default search action
Dogan Kesdogan
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c74]Alperen Aksoy, Dogan Kesdogan:
Effect of Group Based Synchronization on User Anonymity in Mix Networks. ARES 2023: 146:1-146:9 - [c73]Marc Roßberger, Dogan Kesdogan:
Smart Noise Detection for Statistical Disclosure Attacks. NordSec 2023: 87-103 - [c72]Maximilian Wittig, Dogan Kesdogan:
Detecting Web Tracking at the Network Layer. SEC 2023: 131-148 - 2021
- [c71]Christian Roth, Marc Roßberger, Christoph Schreyer, Dogan Kesdogan:
STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities. FMEC 2021: 1-6 - [c70]Marc Roßberger, Alperen Aksoy, Dogan Kesdogan:
How to apply Database Anonymity Notions to Mix Networks. GI-Jahrestagung 2021: 807-818 - [c69]Christian Roth, Ngoc-Thanh Dinh, Marc Roßberger, Dogan Kesdogan:
DaRoute: Inferring trajectories from zero-permission smartphone sensors. PST 2021: 1-10 - 2020
- [c68]Christian Roth, Lukas Stöger, Mirja Nitschke, Matthias Hörmann, Dogan Kesdogan:
iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management. DATA (Revised Selected Papers) 2020: 56-79 - [c67]Christian Roth, Mirja Nitschke, Matthias Hörmann, Dogan Kesdogan:
iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management. DATA 2020: 252-259 - [c66]Christian Roth, Mario Saur, Dogan Kesdogan:
kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 114-132 - [c65]Mirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan:
Harmonized Group Mix for ITS. ICISSP 2020: 152-163 - [c64]Mirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan:
Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments. ICISSP (Revised Selected Papers) 2020: 178-200 - [c63]Christian Roth, Ngoc-Thanh Dinh, Dogan Kesdogan:
CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS. SNAMS 2020: 1-8
2010 – 2019
- 2019
- [c62]Christian Roth, Mirja Nitschke, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan:
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches. NordSec 2019: 171-187 - 2018
- [c61]Mirja Nitschke, Philipp Holler, Lukas Hartmann, Dogan Kesdogan:
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. NordSec 2018: 38-53 - [c60]Christian Roth, Dogan Kesdogan:
A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones. SOCA 2018: 17-24 - 2017
- [j9]Dang Vinh Pham, Dogan Kesdogan:
Towards a causality based analysis of anonymity protection in indeterministic mix systems. Comput. Secur. 67: 350-368 (2017) - [c59]Christian Roth, Lukas Hartmann, Dogan Kesdogan:
PARTS - Privacy-Aware Routing with Transportation Subgraphs. NordSec 2017: 86-101 - [i1]David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg:
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. CoRR abs/1711.07220 (2017) - 2016
- [e3]Jan Camenisch, Dogan Kesdogan:
Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9591, Springer 2016, ISBN 978-3-319-39027-7 [contents] - 2015
- [j8]Fatih Karatas, Lars Fischer, Dogan Kesdogan:
Service composition with consideration of interdependent security objectives. Sci. Comput. Program. 97: 183-201 (2015) - [c58]Dang Vinh Pham, Dogan Kesdogan:
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. SEC 2015: 35-50 - 2014
- [c57]Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan:
The di.me Trust Approach for Supporting Collaborative Scenarios. DEXA Workshops 2014: 321-325 - 2013
- [j7]Mohamed Bourimi, Dogan Kesdogan, Marcel Heupel, Dhiah el Diehn I. Abou-Tair, Niki Lambropoulos:
PETs at CSCL Service: Underutilised Potentials for Privacy Enhancing Distance Education. J. Univers. Comput. Sci. 19(7): 912-931 (2013) - [c56]Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan:
Trust and Privacy in the di.me Userware. HCI (3) 2013: 39-48 - [c55]Mohamed Bourimi, Dogan Kesdogan:
Experiences by Using AFFINE for Building Collaborative Applications for Online Communities. HCI (26) 2013: 345-354 - [c54]Fatih Karatas, Mohamed Bourimi, Dogan Kesdogan:
Towards Visual Configuration Support for Interdependent Security Goals. HCI (26) 2013: 375-384 - [c53]Marcel Heupel, Simon Scerri, Mohamed Bourimi, Dogan Kesdogan:
Privacy-preserving concepts for supporting recommendations in decentralized OSNs. MSM 2013: 3:1-3:4 - [c52]Fatih Karatas, Dogan Kesdogan:
An Approach for Compliance-Aware Service Selection with Genetic Algorithms. ICSOC 2013: 465-473 - [c51]Fatih Karatas, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Sophie Wrobel:
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study. ITNG 2013: 27-32 - [c50]Philipp Schwarte, Mohamed Bourimi, Marcel Heupel, Dogan Kesdogan, Rafael Giménez, Sophie Wrobel, Simon Thiel:
Multilaterally Secure Communication Anonymity in Decentralized Social Networking. ITNG 2013: 498-504 - [c49]Fatih Karatas, Dogan Kesdogan:
