Dogan Kesdogan
Orcid: 0009-0003-6970-9544
According to our database1,
Dogan Kesdogan
authored at least 90 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021
2020
Proceedings of the Seventh International Conference on Social Networks Analysis, 2020
Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management.
Proceedings of the Data Management Technologies and Applications, 2020
iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management.
Proceedings of the 9th International Conference on Data Science, 2020
2019
Proceedings of the Secure IT Systems, 2019
2018
A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones.
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
2017
CoRR, 2017
Towards a causality based analysis of anonymity protection in indeterministic mix systems.
Comput. Secur., 2017
Proceedings of the Secure IT Systems, 2017
2015
Sci. Comput. Program., 2015
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
2013
Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies.
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013
Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control.
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013
PETs at CSCL Service: Underutilised Potentials for Privacy Enhancing Distance Education.
J. Univers. Comput. Sci., 2013
A flexible approach for considering interdependent security objectives in service composition.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013
Proceedings of the 4th International Workshop on Modeling Social Media, 2013
Proceedings of the Online Communities and Social Computing, 2013
Proceedings of the Human-Computer Interaction. Users and Contexts of Use, 2013
Experiences by Using AFFINE for Building Collaborative Applications for Online Communities.
Proceedings of the Online Communities and Social Computing, 2013
2012
Using Distributed User Interfaces in Collaborative, Secure, and Privacy-Preserving Software Environments.
Int. J. Hum. Comput. Interact., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Erhöhung der Sicherheit von Lebensmittelwarenkettendurch Modell-getriebene Prozess-Implementierung.
Proceedings of the Multikonferenz Wirtschaftsinformatik 2012: Tagungsband der MKWI 2012, Braunschweig, Germany, February 29, 2012
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012
A generic location-based mobile application framework supporting privacy-preserving end-user tailorability.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Proceedings of the Distributed User Interfaces, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Networked Services and Applications, 2010
AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009
Proceedings of the Intelligent Interactive Assistance and Mobile Multimedia Computing, 2009
Proceedings of the Computer Science, 2009
Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems.
Proceedings of the Groupware: Design, Implementation, and Use, 15th International Workshop, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Computer Security, 2006
Proceedings of the ARCS 2006, 2006
2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
Privacy enhancing identity management: protection against re-identification and profiling.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
2004
Proceedings of the Information Hiding, 6th International Workshop, 2004
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
2002
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet).
Informationstechnik Tech. Inform., 2001
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
1999
Proceedings of the Kommunikation in Verteilten Systemen, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05731-2, 1999
1998
Proceedings of the Information Hiding, 1998
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks.
Proceedings of the Computer Security, 1998
Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1996
Location management strategies increasing privacy in mobile communication.
Proceedings of the Information Systems Security, 1996
Anonymous Mobility Management for Third Generation Mobile Networks.
Proceedings of the Communications and Multimedia Security II, 1996
1995