Zu Hauptinhalt springen

Ver?ffentlichungen

ePub Universit?t Regensburg

2023

  • M. Wittig, D. Kesdogan: Detecting web tracking at the network layer, IFIP SEC 2023
  • A. Aksoy, D. Kesdogan: Effect of Group Based Synchronization on User Anonymity in Mix Networks, TrustBus 2023
  • M. Rossberger, D. Kesdogan: Smart Noise Detection for Statistical Disclosure Attacks, NordSec 2023
  • M. Wittig, D. Kesdo?an. "Detecting web tracking at the network layer.", 2023

2022

keine Eintr?ge vorhanden


2021

  • M. Rossberger, A. Aksoy, D. Kesdogan: How to apply Database Anonymity Notions to Mix Networks, Lecture Notes in Informatics (LNI) Volume P-314, 2021
  • C. Roth, L. St?ger, D. Kesdogan: iTLM: Reducing Time in Traffic with Q-learning and Crowd-sourcing. tbd 2021, Springer
  • M. Nitschke, C. Roth, C. Hoyer, D. Kesdogan: Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments. Information Systems Security and Privacy 2021, Springer
  • C. Roth, M. Ro?berger, C. Schreyer and D. Kesdo?an, "STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities," 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), Gandia, Spain, 2021
  • C. Roth, N. T. Dinh, M. Ro?berger and D. Kesdo?an, "DaRoute: Inferring trajectories from zero-permission smartphone sensors," 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 2021
  • Roth, C., St?ger, L., Nitschke, M., H?rmann, M., Kesdogan, D. (2021). iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management

2020

  • C. Roth, M. Rossberger, C. Schreyer, D. Kesdogan: STRIDE - Secure Traffic Reporting Infrastructure based on Distributed Entities, IEEE Conference on Communications and Network Security 2020 (CNS)
  • C. Roth, T.-D. Ngoc, D. Kesdogan: CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS, International Workshop on Data Science Engineering and its Applications (DSEA), 20. Dez. 2020
  • C. Roth, M. Sauer, D. Kesdogan: kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example, Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (DETIPS 2020), 18. Sep. 2020
  • C. Roth, M. Nitschke, M. H?rmann, D. Kesdogan: iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management. 9th International Conference on Data Science, Technology and Applications (DATA), 7.- 9. Jul. 2020
  • M. Nitschke, C. Roth, C. Hoyer, D. Kesdogan: Harmonized Group Mix for ITS. Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP), Mar. 2020, Valetta, Malta
  • Nitschke, M., Roth, C., Hoyer, C., Kesdo?an, D.?Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments, ICISSP 2020

2019

  • C. Roth et al.: My Smartwatch is Mine - Machine Learning Based Theft Detection of Smartwatches, Secure IT Systems. NordSec 2019, Springer, Cham (2019)

2018

  • D. Kesdogan: Quo Vadis Network Anonymity?, 2018 International Conference on Promising Electronic Technologies (ICPET), IEEE, Deir El-Balah, 2018, pp. 74-79.
  • C. Roth, D. Kesdogan: A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones, IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA), 17-24 (2018)
  • M. Nitschke et al.: MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zones, Secure IT Systems. NordSec 2018, Springer, Cham, Cham (Switzerland) (2018)
  • L. Hartmann: Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality of Service, SICHERHEIT 2018, Gesellschaft für Informatik, Bonn (2018)
  • L. Hartmann et al.: Wie vertrauenswürdig k?nnen ISPs sein?, Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung, Springer Fachmedien, Wiesbaden (2018)
  • D. Kesdogan?? ?(Ed.):?? ?Open?? ?Problems?? ?in?? ?Network?? ?Security,?? ?IFIP?? ?online Ver?ffentlichung, 2018

2017

  • V. Pham, D. Kesdogan: Towards a causality based analysis of anonymity protection in indeterministic mix systems, Computers & Security, Vol 67, pp 350 – 368 (June 2017)
  • L. Hartmann et al.: Can the ISP be trusted?, Forum Privatheit: Die Fortentwicklung des Datenschutzes, Berlin, 02.-03. Nov. 2017
  • C. Roth, L. Hartmann, D. Kesdogan: PARTS – Privacy-Aware Routing with Transportation Subgraphs, Secure IT Systems (NordSec 2017), Springer, Cham (Switzerland) (2017)

2016

  • D. Kesdogan et al.: Dynamische Teilrouten zur anonymen Navigation, Location Based Application and Services (LBAS 2016)
  • J. Camenisch, D. Kesdogan (Eds.): Open Problems in Network Security, Lecture Notes in Computer Science (LNCS) 9591, Springer-Verlag, 2016