A flexible approach for considering interdependent security objectives in service composition. SAC 2013: 1919-1926 - [p5]Marcel Heupel, Mohamed Bourimi, Philipp Schwarte, Dogan Kesdogan, Thomas Barth, Pedro González Villanueva:
Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control. Distributed User Interfaces 2013: 95-105 - [p4]Fatih Karatas, Mohamed Bourimi, Dogan Kesdogan, Pedro González Villanueva, Habib M. Fardoun:
Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies. Distributed User Interfaces 2013: 119-127 - 2012
- [j6]Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, Dhiah el Diehn I. Abou-Tair, Fabian Hermann, Simon Thiel:
Using Distributed User Interfaces in Collaborative, Secure, and Privacy-Preserving Software Environments. Int. J. Hum. Comput. Interact. 28(11): 748-753 (2012) - [c48]Mark Stegelmann, Dogan Kesdogan:
V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid. CSS 2012: 93-107 - [c47]Lars Fischer, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Rafael Giménez:
Enhancing privacy in collaborative scenarios utilising a flexible proxy layer. FGST 2012: 126-132 - [c46]Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Dogan Kesdogan, Marcel Heupel:
A generic location-based mobile application framework supporting privacy-preserving end-user tailorability. FGST 2012: 202-207 - [c45]Mohamed Bourimi, Marcel Heupel, Benedikt Westermann, Dogan Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte:
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios. ITNG 2012: 102-108 - [c44]Mark Stegelmann, Dogan Kesdogan:
Location Privacy for Vehicle-to-Grid Interaction through Battery Management. ITNG 2012: 373-378 - [c43]Jens Gulden, Thomas Barth, Dogan Kesdogan, Fatih Karatas:
Erhöhung der Sicherheit von Lebensmittelwarenkettendurch Modell-getriebene Prozess-Implementierung. MKWI 2012: 2061-2072 - [c42]Marcel Heupel, Lars Fischer, Dogan Kesdogan, Mohamed Bourimi, Simon Scerri, Fabian Hermann, Rafael Giménez:
Context-Aware, Trust-Based Access Control for the di.me Userware. NTMS 2012: 1-6 - [c41]Fatih Karatas, Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, Rafael Giménez, Widura Schwittek, Marc Planagumà:
Towards secure and at-runtime tailorable customer-driven public cloud deployment. PerCom Workshops 2012: 124-130 - [c40]Mark Stegelmann, Dogan Kesdogan:
GridPriv: A Smart Metering Architecture Offering k-Anonymity. TrustCom 2012: 419-426 - [e2]Jan Camenisch, Dogan Kesdogan:
Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7039, Springer 2012, ISBN 978-3-642-27584-5 [contents] - 2011
- [c39]Dang Vinh Pham, Joss Wright, Dogan Kesdogan:
A Practical Complexity-Theoretic Analysis of Mix Systems. ESORICS 2011: 508-527 - [c38]Mark Stegelmann, Dogan Kesdogan:
Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction. EuroPKI 2011: 75-90 - [c37]Benedikt Westermann, Dogan Kesdogan:
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. Financial Cryptography 2011: 62-76 - [c36]Marcel Heupel, Dogan Kesdogan:
Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices. iNetSeC 2011: 15-27 - [c35]Mohamed Bourimi, Gunnar Mau, Sascha Steinmann, Dominik Klein, Steffen Templin, Dogan Kesdogan, Hanna Schramm-Klein:
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices. ITNG 2011: 139-144 - [c34]Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan:
Analyzing the Gold Star Scheme in a Split Tor Network. SecureComm 2011: 77-95 - [p3]Thomas Barth, Thomas Fielenbach, Mohamed Bourimi, Dogan Kesdogan, Pedro González Villanueva:
Supporting Distributed Decision Making Using Secure Distributed User Interfaces. Distributed User Interfaces 2011: 177-184 - 2010
- [c33]Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, Dogan Kesdogan:
Cryptographic Protocol Analysis of AN.ON. Financial Cryptography 2010: 114-128 - [c32]Mohamed Bourimi, Thomas Barth, Jörg M. Haake, Bernd Überschär, Dogan Kesdogan:
AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies. HCSE 2010: 182-189 - [c31]Benedikt Westermann, Dogan Kesdogan:
Introducing Perfect Forward Secrecy for AN.ON. EUNICE 2010: 132-142 - [c30]Mohamed Bourimi, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan, Thomas Barth, Kathrin Höfke:
Evaluating Potentials of Internet- and Web-based Socialtv in the Light of Privacy. SocialCom/PASSAT 2010: 1135-1140
2000 – 2009
- 2009
- [c29]Dang Vinh Pham, Dogan Kesdogan:
A Combinatorial Approach for an Anonymity Metric. ACISP 2009: 26-43 - [c28]Mohamed Bourimi, Falk Kühnel, Jörg M. Haake, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan:
Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. CRIWG 2009: 110-125 - [c27]Dogan Kesdogan, Daniel Mölle, Stefan Richter, Peter Rossmanith:
Breaking Anonymity by Learning a Unique Minimum Hitting Set. CSR 2009: 299-309 - [c26]Mohamed Bourimi, Thomas Barth, Bernd Überschär, Dogan Kesdogan:
