Fischer, Lars, Kesdogan, Dogan und Dorfer, Laura (2011). Link Globally - Trust Locally.
Federated Social Web Summit Europe 2011.
Uebersch?r, Bernd, Schwittek, Widura, Eicker, Stefan, Bourimi, Mohamed, Heupel, Marcel und Kesdogan, Dogan (2011). Mobile applications for the angling community.
6th World Recreational Fishing Conference (WRFC).
Barth, Thomas, Fielenbach, Thomas, Bourimi, Mohamed, Kesdogan, Dogan und Villanueva, Pedro G. (2011). Supporting Distributed Decision Making Using Secure Distributed User Interfaces.
in: José A. Gallud (eds.) Distributed User Interfaces : Designing Interfaces for the Distributed Ecosystem. Springer London, London, 177—184.
Steinmann, S., Mau, G., Bourimi, Mohamed, Schramm-Klein, H. und Kesdogan, Dogan (2011). Tracking Shoppers Behavior At The Point Of Sale By Using End-Users Mobile Devices.
40. EMAC International Conference, New Technologies and E-Marketing Track.
Bourimi, Mohamed, Barth, Thomas, Haake, J. M., Uebersch?r, Bernd und Kesdogan, Dogan (2010). AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies.
, 6409 Human-Centred Software Engineering. Third International Conference, HCSE 2010, Reykjavik, Iceland, October 14-15, 2010. Proceedings. Springer, Berlin, 182—189.
Bourimi, Mohamed, Uebersch?r, Bernd, Ganglbauer, E., Kesdogan, Dogan, Barth, Thomas, Dax, J. und Heupel, Marcel (2010). Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report.
International Conference on Information Society (i-Society), London, 28-30 June 2010. IEEE
Westermann, Benedikt, Wendolsky, R., Pimenidis, L. und Kesdogan, Dogan (2010). Cryptographic Protocol Analysis of AN.ON.
, 6052 Financial Cryptography and Data Security. 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers. Springer, Berlin, 114—128.
Dax, J., Heupel, Marcel, Bourimi, Mohamed und Kesdogan, Dogan (2010). Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone.
Sichere Mobilit?t und Dienstnutzung in künftigen Netzen. 4 . Essener Workshop ? Neue Herausforderungen in der Netzsicherheit ?, 15. /16. April 2010. Abstracts. Univ. Duisburg-Essen, 22—23.
Bourimi, Mohamed, Haake, J. M., Heupel, Marcel, Uebersch?r, Bernd, Kesdogan, Dogan und Barth, Thomas (2010). Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture.
International Journal for Infonomics, 3 (4) Infonomics Society, 563—572.
Bourimi, Mohamed, Kesdogan, Dogan, Barth, Thomas, H?fke, K. und Abou-Tair, Dhiah (2010). Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy.
IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, 20-22 Aug. 2010. IEEE
Westermann, Benedikt und Kesdogan, Dogan (2010). Introducing Perfect Forward Secrecy for AN.ON.
, 6164 Networked Services and Applications - Engineering, Control and Management. 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings. Springer, Berlin, 132—142.
Pham, Dang Vinh und Kesdogan, Dogan (2009). A Combinatorial Approach for an Anonymity Metric.
, 5594 Information Security and Privacy. 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Springer, Berlin, 26—43.
Camenisch, Jan und Kesdogan, Dogan (2009). iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers.
, 309 in: Jan Camenisch and Dogan Kesdogan (eds.) Springer, Berlin
Bourimi, Mohamed, Kühnel, Falk, Haake, J. M., Abou-Tair, Dhiah und Kesdogan, Dogan (2009). Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems.
, 5784 Groupware: Design, Implementation, and Use: 15th International Workshop, CRIWG 2009, Peso da Régua, Douro, Portugal, September 13-17, 2009. Proceedings. Springer, Berlin, 100—125.
Bourimi, Mohamed, Barth, Thomas, Uebersch?r, Bernd und Kesdogan, Dogan (2009). Towards Building User-Centric Privacy-Respecting Collaborative Applications.
, 53 Intelligent Interactive Assistance and Mobile Multimedia Computing: International Conference, IMC 2009, Rostock-Warnemünde, Germany, November 9-11, 2009. Proceedings. Springer, Berlin, 341—342.
Kesdogan, Dogan, Pham, Dang Vinh und Pimenidis, L. (2008). Analyse der Verkettbarkeit in nutzergesteuertem Identit?tsmanagement.
Sicherheit 2008: Tagung der Fachgruppe Sicherheit, Schutz und Zuverl?ssigkeit in der Gesellschaft für Informatik.
Pham, Dang Vinh, Kesdogan, Dogan und Pimenidis, Lexi (2008). Analyse der Verkettbarkeit in nutzergesteuerten Identitit?tsmanagementsystemen.
, 128 in: Ammar Alkassar (eds.) Sicherheit 2008: Sicherheit, Schutz und Zuverl?ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss. Ges. f. Informatik, Bonn, 17 — 30.
Pham, Vinh, Kesdogan, Dogan und Pimenidis, Lexi (2008). Information Disclosure in Identity Management.
13th Nordic Conference in Secure IT Systems.
Kesdogan, Dogan, Pham, Vinh und Pimenidis, L. (2007). Information Disclosure in Identity Management.
Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007.
Kesdogan, Dogan, Agrawal, Dakshi, Pham, Vinh und Rautenbach, Dieter (2006). Fundamental limits on the anonymity provided by the MIX technique.
Symposium on Security and Privacy, 21-24 May 2006, Berkeley/Oakland, CA, USA. IEEE, 14—99.
Clau?, Sebastian, Kesdogan, Dogan, K?lsch, Tobias, Pimenidis, L., Schiffner, Stefan und Steinbrecher, Sandra (2006). Identit?tsmanagement und das Risiko der Re-Identifikation.
, 77 in: Jana Dittmann (eds.) Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006. Ges. f. Informatik, Bonn, 188—191.
Kesdogan, Dogan, K?lsch, Tobias und Pimenidis, Lexi (2006). Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis.
, 23 Quality of Protection. Security Measurements and Metrics. Springer, Berlin, 159—171.
Benenson, Zinaida, Freiling, Felix C., Holz, Thorsten, Kesdogan, Dogan und Penso, Lucia Draque (2006). Safety, Liveness, and Information Flow: Dependability Revisited.
, 81 ARCS '06, 19th International Conference on Architecture of Computing Systems : March 16, 2006, Frankfurt am Main. Workshop proceedings. Ges. f. Informatik, Bonn, 56—65.
Kesdogan, Dogan und Palmer, C. (2006). Technical challenges of network anonymity.
Computer Communications, 29 (3) Elsevier, 306—324.
Kesdogan, Dogan und Pimenidis, Lexi (2006). The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach.
, 23 Quality of Protection. Security Measurements and Metrics. Springer, Berlin, 145—158.