Publications
147 Entries
2010
-
Secure logging of retained data for an anonymity service , 2010, Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 2009, Revised Selected Papers. Bezzi, M., Duquenoy, P., Fischer-Hubner, S., Zhang, G. & Hansen, M. (eds.). Springer Verlag, New York, p. 284-298, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Trained to accept? A field experiment on consent dialogs , 2010, CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. p. 2403-2406, 4 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2009
-
Data retention and anonymity services: Introducing a new class of realistic adversary models , 2009, The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/ FIDIS International Summer School, Revised Selected Papers. Matyas, V., Svenda, P., Fischer-Hubner, S. & Cvrcek, D. (eds.). Springer Verlag, New York, p. 92-106, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2007
-
Communication privacy , 1 Jan 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 19-46, 28 p.Research output: Contribution to book/conference proceedings/anthology/report > Chapter in book/Anthology/Report
2006
-
Low latency anonymous communication - How long are users willing to wait? , 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer, Berlin [u. a.], p. 221-237, 17 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Revocable anonymity , 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer, Berlin [u. a.], p. 206-220, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der Anonymisierungsdienste AN.ON und Tor , 2006, SICHERHEIT 2006 - Sicherheit - Schutz und Zuverlässigkeit: Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 20.-22. Februar 2006 in Magdeburg. Dittmann, J. (ed.). Gesellschaft für Informatik, Bonn, p. 183-187, 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2005
-
On the PET Workshop Panel “Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?” , 2005, Privacy Enhancing Technologies . Springer, Berlin [u. a.], Vol. 3424. p. 243-255, 13 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Tailored Responsibility Within Component-Based Systems. , 2005, p. 203-218, 16 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
2004
-
Http-based anonymous communication channels , Jun 2004, In: Dr. Dobb's journal : DDJ ; software tools for the professional programmer. Vol. 29. p. 30-33, 4 p.Research output: Contribution to specialist publication > Feature article/Contribution (Feuilleton)