Towards Building User-Centric Privacy-Respecting Collaborative Applications. IMC 2009: 341-342 - [c25]Latifa Boursas, Mohamed Bourimi, Wolfgang Hommel, Dogan Kesdogan:
Enhancing Trust in SOA Based Collaborative Environments. SVM 2009: 94-102 - [e1]Jan Camenisch, Dogan Kesdogan:
iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 309, Springer 2009, ISBN 978-3-642-05436-5 [contents] - 2008
- [c24]Dogan Kesdogan, Dang Vinh Pham, Lexi Pimenidis:
Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. Sicherheit 2008: 17-30 - 2006
- [j5]Dogan Kesdogan, Charles Palmer:
Technical challenges of network anonymity. Comput. Commun. 29(3): 306-324 (2006) - [c23]Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 - [c22]Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 - [c21]Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis:
Identitätsmanagement und das Risiko der Re-Identifikation. Sicherheit 2006: 188-191 - [c20]Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach:
Fundamental Limits on the Anonymity Provided by the MIX Technique. S&P 2006: 86-99 - [p2]Dogan Kesdogan, Lexi Pimenidis:
The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach. Quality of Protection 2006: 145-158 - [p1]Dogan Kesdogan, Lexi Pimenidis, Tobias Kölsch:
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis. Quality of Protection 2006: 159-171 - 2005
- [c19]Sebastian Clauß, Dogan Kesdogan, Tobias Kölsch:
Privacy enhancing identity management: protection against re-identification and profiling. Digital Identity Management 2005: 84-93 - [c18]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
An algorithmic framework for robust access control in wireless sensor networks. EWSN 2005: 158-165 - [c17]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 - [c16]Dogan Kesdogan, Oliver Rattay:
Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web. Sicherheit 2005: 233-244 - [c15]Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan:
Privacy for Profitable Location Based Services. SPC 2005: 164-178 - 2004
- [c14]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389 - [c13]Dogan Kesdogan, Lexi Pimenidis:
The Hitting Set Attack on Anonymity Protocols. Information Hiding 2004: 326-339 - 2003
- [j4]Dakshi Agrawal, Dogan Kesdogan:
Measuring Anonymity: The Disclosure Attack. IEEE Secur. Priv. 1(6): 27-34 (2003) - [c12]Dakshi Agrawal, Dogan Kesdogan, Stefan Penz:
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. S&P 2003: 16-27 - 2002
- [c11]Dogan Kesdogan, Dakshi Agrawal, Stefan Penz:
Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 - [c10]Dogan Kesdogan, Mark Borning, Michael Schmeink:
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? Privacy Enhancing Technologies 2002: 224-238 - 2001
- [j3]Mark Borning, Dogan Kesdogan, Otto Spaniol:
Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). Informationstechnik Tech. Inform. 43(5): 246-253 (2001) - [c9]Dogan Kesdogan, Mark Borning, Michael Schmeink:
Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW. VIS 2001: 37-53
1990 – 1999
- 1999
- [b1]Dogan Kesdogan:
Privacy im Internet - vertrauenswürdige Kommunikation in offenen Umgebungen. RWTH Aachen University, Germany, DuD-Fachbeiträge, Vieweg 1999, ISBN 978-3-528-05731-2, pp. I-VIII, 1-162 - [c8]Roland Büschkes, Mark Borning, Dogan Kesdogan:
Transaction-based Anomaly Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 129-140 - [c7]Dogan Kesdogan, Andrei Trofimov, Dirk Trossen:
Strategies for Minimizing the Average Cost of Paging on the Air Interface. Kommunikation in Verteilten Systemen 1999: 488-499 - 1998
- [c6]Roland Büschkes, Dogan Kesdogan, Peter Reichl:
How to Increase Security in Mobile Networks by Anomaly Detection. ACSAC 1998: 3-12 - [c5]Peter Reichl, Dogan Kesdogan, Klaus Junghärtchen, Marko Schuba:
Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. Computer Performance Evaluation (Tools) 1998: 105-116 - [c4]Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen:
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. ESORICS 1998: 295-312 - [c3]Dogan Kesdogan, Jan Egner, Roland Büschkes:
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. Information Hiding 1998: 83-98 - 1996
- [j2]Anja Jerichow, Hannes Federrath, Dogan Kesdogan, Otto Spaniol, Andreas Pfitzmann:
Mobilkommunikation ohne Bewegungsprofile. Informationstechnik Tech. Inform. 38(4): 24-29 (1996) - [c2]Simon Hoff, Kai Jakobs, Dogan Kesdogan:
Anonymous Mobility Management for Third Generation Mobile Networks. Communications and Multimedia Security 1996: 72-83 - [c1]Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:
Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 - 1995
- [j1]Andreas Bertsch, Herbert Damker, Hannes Federrath, Dogan Kesdogan, Michael J. Schneider:
Erreichbarkeitsmanagement. Prax. Inf.verarb. Kommun. 18(4): 231-234 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint