Fort, Milan, Freiling, Felix, Penso, Lucia Draque, Benenson, Zinaida und Kesdogan, Dogan (2006). TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
, 4189 Computer Security ? ESORICS 2006. 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings. Springer, Berlin, 34—48.
Benenson, Zinaida, G?rtner, Felix und Kesdogan, Dogan (2005). An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks.
Proceeedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005). IEEE, 158—165.
Fritsch, Lothar, K?lsch, Tobias, Kohlweiss, Markulf und Kesdogan, Dogan (2005). Mit IDM und Mittler zu mehr Privatsph?re in LBS.
, 324 in: J?rg Roth (eds.) Ortsbezogene Anwendungen und Dienste : 2. GI/ITG KuVS Fachgespr?ch, Stuttgart 2005.06.16-17. FernUniversit?t, Fachbereich Informatik, Hagen, 58—62.
Clau?, Sebastian, Kesdogan, Dogan, K?lsch, Tobias, Pimenidis, L., Schiffner, Stefan und Steinbrecher, Sandra (2005). Privacy Enhanced Identity Management: Design Considerations and Open Problems.
DIM '05. Proceedings of the 2005 ACM Workshop on Digital Identity Management, Nov. 11, George Mason University, Fairfax, VA, USA. ACM, New York, 84—93.
K?lsch, Tobias, Fritsch, Lothar, Kohlweiss, Markulf und Kesdogan, Dogan (2005). Privacy for Profitable Location Based Services.
, 3450 Security in Pervasive Computing. 2nd Internat. Conf., SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings. Springer, Berlin, 164—178.
Benenson, Zinaida, G?rtner, Felix und Kesdogan, Dogan (2005). Secure Multi-Party Computation with Security Modules.
, P-62 in: Hannes Federrath (eds.) Sicherheit 2005: Beitr?ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. K?llen, Bonn
Kesdogan, Dogan und Rattay, O. (2005). Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web (= Security Evaluation of Anonymity Techniques).
, P-62 in: Hannes Federrath (eds.) Sicherheit 2005: Beitr?ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. K?llen, Bonn
Kesdogan, Dogan und Pimenidis, Lexi (2005). The Hitting Set Attack on Anonymity Protocols.
, 3200 Information Hiding. 6th Internat. Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers. Springer, Berlin, 326—339.
Benenson, Zinaida, G?rtner, Felix und Kesdogan, Dogan (2004). User Authentication in Sensor Networks (extended abstract).
, 50-51 in: Peter Daman (eds.) Informatik 2004 : Informatik verbindet : Beitra?ge der 34. Jahrestagung der Gesellschaft fu?r Informatik e.V. (GI), Ulm, 20. - 24. September 2004. Ges. f. Informatik, Bonn
Kesdogan, Dogan, Agrawal, Dakshi und Penz, Stefan (2003). Limits of Anonymity in Open Environments.
, 2578 Information Hiding. 5th Internat. Workshop, IH 2002 Noordwijkerhout, The Netherlands, Oct. 7-9, 2002 Revised Papers. Springer, Berlin, 53—69.
Agrawal, Dakshi und Kesdogan, Dogan (2003). Measuring Anonymity: The Disclosure Attack.
IEEE security & privacy, 1 (6) IEEE, 27—34.
Agrawal, Dakshi, Kesdogan, Dogan und Penz, Stefan (2003). Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
SP '03 : Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11-14 May 2003, Oakland, CA, USA. IEEE CS Press, Washington, DC, 16—27.
Kesdogan, Dogan, Borning, Max und Schmeink, Michael (2003). Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?.
, 2482 Privacy Enhancing Technologies : 2nd Internat. Worksh., PET 2002, San Francisco, CA, USA, April 14?15, 2002. Revised Papers. Springer, Berlin, 224—238.
Borning, Mark, Kesdogan, Dogan und Spaniol, Otto (2001). Anonymit?t und Unbeobachtbarkeit im Internet (= Anonymity and unobservability in the Internet).
Information technology : it, 43 (4) Oldenbourg, 254—263.
Kesdogan, Dogan, Borning, Mark und Schmeink, Michael (2001). Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW (=Anonymous Surfing on the World Wide Web).
Verl?ssliche IT-Systeme : Sicherheit in komplexen IT-Infrastrukturen. Vieweg, Wiesbaden, 37—54.
Boursas, Latifa, Bourimi, Mohamed, Hommel, Wolfgang und Kesdogan, Dogan (2001). Enhancing Trust in SOA Based Collaborative Environments.
, 71 Systems and Virtualization Management. Standards and the Cloud Third International DMTF Academic Alliance Workshop, SVM 2009, Wuhan, China, September 22-23, 2009. Revised Selected Papers. Springer, Berlin, 94—102.
Kesdogan, Dogan (2001). Evaluation of Anonymity Providing Techniques using Queuning Theory.
Proceedings / LCN 2001, 26th Annual IEEE Conference on Local Computer Networks : 14 - 16 November 2001, Tampa, Florida. IEEE CS Press, Los Alamitos, Calif.
Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith und Singh, Muninder (2001). How to go Shopping on the World Wide Web without having your Privacy Violated.
4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA, 529—240.
Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith, Singh, Moninder und Spraragen, Susan L. (2001). Personal Information Management and Distribution.
4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA
Borning, Mark und Kesdogan, Dogan (2001). Privacy in E-Commerce.
International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES).
Kesdogan, Dogan (2000). Privacy im Internet : vertrauenswürdige Kommunikation in offenen Umgebungen.
Braunschweig, Vieweg
Kesdogan, Dogan und Sch?ffter, M. (2000). ?bersicht und Bewertung von VPN-Produktl?sungen (=Overview and Evaluation of VPN Solutions).
, 90 7. Workshop Sicherheit in Vernetzten Systemen : 8. und 9. M?rz 2000, Hamburg ( DFN-CERT). Verein zur F?rderung eines Deutschen Forschungsnetzes, Berlin
Büschkes, Roland, Haustein, Tobias und Kesdogan, Dogan (1999). Active Intrusion Detection - An Approach To Dynamic Risk Management.
Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec?99).
Kesdogan, Dogan und Büschkes, Roland (1999). Klassifizierung von Anonymisierungstechniken (= Classification of Anonymization Techniques).
Sicherheitsinfrastrukturen : Grundlagen, Realisierungen, rechtliche Aspekte, Anwendungen. Vieweg, Braunschweig, 331—332.
Büschkes, Roland und Kesdogan, Dogan (1999). Privacy Enhanced Intrusion Detection.
Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München