2015

  • F. Karatas, L. Fischer, D. Kesdogan: Considering Interdependent Security Objectives in Service Composition, In Science of Computer Programming, vol. 97, 2015, p. 183– 201
  • V. Pham, D. Kesdogan: Towards Relations between the Hitting-Set Attack and the Statistical Disclosure Attack, IFIP SEC 2015 (Best Paper Award)

2014

keine Eintr?ge vorhanden


2013

  • Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Dogan Kesdogan, Marcel Heupel
    An end-user tailorable generic framework for privacy-preserving location-based mobile applications
    To appear in International Journal of Applied Mathematics & Information Sciences (AMIS 2013)
  • Mohamed Bourimi and Dogan Kesdogan
    Experiences by using AFFINE for building collaborative applications for online communities
    To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013
  • Mohamed Bourimi, Dogan Kesdogan, Marcel Heupel, Dhiah el Diehn I. Abou-Tair, Niki Lambropoulos
    PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education
    To appear in Journal of Universal Computer Science. Special Issue: Interaction Design in Educational Environments (J.UCS 2013)
  • Marcel Heupel, Mohamed Bourimi, Do?an Kesdo?an
    Trust and Privacy in The di.me Userware
    To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013
  • Marcel Heupel, Simon Scerri, Mohamed Bourimi and Do?an Kesdo?an
    Privacy-preserving concepts for supporting recommendations in decentralized OSNs
    Proceedings of the 4th International Workshop on Modeling Social Media / in conjuction with ACM Hypertext 2013, Paris, France
    Download here
  • Fatih Karatas, Thomas Barth, Dogan Kesdogan, Habib M. Fardoun, Pedro G. Villanueva
    Uso de interface distribuída para avaliar a tomada de decis?o na nuvem
    RTI Magazine, January 2013, pp. 82-89. Available online here.
  • Fatih Karatas, Mohamed Bourimi, Dogan Kesdogan
    Towards Visual Configuration Support For Interdependent Security Goals
    To appear in Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International), 2013
  • Fatih Karatas, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Sophie Wrobel
    Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study
    To appear in IEEE Xplore as part of the proceeding of: 10th International Conference on Information Technology : New Generations (ITNG 2013)
  • Fatih Karatas, Dogan Kesdogan
    A Flexible Approach For Considering Interdependent Security Objectives in Service Composition
    Proceedings of the 28th Symposium on Applied Computing (ACM SAC 2013), pp. 1919-1926.
  • Philipp Schwarte, Mohamed Bourimi, Marcel Heupel, Dogan Kesdogan, Rafa Gimenez, Sophie Wrobel, Simon Thiel
    Multilaterally secure communication anonymity in decentralized social networking
    To appear in IEEE Xplore as part of the proceeding of: 10th International Conference on Information Technology : New Generations (ITNG 2013)
  • Sophie Wrobel, Mohamed Bourimi, Marcel Heupel, Fabian Herrmann, Massimo Valla
    Towards a minimal framework considering privacy and data protection goals for social networking platform providers
    The Power of Information Conference '13 Extended Abstracts, Brussels (2013)
    More information
  • F. Karatas, D. Kesdogan: An Approach for Compliance-aware Service Selection with Genetic Algorithms. In Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC 2013). LNCS series, vol. 8274, Springer, Berlin Heidelberg, 2013, pp. 465–473.

  • F. Karatas, M. Bourimi, D. Kesdogan, P. G. Villanueva, H. Fardoun: Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies. In Lozano, M.-D. et al. (eds.): Distributed User Interfaces: Usability and Collaboration. Springer, Berlin Heidelberg, 2013, pp. 119–127.


2012

  • Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Dogan Kesdogan, Marcel Heupel
    A generic location-based mobile application framework supporting privacy-preserving end-user tailorability
    Proceedings of: International Confernce on Future Generation Communication 2012, At London, UK Download Paper
  • Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, D. Abou-Tair, Fabian Hermann and Simon Thiel
    Using distributed user interfaces in collaborative, secure and privacy-preserving software environments
    International Journal of Human-Computer Interaction Volume 28, Issue 11, 2012 Download Paper
  • M. Bourimi, M. Heupel, B. Westermann, D. Kesdogan, R. Gimenez, M. Planagumà, F. Karatas and P. Schwarte
    Towards transparent anonymity for user-controlled servers supporting collaborative scenarios
    Information Technology: New Generations (ITNG), 2012 Ninth International Conference on. Download paper
  • Mohamed Bourimi, Simon Scerri, Keith Cortis, Ismael Rivera, Marcel Heupel, and Simon Thiel
    Integrating multi-source User Data to enhance Privacy in Social Interaction
    Proceedings of the first Joint Conference between the HCI community of Spain and the HCI community of Mexico: Interaccion 2012 and Mexican Conference MexIHC 2012, ACM Digital Library Download Paper
  • Mohamed Bourimi, Pedro Villanueva, Yassin Daanoun and Medya Miran
    Towards better support for collaborative research by using DUIs with mobile devices: SocialTV navigation design case study
    Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 9-12, ISBN-10: 84-695-3318-5 , Download proceedings
  • Lars Fischer, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Rafael Gimenez
    Enhancing Privacy in Collaborative Scenarios Utilising a Flexible Proxy Layer
    Proceedings of: International Confernce on Future Generation Communication 2012, At London, UK Download Paper
  • J. Gulden, T. Barth, F. Karatas and D. Kesdogan
    Erh?hung der Sicherheit von Lebensmittelwarenketten durch Modell-getriebene Prozess-Implementierung
    Angenommen bei der MKWI 2012, Teilkonferenz "Kommunikations- und Kooperationssysteme, Track "Digitale Netzwerke in unsicheren Umwelten", 29.2.-2.3.2012 in Braunschweig
  • M. Heupel, M. Bourimi, D. Kesdogan, T. Barth, P. Schwarte and P. G. Villanueva
    Enhancing security and usability of DUI based collaboration with proof based credential systems
    Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 23-26, ISBN-10: 84-695-3318-5 , Download proceedings
  • Marcel Heupel, Lars Fischer, Mohamed Bourimi, Dogan Kesdogan, Simon Scerri, Fabian Hermann and Rafael Gimenez
    Context-aware, trust-based access control for the digital.me userware
    New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on. Download paper
  • F. Karatas, T. Barth, D. Kesdogan, H. M. Fardoun and P. G. Villanueva
    Using Distributed User Interfaces to Evaluate Decision Making in Cloud Deployment
    Proceedings of the Distributed User Interfaces 2012 CHI Workshop, held in conjunction with 2012 CHI conference, 17-22, ISBN-10: 84-695-3318-5 , Download proceedings
  • Fatih Karatas, Mohamed Bourimi, Thomas Barth, Dogan Kesdogan, Rafael Gimenez, Widura Schwittek, and Marc Planaguma
    Towards Secure and At-Runtime Tailorable Customer-Driven Public Cloud Deployment
    Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. Download paper
  • Simon Scerri, Keith Cortis, Ismael Rivera, Fabian Hermann, and Mohamed Bourimi
    di.me: Context-Aware, Privacy-Sensitive Management of the Integrated Personal Information Sphere
    In Proceedings of the EU Project Networking Track at ESWC 2012.
  • Mark Stegelmann and Dogan Kesdogan
    GridPriv: A Smart Metering Architecture Offering k-Anonymity
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, Download paper
  • Mark Stegelmann and Dogan Kesdogan
    Location Privacy for Vehicle-to-Grid Interaction through Battery Management
    Information Technology: New Generations (ITNG), 2012 Ninth International Conference on, Download paper
  • Ricardo Tesoriero, Mohamed Bourimi, Fatih Karatas, Thomas Barth, Pedro G. Villanueva, and Philipp Schwarte
    Model-Driven Privacy and Security in Multi-modal Social Media UIs
    Modeling and Mining Ubiquitous Social Media Lecture Notes in Computer Science Volume 7472, 2012, pp 158-181 . Springer, Heidelberg (2012)Download paper
  • Simon Thiel, Mohamed Bourimi, Rafael Giménez, Simon Scerri, Andreas Schuller, Massimo Valla, Sophie Wrobel, Cristina Frà and Fabian Hermann
    A requirements-driven approach towards decentralized social networks
    Future Information Technology, Application, and Service Lecture Notes in Electrical Engineering, 2012, Volume 164, Part 6, 709-718, DOI: 10.1007/978-94-007-4516-2_75 Download paper

2011

  • Thomas Barth, Thomas Fielenbach, Mohamed Bourimi, Dogan Kesdogan and Pedro G. Villanueva
    Supporting Distributed Decision Making Using Secure Distributed User Interfaces
    Proceedings of Distributed User Interfaces 2011 CHI Workshop, held in conjuction with CHI 2011 conference.
    In J.A. Gallud et al. (eds.), Distributed User Interfaces: Designing Interfaces for the Distributed Ecosystem, Human-Computer Interaction Series ? Springer-Verlag London Limited 2011
    , Download paper
  • M. Bourimi, M. Heupel, D. Kesdogan and T. Fielenbach
    Enhancing Usability of Privacy-Respecting Authentication and Authorization in Mobile Social Settings by Using Idemix
    Scientific research paper (ger. Wissenschaftlicher Artikel) in the context of the EU FP7 project di.me, 2011, OPUS Siegen URL: dokumentix.ub.uni-siegen.de/opus/volltexte/2011/483/ URN-Resolver of the German National Library: nbn-resolving.de/urn:nbn:de:hbz:467-4839
    Download paper
  • Mohamed Bourimi, Simon Scerri, Marc Planaguma, Marcel Heupel, Fatih Karatas and Pillip Schwarte
    A two-level approach to ontology-based access control in pervasive personal servers
    Scientific research paper (ger. Wissenschaftlicher Artikel) in the context of the EU FP7 project di.me, 2011, OPUS Siegen URL: dokumentix.ub.uni-siegen.de/opus/volltexte/2011/578/ URN-Resolver of the German National Library: nbn-resolving.de/urn:nbn:de:hbz:467-5789
    Download paper
  • M. Bourimi, G. Mau, S. Steinmann, D. Klein, S. Templin, D. Kesdogan and H. Schramm-Klein
    A Privacy-Respecting Indoor Localization Approach For Identifying Shopper Paths By Using End-Users Mobile Devices
    in Eighth International Conference on Information Technology: New Generations, (ITNG) 2011
    Download paper
  • Mohamed Bourimi, J?rn Ossowski, Dhiah Abou-Tair, Stephan Berlik and D. Abu-Saymeh
    Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs
    New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, (NTMS) 2011
    Download paper
  • Mohamed Bourimi, Ricardo Tesoriero, Pedro G. Villanueva, Fatih Karatas, Philipp Schwarte
    Privacy and Security in Multi-modal User Interface Modeling for Social Media
    Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom), (SocialCom/PASSAT) 2011
    Download paper
  • Lars Fischer, Do?an Kesdo?an and Laura Dorfer
    Link Globally-Trust Locally
    Federated Social Web Summit, , Berlin (Germany). June 3rd-5th 2011.
    Visit the agenda and download the paper
  • M. Heupel and D. Kesdogan
    Towards usable interfaces for proof based access rights on mobile devices
    OPEN PROBLEMS IN NETWORK SECURITY Lecture Notes in Computer Science, 2011, Volume 7039/2012, 15-27, DOI: 10.1007/978-3-642-27585-2_2
    , Download paper
  • Dang Vinh Pham, Joss Wright, Dogan Kesdogan
    A Practical Complexity-Theoretic Analysis of Mix Systems
    European Symposium on Research in Computer Security (ESORICS). LNCS Volume 6879. 2011
  • Simon Scerri, Rafael Gimenez, Fabian Herman, Mohamed Bourimi and Simon Thiel
    digital.me, towards an integrated Personal Information Sphere
    Federated Social Web Summit, , Berlin (Germany). June 3rd-5th 2011.
    Visit the agenda and download the paper
  • S. Steinmann, G. Mau, M. Bourimi, H. Schramm-Klein and D. Kesdogan
    TRACKING SHOPPERS BEHAVIOR AT THE POINT OF SALE BY USING END-USERS MOBILE DEVICES
    40th EMAC International Conference, New Technologies and E-Marketing Track, 2011
    Click here for more information
  • Benedikt Westermann, Lars Fischer, Dang Vinh Pham
    50 Bucks Attack on Tor
    Nordic Conference in Secure IT Systems (NordSec). 2011
  • B. Westermann and D. Kesdogan
    Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection
    To appear 15th Internation Conference on Financial Cryptography and Data Security (FC2011). Feb, 2011.
  • Bernd Uebersch?r, Widura Schwittek, Stefan Eicker, Mohamed Bourimi, Marcel Heupel and Dogan Kesdogan
    Mobile applications for the angling community
    To appear in the proceedings of 6th World Recreational Fishing Conference, August 1-4, 2011, Berlin
    Click here for more information

2010

  • M. Bourimi, T. Barth, J. M. Haake, B. Uebersch?r and D. Kesdogan
    AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies
    Published in Proceedings of the 3rd Conference on Human-Centred Software Engineering (HCSE), 2010
    Download paper
  • Mohamed Bourimi, J?rg M. Haake, Marcel Heupel Bernd Uebersch?r, Dogan Kesdogan and Thomas Barth
    Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture
    To appear in the International Journal for Infonomics (IJI), Volume 3, Issue 4, p. 563 - 572, December 2010
    Click here for more information (author list not yet updated!)
  • M. Bourimi, D. Kesdogan, T. Barth, K. H?fke and D. Abou-Tair.
    Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy
    Published in Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on , 2010
    Download paper
  • M. Bourimi, B. Ueberschaer, E. Ganglbauer, D. Kesdogan, T. Barth, J. Dax and M. Heupel.
    Building Usable and Privacy-Preserving Mobile Collaborative Applications for Real-Life Communities: A Case Study Based Report
    Published in Proceedings of International Conference on Information Society (i-Society), 2010
    Download paper
  • J. Dax, M. Heupel, M. Bourimi and D. Kesdogan.
    Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone
    Essener Workshop zur Netzsicherheit 2010 (EWNS10), 2010
    Click here for more information
  • M. Heupel
    Porting and evaluating the performance of IDEMIX and TOR anonymity on modern smartphones
    Diploma thesis, in the context of the digital.me project
    Download thesis
  • B. Westermann, R. Wendolsky, L. Pimenidis and D. Kesdogan.
    Cryptographic Protocol Analysis of AN.ON
    Appeared in Proceedings of the 14th International Conference of Financial Cryptography and Data Security, 2010
    Download paper
  • B. Westermann and D. Kesdogan.
    Introducing Perfect Forward Secrecy for AN.ON
    Appeared in Proceedings of Eunice 2010
    Download paper

2009

  • D. el Diehn I. Abou-Tair, L. Pimenidis, J. Schomburg and B. Westermann.
    Usability Inspection of Anonymity Networks
    Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, August 25-27, Saint John, New Brunswick, Canada, 2009.
    Download paper
  • M. Bourimi, T. Barth, B. Uebersch?r and D. Kesdogan.
    Towards Building User-Centric Privacy-Respecting Collaborative Applications
    International Conference on Intelligent Interactive Assistance and Mobile Multimedia Computing,
    CCIS 53, Springer-Verlag, Berlin, 2009, pp. 390-340.
    Download paper
  • M. Bourimi, F. Kühnel, J. M. Haake, D. el Diehn I. Abou-Tair and D. Kesdogan.
    Tailoring collaboration according privacy needs in real-identity collaborative systems
    In the 15th Collaboration Researchers' International Workshop on Groupware, CRIWG 2009, September 13-17, Peso da Régua, Douro, Portugal, volume 5784 of Lecture Notes in Computer Science, pages 110–125. Springer, 2009.
    Download paper
  • L. Boursas, M. Bourimi, W. Hommel and D. Kesdogan.
    Enhancing Trust in SOA Based Collaborative Environments
    3rd International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud, Springer Verlag, Berlin, 2009.
    Download paper
  • J. Camenisch and D. Kesdogan.
    iNetSec 2009-Open Research Problems in Network Security
    In Proceedings of IFIP WG 11.4 International Workshop Zurich, Switzerland, April 2009
  • A. Panchenko, B. Westermann, L. Pimenidis and C. Andersson.
    SHALON: Lightweight Anonymization based on Open Standards
    Proceedings of 18th Internatonal Conference on Computer Communications and Networks, 2009.
    Download paper
  • V. Pham and D. Kesdogan.
    A Combinatorial Approach for an Anonymity Metric
    Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, 1-3 July 2009.
  • V. Pham and J. Wright.
    Discussing Anonymity Metrics for Mix Based Anonymity Approaches
    iNetSec 2009 - Open Research Problems in Network Security, Zurich, Switzerland, April 2009.
  • B. Westermann.
    Security Analysis of AN.ON’s Payment Scheme
    Proceedings of NordSec, 2009.
    Download paper
  • B. Westermann, A. Panchenko and L. Pimenidis.
    A Kademlia-based Node Lookup System for Anonymization Networks
    Proceedings of International Conference on Information Security and Assurance, 2009.
    Download paper

2008

  • L. Pimenidis, B. Westermann and V. Wetzelaer.
    A Context Aware Network-IDS
    Proceedings of the 13th Nordic Workshop on Secure IT Systems, 2008
    Download paper
  • D. Kesdogan, V. Pham and L. Pimenidis.
    Analyse der Verkettbarkeit in nutzergesteuertem Identit?tsmanagement
    In Proceedings of Fachtagung GI Sicherheit, Saarbrücken, Germany, 2008.
  • D. el D. I. Abou-Tair.
    An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.
    Dissertation, Aachen, Germany, Shaker Verlag, Informatik, ISBN 978-3-8322-7817-5, 2008.
  • V. Pham.
    Analysis of the Anonymity Set of Chaumian Mixes
    In Proceedings of 13th Nordic Workshop on Secure IT-Systems, Kongens Lyngby, Denmark, 9-10 October 2008.
  • B. Westermann.
    Ein einfaches Anonymisierungsverfahren basierend auf offenen Standards
    In Informatiktage, pages 231–233, 2008.
  • B. Westermann.
    Entwicklung und Evaluation eines einfachen und effizienten Anonymisierungsverfahrens basierend auf offenen Standards
    Master's thesis, RWTH Aachen, Januar 2008.

2007

  • D. Kesdogan, V. Pham and L. Pimenidis.
    Information Disclosure in Identity Management
    In Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007.
  • D. el Diehn I. Abou-Tair, S. Berlik and U. Kelter.
    Enforcing Privacy by Means of an Ontology Driven XACML Framework.
    In The Third International Symposium on Information Assurance and Security, IAS 2007, Aug 29 - Aug 31, Manchester, United Kingdom, pages 279-284, IEEE CS Press, 2007.

