2005, 2. Jahrestagung, GI Fachbereich Sicherheit, Vol.P-62, April 2005
Download paper - Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
Secure Multi-Party Computation with Security Modules
SICHERHEIT 2005, 2. Jahrestagung, GI Fachbereich Sicherheit, Vol.P-62, April 2005
Download paper - Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks
2nd European Workshop on Wireless Sensor Networks (EWSN) 2005, January 2005
Download paper
2004
- Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
User Authentication in Sensor Networks (extended abstract)
Proceedings of Informatik 2004, Workshop on Sensor Networks, GI-Edition, Lecture Notes in Informatics (LNI), Vol. 51, September 2004
Download paper - Dogan Kesdogan, Lexi Pimenidis
The Hitting Set Attack on Anonymity Protocols
6th International Workshop on Information Hiding, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Toronto, Canada, May 2004
Download paper
2003
- Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
The 2003 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2003
Download paper - Dakshi Agrawal, Dogan Kesdogan
How to Measure Anonymity: The Disclosure Attack
IEEE Security & Privacy Magazine, Nov.-Dec. 2003, Volume 1, Nr. 6
Download paper
2002
- Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
Limits of Anonymity in Open Environments
5th International Workshop on Information Hiding, Lecture Notes in Computer Science (LNCS) 2119, Springer-Verlag, Noordwijkerhout, The Netherlands, October 2002
Download paper - Dogan Kesdogan, Mark Borning, Michael Schmeink
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?
Workshop on Privacy Enhancing Technologies 2002 (PET 2002), San Francisco, CA, USA, Lecture Notes in Computer Science (LNCS) 2482, Springer-Verlag, April 2002
Download paper - D. el Diehn I. Abou-Tair
ECS-Conceptualization and Realization of Profile based Cross-Medial Events Calendar System.
Master's thesis -Diplomarbeit-, Universitaet Dortmund, Fachbereich Informatik, July 2002.
2001
- Kathy Bohrer, Xuan Liu, Dogan Kesdogan, Edith Schonberg, Moninder Singh, Susan L. Spraragen
Personal Information Management and Distribution
The Fourth International Conference on Electronic Commerce Research (ICECR-4) Dallas, TX, USA, November 2001
Download paper - Kathy Bohrer, Xuan Liu, Dogan Kesdogan, Edith Schonberg, Moninder Singh
How to go Shopping on the World Wide Web without having your Privacy Violated
The Fourth International Conference on Electronic Commerce Research (ICECR-4) Dallas, TX, USA, November 2001 - Mark Borning, Dogan Kesdogan
Privacy in E-Commerce
International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES), IEEE, RA, September 2-6 2001, Malta
Download paper - Dogan Kesdogan
Evaluation of Anonymity Providing Techniques using Queuning Theory
The 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), Tampa, Florida, November 2001
Download paper - Dogan Kesdogan, Mark Borning, Michael Schmeink
Anonymous Surfing on the World Wide Web (in German)
Verl?ssliche IT-Systeme 2001 (VIS 2001), Vieweg Verlag, Wiesbaden, Germany, 2001
Download paper - Mark Borning, Dogan Kesdogan, Otto Spaniol
Anonymity and unobservability (in German)
it - Information Technology, Nr. 43/5, 2001
Download paper - Dogan Kesdogan
System, Method, and Business Methods for Enforcing Privacy Preferences on Personal-Data Exchanges Across a Network[Patent]
September 2001 (IBM MyPrivacy Group) - Dogan Kesdogan
Using an Object Model to Improve Handling of Personally Identifiable Information[Patent]
June 2001 (IBM Enterprise Privacy Architecture (EPA) Group) - Dogan Kesdogan
Using a Rules Model to Improve Handling of Personally Identifiable Information[Patent]
June 2001 (IBM Enterprise Privacy Architecture (EPA) Group) - PG Sword
Dragon Slayer SWORD - Secure WAN Object Request Distribution.
Interne Berichte, Universitaet Dortmund, Fachbereich Informatik, March 2001.
2000
- Dogan Kesdogan, M. Sch?ffter
Overview and Evaluation of VPN Solutions (in German)
7th Workshop on 'Sicherheit in vernetzten Systemen', DFN-CERT, Hamburg, Germany, March 2000
1999
- Dogan Kesdogan
Privacy in Internet:Confidential communication in Open Environments (in German) [monography]
Verlag Vieweg, 1999, ISBN 3-528-05731-9 - Dogan Kesdogan, Roland Büschkes
Classification of Anonymization Techniques (in German)
Sicherheitsinfrastrukturen 1999 (SiS 1999), Vieweg Verlag, DuD-Fachbeitr?ge, 1999
Download paper - Dogan Kesdogan, Andrei Trofimov, Dirk Trossen
Strategies for Minimizing the Average Cost of Paging on the Air Interface
Kommunikation in Verteilten Systemen 1999 (KiVS'99), Darmstadt, Springer-Verlag, March 1999
Download paper - Roland Büschkes, Mark Borning, Dogan Kesdogan
Transaction-based Anomaly Detection
1st USENIX Workshop on Intrusion Detection and Network Monitoring , Santa Clara, California, USA, April 1999
Download paper - Roland Büschkes, Tobias Haustein, Dogan Kesdogan
Active Intrusion Detection - An Approach To Dynamic Risk Management
Proceedings of NORDSEC'99, Kista Science Park, Sweden, November 1999 - Roland Büschkes, Dogan Kesdogan
Privacy Enhanced Intrusion Detection, in: Multilateral Security in Communications
Addison-Wesley, 1999
Download paper - Dogan Kesdogan, Roland Büschkes, Otto Spaniol
Stop-And-Go-MIXes Providing Pro-babilistic Anonymity in an Open System: Multilateral Security in Communications
Addison-Wesley, 1999
1998
- Roland Büschkes, Dogan Kesdogan
Intrusion Detection and User Privacy - A Natural Contradiction?
International Symposium on Recent Advances in intrusion Detection 1998 (RAID 98), Louvain-la-Neuve, Belgium, September 1998 - Dogan Kesdogan, Peter Reichl, Klaus Jungh?rtchen
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks
European Symposium on Research in Computer Science 1998 (ESORICS'98 ), Louvain-la-Neuve, Belgium, Lecture Notes in Computer Science (LNCS) 1485, Springer-Verlag, 1998
Download paper - Roland Büschkes, Dogan Kesdogan, Peter Reichl
How to Increase Security in Mobile Networks by Anomaly Detection
Proceedings of the 14th Annual Computer Security Applications Conference, ACM Special Interest Group on Security, Audit and Control, Phoenix, Arizona, USA, 1998
Download paper - Dogan Kesdogan, Jan Egner, Roland Büschkes
Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System
Proceedings of the Second Workshop on Information Hiding (IHW98), Portland, Oregon, USA, Lecture Notes in Computer Science (LNCS) 1525, Springer-Verlag, 1998
Download paper - Peter Reichl, Dogan Kesdogan, Klaus Jungh?rtchen, Marko Schuba
Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks
Computer Performance Evaluation - Modelling Techniques and Tools, Lecture Notes in Computer Science (LNCS) 1469, Springer-Verlag, 1998
Download paper
1997
- Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Dirk Trossen
Minimizing the Average Cost of Paging on the Air Interface - An Approach Considering Privacy
IEEE 47th Annual International Vehicular Technology Conference (VTC 97), Phoenix, Arizona, May 1997
Download paper - Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Otto Spaniol
Mobile communication Without Movement Profiles (in German) in: Multilateral Security in Communications
Addison-Wesley, 1997 - Reiner Sailer, Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
Security Functions in Telecommunications: Placement & Achievable Security: Multilateral Security in Communications
Addison-Wesley, 1997
Download paper
1996
- Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
Location Management Strategies increasing Privacy in Mobile Communication Systems
12th International Information Security Conference (IFIP SEC '96), Information Systems Security: Facing the Information Society of the 21st Century, Samos, Greece, Chapman & Hall, May 1996
Download paper - Dogan Kesdogan, Margarethe Zywiecki, Klaus Beulen
Mobile User Profile Generation - A Challenge between Performance and Security
Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications, December 1996
Download paper - Andreas Fasbender, Dogan Kesdogan, Olaf Kubitz
Variable and Scaleable Security Protection of Location Information in Mobile-IP
IEEE VTS, 46th Vehicular Technology Conference (VTC 96), Atlanta, GA, April 1996
Download paper - Andreas Fasbender, Dogan Kesdogan, Olaf Kubitz
Analysis of Security and Privacy in Mobile-IP
Fourth International Conference on Telecommunication Systems 96, Modelling and Analysis, Nashville, TN, March 1996 - Simon Hoff, Kai Jakobs, Dogan Kesdogan
Secure Location Management in UMTS, Communications and Multimedia Security
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, Chapman & Hall, September 1996
Download paper - Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Otto Spaniol
Mobile Communication without mobile user profile generation (in German)
it-Information Technology 4/96, Nr. 38/4, 1996 - Andreas Bertsch, Herbert Damker, Hannes Federrath, Dogan Kesdogan, Michael J. Schneider
Personal Reachability and Security Management (in German)
PIK 4/95, Nr. 18/3
Download paper
1995
- Dogan Kesdogan, Xavier Fouletier
Secure Location Information Management in Cellular Radio Systems
IEEE Wireless Communication Systems Symposium WCSS?95 'Wireless Trends in 21st Century', NY, USA, November 1995
Download paper - Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
Security in GSM-Networks
Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications 1995 (PWC 95), Prag 1995
Download paper - Dogan Kesdogan
Architectural Considerations Increasing Privacy in Mobile Communication Systems (short presentation)
Proceedings of the IFIP TC6/TC11 and Austrian Computer Society joint working Conference on Communications and Multimedia Security, Graz, Austria, September 1995 - Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
Security and Privacy in Public Radio Networks
Scientific Magazine TU-Dresden, 44, Nr. 6, 1995 (revised Version of [32])
Download paper