1
0
0
(1 - 30 von 55
)
Integriertes Ertrags-/Risikomanagement in automatisierten ...Universität Göttingen
www.uni-goettingen.de
Dogan Kesdogan, Universität Siegen; Prof. Dr. Dennis Kundisch, Universität Paderborn; Prof. Dr. Günter Müller, Universität Freiburg; Dr. Oliver Prokein, Bâloise ... › integriertes+ertrags-
I4 * Lehrstuhl für Informatik * RWTH Aachen
www.nets.rwth-aachen.de
The Chair of Computer Science 4 is part of the Department of Computer Science within the Faculty of Mathematics, Science and Computer Science of Aachen...
Computers & Security | Vol 67, Pages (June 2017)www.sciencedirect.com › journal › vol › suppl
www.sciencedirect.com
Dang Vinh Pham, Dogan Kesdogan. Pages : Download PDF. Article preview. Previous vol/issue · Next vol/issue. ISSN:
dblp: 2. Information Hiding 1998: Portland, Oregon, USA
dblp.uni-trier.de
Bibliographic content of 2. Information Hiding 1998: Portland, Oregon, USA
Sebastian Clauß
wwwpub.zih.tu-dresden.de
Sebastian Clauß, Dogan Kesdogan, Tobias Kölsch, Lexi Pi…dis, Stefan Schiffner, Sandra Steinbrecher: Identitätsmanagement und das Risiko der Re-Identifikation, in: Jana Dittmann (ed.): Proceedings of Sicherheit 2006, GI Lecture Notes in Informatics P-77, Bonn 2006,
Prof. Dr. Dogan Kesdogan - FORSECBayerische Forschungsallianz
www.bayfor.org
› forschungsverbuende › person
Science of Computer Programming | Special Issue on Service-Oriented...
www.sciencedirect.com
Service composition with consideration of interdependent security objectives. Fatih Karatas, Lars Fischer, Dogan Kesdogan. Pages
Sebastian Clauß - TU Dresden
wwwpub.zih.tu-dresden.de
Sebastian Clauß, Dogan Kesdogan, Tobias Kölsch, Lexi Pi…dis, Stefan Schiffner, Sandra Steinbrecher: Identitätsmanagement und das Risiko der Re-Identifikation, in: Jana Dittmann (ed.): Proceedings of Sicherheit 2006, GI Lecture Notes in Informatics P-77, Bonn 2006, P-77, Bonn 2006,
Privacy Enhancing Techniques[PET] - RWTH Aachen …
www-i4.informatik.rwth-aachen.de
Privacy Enhancing Techniques[PET] Dr.Dogan Kesdogan. Articles. Evaluation of Anonymity providing techniques using queuing theory Article 1; Mixing Email with …
dblp: Conference on Information Security 2015
dblp.uni-trier.de
Dang Vinh Pham, Dogan Kesdogan: Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.
Sirene Publications
dud.inf.tu-dresden.de
Sirene Publications. This literature list contains publications by SIRENE people, ... Anja Jerichow, Dogan Kesdogan, Andreas Pfitzmann, Dirk Trossen: ...
DFG Projekt - TechDatMobiKomm (Nov.94-Okt.97)
dud.inf.tu-dresden.de
KFJP_96 Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Location management strategies increasing privacy in mobile communication; 12th IFIP International Conference on Information Security (IFIP/Sec '96), Chapman & Hall, London 1996,
Enhancing usability of privacy-respecting authentication and...
dspace.ub.uni-siegen.de
Enhancing Usability of Privacy-Respecting Authentication and Authorization in ... Dogan Kesdogan and Thomas ... Privacy-Respecting Authentication and Authorization in ...
Privacy Enhancing Techniques Privacy Enhancing Techniques[PET ...www.nets.rwth-aachen.de › sub › PET › articles
www.nets.rwth-aachen.de
Dr.Dogan Kesdogan. Articles. Evaluation of Anonymity providing techniques using queuing theory Article 1; Mixing Email with BABEL Article 2; Real Time Mixes: ...
HCSE Program
wwwswt.informatik.uni-rostock.de
Mohamed Bourimi, Thomas Barth, Bernd Ueberschär, Dogan Kesdogan . Understanding Formal Description of Pitch-Based Input. Ondrej Polacek, Zdenek Mikovec . Posters . Application Composition Driven By UI Composition. Christian Brel, Philippe Renevier-Gonin, Audrey, Occello, Anne-Marie Déry-Pinna, Catherine Faron-Zucker, Michel Riveill
Web Protocols and Practicewww.nets.rwth-aachen.de › sub › wpSS02
www.nets.rwth-aachen.de
Literature. B. Krishnamurthy, J. Rexford: Web Protocols and Practice. Addison Wesley, >. Ansprechpartner: Dogan Kesdogan Letzte Änderung:
Publikationen | Betriebswirtschaftslehre (Prof.in Dr. Hanna...
www.wiwi.uni-siegen.de
Tracking Shoppers Behavior at the Point of Sale by Using End‐Users Mobile Devices, in: 16th International Conference on Research in the Distributive Trades, European Association for Education and Research in Commercial Distribution (EAERCD), Parma, Italy 29 June–1 July, (with Mohamed Bourimi; Sascha Steinmann; Dogan Kesdogan).
Search results for "anonymity" – FacetedDBLP
dblp.l3s.uni-hannover.de
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach: Fundamental Limits on the Anonymity Provided by the MIX Technique. IEEE Symposium on …
Trustworthy Mobility Management in Telecommunication Networks
svs.informatik.uni-hamburg.de
Dogan Kesdogan, Xavier Fouletier: Secure Location Information Management in Cellular Radio Systems. IEEE Wireless Communication System Symposium …
Lehrstuhl für Wirtschaftsinformatik IV - Herzlich Willkommen -...
www.uni-regensburg.de
Dogan Kesdogan, Margarethe Zywiecki, Klaus Beulen Mobile User Profile Generation - A Challenge between Performance and Security Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications, December Download paper; Andreas Fasbender, Dogan Kesdogan, Olaf Kubitz
Verwandte Suchanfragen zu Dogan Kesdogan
Dirk Trossen Mark Borning Mohamed Bourimi | Hannes Federrath Klaus-Peter Kossakowski Stefan Penz | Roland Büschkes Bernd Ueberschär |
Personen Vorname "Dogan" (955) Name "Kesdogan" (2) |
sortiert nach Relevanz / Datum