2006

  • Zinaida Benenson, Milan Fort, Felix Freiling, Dogan Kesdogan, Lucia Draque Penso
    TrustedPals: Secure Multiparty Computation Implemented with SmartCards
    ESORICS 2006: 11th European Symposium On Research In Computer Security, Hamburg, Germany, September 18-20, 2006.
  • Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
    Fundamental Limits on the Anonymity Provided by the MIX Technique
    The 2006 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2006
  • Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
    Safety, Liveness, and Information Flow: Dependability Revisited
    ARCS Workshop: Dependability and Fault Tolerance, Frankfurt 2006.
  • Dogan Kesdogan, Charles Palmer
    Technical Challenges of Network Anonymity
    Computer Communications, Internet Security, Elsevier, Volume 29, Issue 3, 1 February 2006, Pages 306-324
  • Sebastian Clau?, Dogan Kesdogan, Tobias K?lsch, Lexi Pimenidis, Stefan Schiffner, Sandra Steinbrecher
    Identit?tsmanagement und das Risiko der Re-Identifikation
    Sicherheit 2006, 3. Jahrestagung, Fachbereich Sicherheit der Gesellschaft für Informatik, Magdeburg, Februray 2006.
  • D. el Diehn I. Abou-Tair and J. Niere.
    An Architecture for Integrating Heterogeneous University Applications that Supports Monitoring.
    In The 2nd International Conference on Trends in Enterprise Application Architecture, TEAA 2006, Nov 29 - Dec 1, Berlin, Germany, volume 4473 of Lecture Notes in Computer Science, pages 16-24, 2006. Springer-Verlag Berlin Heidelberg, 2006.
  • D. el Diehn I. Abou-Tair and S. Berlik.
    An ontology-based approach for managing and maintaining privacy in information systems.
    In The 5th Int. Conf. on Ontologies, DataBases, and Applications of Semantics, ODBASE 2006, Oct 31 - Nov 2, Montpellier, France, volume 4275 of Lecture Notes in Computer Science, pages 983-994, 2006. Springer-Verlag Berlin Heidelberg, 2006.
  • D. el Diehn I. Abou-Tair
    A Framework Ensuring Privacy in a Distributed Environment.
    In The 4th Annual Conference on Privacy, Security and Trust, PST 2006, Oct 30 - Nov 1, Markham/Toronto, Ontario, Canada

2005

  • Sebastian Clau?, Dogan Kesdogan, Tobias K?lsch, Lexi Pimenidis, Stefan Schiffner, Sandra Steinbrecher
    Privacy Enhanced Identity Management: Design Considerations and Open Problems
    ACM CCS2005 Workshop on Digital Identity Management, Fairfax, USA. November 2005
  • Dogan Kesdogan, Lexi Pimenidis, Tobias K?lsch
    Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis
    First Workshop on Quality of Protection, Milan, Italy. September 2005
  • Dogan Kesdogan, Lexi Pimenidis
    The Lower Bound of Attacks on Anonymity Systems -- A Unicity Distance Approach
    First Workshop on Quality of Protection, Milan, Italy. September 2005
  • Tobias K?lsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
    Mit IDM und Mittler zu mehr Privatsph?re in LBS.
    Ortsbezogene Anwendungen und Dienste, Fachgespr?ch der GI-Fachgruppe KuVS
    Download paper
  • Tobias K?lsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
    Privacy for Profitable Location Based Services
    2nd International Conference on Security in Pervasive Computing Boppard, Lecture Notes on Computer Science (LNCS), Germany, April 2005
  • Dogan Kesdogan, O. Rattay
    Security Evaluation of Anonymity Techniques (in German)
    SICHERHEIT 2005, 2. Jahrestagung, GI Fachbereich Sicherheit, Vol.P-62, April 2005
    Download paper
  • Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
    Secure Multi-Party Computation with Security Modules
    SICHERHEIT 2005, 2. Jahrestagung, GI Fachbereich Sicherheit, Vol.P-62, April 2005
    Download paper
  • Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
    An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks
    2nd European Workshop on Wireless Sensor Networks (EWSN) 2005, January 2005
    Download paper

2004

  • Zinaida Benenson, Felix G?rtner, Dogan Kesdogan
    User Authentication in Sensor Networks (extended abstract)
    Proceedings of Informatik 2004, Workshop on Sensor Networks, GI-Edition, Lecture Notes in Informatics (LNI), Vol. 51, September 2004
    Download paper
  • Dogan Kesdogan, Lexi Pimenidis
    The Hitting Set Attack on Anonymity Protocols
    6th International Workshop on Information Hiding, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Toronto, Canada, May 2004
    Download paper

2003

  • Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
    Probabilistic Treatment of MIXes to Hamper Traffic Analysis
    The 2003 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2003
    Download paper
  • Dakshi Agrawal, Dogan Kesdogan
    How to Measure Anonymity: The Disclosure Attack
    IEEE Security & Privacy Magazine, Nov.-Dec. 2003, Volume 1, Nr. 6
    Download paper

