Dogan Kesdogan

Orcid: 0009-0003-6970-9544

According to our database1, Dogan Kesdogan authored at least 90 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detecting Web Tracking at the Network Layer.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Smart Noise Detection for Statistical Disclosure Attacks.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Effect of Group Based Synchronization on User Anonymity in Mix Networks.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2021
DaRoute: Inferring trajectories from zero-permission smartphone sensors.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

How to apply Database Anonymity Notions to Mix Networks.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

2020
CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS.
Proceedings of the Seventh International Conference on Social Networks Analysis, 2020

Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Harmonized Group Mix for ITS.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management.
Proceedings of the Data Management Technologies and Applications, 2020

iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management.
Proceedings of the 9th International Conference on Data Science, 2020

2019
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches.
Proceedings of the Secure IT Systems, 2019

2018
A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones.
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018

MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

Towards a causality based analysis of anonymity protection in indeterministic mix systems.
Comput. Secur., 2017

PARTS - Privacy-Aware Routing with Transportation Subgraphs.
Proceedings of the Secure IT Systems, 2017

2015
Service composition with consideration of interdependent security objectives.
Sci. Comput. Program., 2015

Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
The di.me Trust Approach for Supporting Collaborative Scenarios.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies.
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013

Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control.
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013

PETs at CSCL Service: Underutilised Potentials for Privacy Enhancing Distance Education.
J. Univers. Comput. Sci., 2013

A flexible approach for considering interdependent security objectives in service composition.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Multilaterally Secure Communication Anonymity in Decentralized Social Networking.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

An Approach for Compliance-Aware Service Selection with Genetic Algorithms.
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013

Privacy-preserving concepts for supporting recommendations in decentralized OSNs.
Proceedings of the 4th International Workshop on Modeling Social Media, 2013

Towards Visual Configuration Support for Interdependent Security Goals.
Proceedings of the Online Communities and Social Computing, 2013

Trust and Privacy in the di.me Userware.
Proceedings of the Human-Computer Interaction. Users and Contexts of Use, 2013

Experiences by Using AFFINE for Building Collaborative Applications for Online Communities.
Proceedings of the Online Communities and Social Computing, 2013

2012
Using Distributed User Interfaces in Collaborative, Secure, and Privacy-Preserving Software Environments.
Int. J. Hum. Comput. Interact., 2012

GridPriv: A Smart Metering Architecture Offering k-Anonymity.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards secure and at-runtime tailorable customer-driven public cloud deployment.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Context-Aware, Trust-Based Access Control for the di.me Userware.
Proceedings of the 5th International Conference on New Technologies, 2012

Erhöhung der Sicherheit von Lebensmittelwarenkettendurch Modell-getriebene Prozess-Implementierung.
Proceedings of the Multikonferenz Wirtschaftsinformatik 2012: Tagungsband der MKWI 2012, Braunschweig, Germany, February 29, 2012

Location Privacy for Vehicle-to-Grid Interaction through Battery Management.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Enhancing privacy in collaborative scenarios utilising a flexible proxy layer.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

A generic location-based mobile application framework supporting privacy-preserving end-user tailorability.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Supporting Distributed Decision Making Using Secure Distributed User Interfaces.
Proceedings of the Distributed User Interfaces, 2011

Analyzing the Gold Star Scheme in a Split Tor Network.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection.
Proceedings of the Financial Cryptography and Data Security, 2011

Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

A Practical Complexity-Theoretic Analysis of Mix Systems.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Evaluating Potentials of Internet- and Web-based Socialtv in the Light of Privacy.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Introducing Perfect Forward Secrecy for AN.ON.
Proceedings of the Networked Services and Applications, 2010

AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010

Cryptographic Protocol Analysis of AN.ON.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Enhancing Trust in SOA Based Collaborative Environments.
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009

Towards Building User-Centric Privacy-Respecting Collaborative Applications.
Proceedings of the Intelligent Interactive Assistance and Mobile Multimedia Computing, 2009

Breaking Anonymity by Learning a Unique Minimum Hitting Set.
Proceedings of the Computer Science, 2009

Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems.
Proceedings of the Groupware: Design, Implementation, and Use, 15th International Workshop, 2009

A Combinatorial Approach for an Anonymity Metric.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2006
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Technical challenges of network anonymity.
Comput. Commun., 2006

Fundamental Limits on the Anonymity Provided by the MIX Technique.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Identitätsmanagement und das Risiko der Re-Identifikation.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Proceedings of the Computer Security, 2006

Safety, Liveness, and Information Flow: Dependability Revisited.
Proceedings of the ARCS 2006, 2006

2005
Privacy for Profitable Location Based Services.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Secure Multi-Party Computation with Security Modules.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

An algorithmic framework for robust access control in wireless sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

Privacy enhancing identity management: protection against re-identification and profiling.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

2004
The Hitting Set Attack on Anonymity Protocols.
Proceedings of the Information Hiding, 6th International Workshop, 2004

User Authentication in Sensor Networks.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

2003
Measuring Anonymity: The Disclosure Attack.
IEEE Secur. Priv., 2003

Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

2002
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Limits of Anonymity in Open Environments.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet).
Informationstechnik Tech. Inform., 2001

Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

1999
Strategies for Minimizing the Average Cost of Paging on the Air Interface.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

Transaction-based Anomaly Detection.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

Privacy im Internet - vertrauenswürdige Kommunikation in offenen Umgebungen.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05731-2, 1999

1998
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System.
Proceedings of the Information Hiding, 1998

Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks.
Proceedings of the Computer Security, 1998

Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998

How to Increase Security in Mobile Networks by Anomaly Detection.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1996
Mobilkommunikation ohne Bewegungsprofile.
Informationstechnik Tech. Inform., 1996

Location management strategies increasing privacy in mobile communication.
Proceedings of the Information Systems Security, 1996

Anonymous Mobility Management for Third Generation Mobile Networks.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Erreichbarkeitsmanagement.
Prax. Inf.verarb. Kommun., 1995


  Loading...