2002

  • Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
    Limits of Anonymity in Open Environments
    5th International Workshop on Information Hiding, Lecture Notes in Computer Science (LNCS) 2119, Springer-Verlag, Noordwijkerhout, The Netherlands, October 2002
    Download paper
  • Dogan Kesdogan, Mark Borning, Michael Schmeink
    Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?
    Workshop on Privacy Enhancing Technologies 2002 (PET 2002), San Francisco, CA, USA, Lecture Notes in Computer Science (LNCS) 2482, Springer-Verlag, April 2002
    Download paper
  • D. el Diehn I. Abou-Tair
    ECS-Conceptualization and Realization of Profile based Cross-Medial Events Calendar System.
    Master's thesis -Diplomarbeit-, Universitaet Dortmund, Fachbereich Informatik, July 2002.

2001

  • Kathy Bohrer, Xuan Liu, Dogan Kesdogan, Edith Schonberg, Moninder Singh, Susan L. Spraragen
    Personal Information Management and Distribution
    The Fourth International Conference on Electronic Commerce Research (ICECR-4) Dallas, TX, USA, November 2001
    Download paper
  • Kathy Bohrer, Xuan Liu, Dogan Kesdogan, Edith Schonberg, Moninder Singh
    How to go Shopping on the World Wide Web without having your Privacy Violated
    The Fourth International Conference on Electronic Commerce Research (ICECR-4) Dallas, TX, USA, November 2001
  • Mark Borning, Dogan Kesdogan
    Privacy in E-Commerce
    International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES), IEEE, RA, September 2-6 2001, Malta
    Download paper
  • Dogan Kesdogan
    Evaluation of Anonymity Providing Techniques using Queuning Theory
    The 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), Tampa, Florida, November 2001
    Download paper
  • Dogan Kesdogan, Mark Borning, Michael Schmeink
    Anonymous Surfing on the World Wide Web (in German)
    Verl?ssliche IT-Systeme 2001 (VIS 2001), Vieweg Verlag, Wiesbaden, Germany, 2001
    Download paper
  • Mark Borning, Dogan Kesdogan, Otto Spaniol
    Anonymity and unobservability (in German)
    it - Information Technology, Nr. 43/5, 2001
    Download paper
  • Dogan Kesdogan
    System, Method, and Business Methods for Enforcing Privacy Preferences on Personal-Data Exchanges Across a Network[Patent]
    September 2001 (IBM MyPrivacy Group)
  • Dogan Kesdogan
    Using an Object Model to Improve Handling of Personally Identifiable Information[Patent]
    June 2001 (IBM Enterprise Privacy Architecture (EPA) Group)
  • Dogan Kesdogan
    Using a Rules Model to Improve Handling of Personally Identifiable Information[Patent]
    June 2001 (IBM Enterprise Privacy Architecture (EPA) Group)
  • PG Sword
    Dragon Slayer SWORD - Secure WAN Object Request Distribution.
    Interne Berichte, Universitaet Dortmund, Fachbereich Informatik, March 2001.

2000

  • Dogan Kesdogan, M. Sch?ffter
    Overview and Evaluation of VPN Solutions (in German)
    7th Workshop on 'Sicherheit in vernetzten Systemen', DFN-CERT, Hamburg, Germany, March 2000

1999

  • Dogan Kesdogan
    Privacy in Internet:Confidential communication in Open Environments (in German) [monography]
    Verlag Vieweg, 1999, ISBN 3-528-05731-9
  • Dogan Kesdogan, Roland Büschkes
    Classification of Anonymization Techniques (in German)
    Sicherheitsinfrastrukturen 1999 (SiS 1999), Vieweg Verlag, DuD-Fachbeitr?ge, 1999
    Download paper
  • Dogan Kesdogan, Andrei Trofimov, Dirk Trossen
    Strategies for Minimizing the Average Cost of Paging on the Air Interface
    Kommunikation in Verteilten Systemen 1999 (KiVS'99), Darmstadt, Springer-Verlag, March 1999
    Download paper
  • Roland Büschkes, Mark Borning, Dogan Kesdogan
    Transaction-based Anomaly Detection
    1st USENIX Workshop on Intrusion Detection and Network Monitoring , Santa Clara, California, USA, April 1999
    Download paper
  • Roland Büschkes, Tobias Haustein, Dogan Kesdogan
    Active Intrusion Detection - An Approach To Dynamic Risk Management
    Proceedings of NORDSEC'99, Kista Science Park, Sweden, November 1999
  • Roland Büschkes, Dogan Kesdogan
    Privacy Enhanced Intrusion Detection, in: Multilateral Security in Communications
    Addison-Wesley, 1999
    Download paper
  • Dogan Kesdogan, Roland Büschkes, Otto Spaniol
    Stop-And-Go-MIXes Providing Pro-babilistic Anonymity in an Open System: Multilateral Security in Communications
    Addison-Wesley, 1999

1998

  • Roland Büschkes, Dogan Kesdogan
    Intrusion Detection and User Privacy - A Natural Contradiction?
    International Symposium on Recent Advances in intrusion Detection 1998 (RAID 98), Louvain-la-Neuve, Belgium, September 1998
  • Dogan Kesdogan, Peter Reichl, Klaus Jungh?rtchen
    Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks
    European Symposium on Research in Computer Science 1998 (ESORICS'98 ), Louvain-la-Neuve, Belgium, Lecture Notes in Computer Science (LNCS) 1485, Springer-Verlag, 1998
    Download paper
  • Roland Büschkes, Dogan Kesdogan, Peter Reichl
    How to Increase Security in Mobile Networks by Anomaly Detection
    Proceedings of the 14th Annual Computer Security Applications Conference, ACM Special Interest Group on Security, Audit and Control, Phoenix, Arizona, USA, 1998
    Download paper
  • Dogan Kesdogan, Jan Egner, Roland Büschkes
    Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System
    Proceedings of the Second Workshop on Information Hiding (IHW98), Portland, Oregon, USA, Lecture Notes in Computer Science (LNCS) 1525, Springer-Verlag, 1998
    Download paper
  • Peter Reichl, Dogan Kesdogan, Klaus Jungh?rtchen, Marko Schuba
    Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks
    Computer Performance Evaluation - Modelling Techniques and Tools, Lecture Notes in Computer Science (LNCS) 1469, Springer-Verlag, 1998
    Download paper

1997

  • Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Dirk Trossen
    Minimizing the Average Cost of Paging on the Air Interface - An Approach Considering Privacy
    IEEE 47th Annual International Vehicular Technology Conference (VTC 97), Phoenix, Arizona, May 1997
    Download paper
  • Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Otto Spaniol
    Mobile communication Without Movement Profiles (in German) in: Multilateral Security in Communications
    Addison-Wesley, 1997
  • Reiner Sailer, Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
    Security Functions in Telecommunications: Placement & Achievable Security: Multilateral Security in Communications
    Addison-Wesley, 1997
    Download paper

1996

  • Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Location Management Strategies increasing Privacy in Mobile Communication Systems
    12th International Information Security Conference (IFIP SEC '96), Information Systems Security: Facing the Information Society of the 21st Century, Samos, Greece, Chapman & Hall, May 1996
    Download paper
  • Dogan Kesdogan, Margarethe Zywiecki, Klaus Beulen
    Mobile User Profile Generation - A Challenge between Performance and Security
    Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications, December 1996
    Download paper
  • Andreas Fasbender, Dogan Kesdogan, Olaf Kubitz
    Variable and Scaleable Security Protection of Location Information in Mobile-IP
    IEEE VTS, 46th Vehicular Technology Conference (VTC 96), Atlanta, GA, April 1996
    Download paper
  • Andreas Fasbender, Dogan Kesdogan, Olaf Kubitz
    Analysis of Security and Privacy in Mobile-IP
    Fourth International Conference on Telecommunication Systems 96, Modelling and Analysis, Nashville, TN, March 1996
  • Simon Hoff, Kai Jakobs, Dogan Kesdogan
    Secure Location Management in UMTS, Communications and Multimedia Security
    Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, Chapman & Hall, September 1996
    Download paper
  • Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Otto Spaniol
    Mobile Communication without mobile user profile generation (in German)
    it-Information Technology 4/96, Nr. 38/4, 1996
  • Andreas Bertsch, Herbert Damker, Hannes Federrath, Dogan Kesdogan, Michael J. Schneider
    Personal Reachability and Security Management (in German)
    PIK 4/95, Nr. 18/3
    Download paper

1995

  • Dogan Kesdogan, Xavier Fouletier
    Secure Location Information Management in Cellular Radio Systems
    IEEE Wireless Communication Systems Symposium WCSS?95 'Wireless Trends in 21st Century', NY, USA, November 1995
    Download paper
  • Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
    Security in GSM-Networks
    Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications 1995 (PWC 95), Prag 1995
    Download paper
  • Dogan Kesdogan
    Architectural Considerations Increasing Privacy in Mobile Communication Systems (short presentation)
    Proceedings of the IFIP TC6/TC11 and Austrian Computer Society joint working Conference on Communications and Multimedia Security, Graz, Austria, September 1995
  • Hannes Federrath, Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann
    Security and Privacy in Public Radio Networks
    Scientific Magazine TU-Dresden, 44, Nr. 6, 1995 (revised Version of [32])
    Download paper


  1. Fakult?t für Informatik und Data Science
  2. Institut für Wirtschaftsinformatik