default search action
Hannes Federrath
Person information
- affiliation: University of Hamburg, Department of Informatics, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Georg Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin:
SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ARES 2024: 144:1-144:9 - [c84]Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. SEC 2024: 31-45 - [c83]Joshua Stock, Lucas Lange, Erhard Rahm, Hannes Federrath:
Property Inference as a Regression Problem: Attacks and Defense. SECRYPT 2024: 876-885 - [c82]Linda Schwarz, Nikolas Becker, Marius Dechand, Hannes Federrath, Tom Petersen, Jasmin Wagner, Friederike Wenderoth:
Sieben Handlungsfelder für mehr Cybersicherheit in der Stromwirtschaft. Sicherheit 2024: 261-264 - [c81]Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hanna Schambach, Hannes Federrath:
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation. SoftCOM 2024: 1-6 - [i17]Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. CoRR abs/2405.09230 (2024) - 2023
- [c80]Johanna Ansohn McDougall, Alessandro Brighente, Willi Großmann, Ben Ansohn McDougall, Joshua Stock, Hannes Federrath:
LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors. ICC 2023: 6040-6045 - [c79]Joshua Stock, Oliver Hauke, Julius Weißmann, Hannes Federrath:
The Applicability of Federated Learning to Official Statistics. IDEAL 2023: 70-81 - [c78]Pascal Wichmann, August See, Hannes Federrath:
SecPassInput: Towards Secure Memory and Password Handling in Web Applications. SEC 2023: 236-249 - [c77]Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath:
Lessons Learned: Defending Against Property Inference Attacks. SECRYPT 2023: 312-323 - [c76]Pascal Wichmann, Sam Ansari, Hannes Federrath, Jens Lindemann:
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers. SECRYPT 2023: 548-556 - [i16]Joshua Stock, Oliver Hauke, Julius Weißmann, Hannes Federrath:
The Applicability of Federated Learning to Official Statistics. CoRR abs/2307.15503 (2023) - [i15]Johanna Ansohn McDougall, Alessandro Brighente, Willi Großmann, Ben Ansohn McDougall, Joshua Stock, Hannes Federrath:
LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors. CoRR abs/2308.15104 (2023) - 2022
- [j31]Ephraim Zimmer, Christian Burkert, Hannes Federrath:
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders. DTRAP 3(1): 2:1-2:35 (2022) - [j30]Joshua Stock, Tom Petersen, Christian-Alexander Behrendt, Hannes Federrath, Thea Kreutzburg:
Privatsphärefreundliches maschinelles Lernen. Inform. Spektrum 45(2): 70-79 (2022) - [j29]Joshua Stock, Tom Petersen, Christian-Alexander Behrendt, Hannes Federrath, Thea Kreutzburg:
Privatsphärefreundliches maschinelles Lernen. Inform. Spektrum 45(3): 137-145 (2022) - [c75]Pascal Wichmann, Maximilian Blochberger, Hannes Federrath:
Web Cryptography API: Prevalence and Possible Developer Mistakes. ARES 2022: 13:1-13:10 - [c74]Pascal Wichmann, Alexander Groddeck, Hannes Federrath:
FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level. ARES 2022: 66:1-66:10 - [c73]Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath:
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests. ACNS 2022: 376-395 - [c72]Kevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath:
Evaluation of Circuit Lifetimes in Tor. SEC 2022: 142-157 - [c71]Christian Burkert, Johanna Ansohn McDougall, Hannes Federrath:
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations. SEC 2022: 323-339 - [c70]Christian Burkert, Jonathan Balack, Hannes Federrath:
PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types. Sicherheit 2022: 101-112 - [e4]Daniel Demmler, Daniel Krupka, Hannes Federrath:
52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26. - 30. September 2022, Hamburg. LNI P-326, Gesellschaft für Informatik, Bonn 2022, ISBN 978-3-88579-720-3 [contents] - [i14]Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath:
Property Unlearning: A Defense Strategy Against Property Inference Attacks. CoRR abs/2205.08821 (2022) - [i13]Christian Burkert, Jonathan Balack, Hannes Federrath:
PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Type. CoRR abs/2205.13776 (2022) - [i12]Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath:
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests. CoRR abs/2206.03745 (2022) - 2021
- [j28]Christoph Döpmann, Matthias Marx, Hannes Federrath, Florian Tschorsch:
Tor Relays an Universitäten. Datenschutz und Datensicherheit 45(5): 320-325 (2021) - [j27]Christoph Döpmann, Matthias Marx, Hannes Federrath, Florian Tschorsch:
Erratum zu: Tor Relays an Universitäten. Datenschutz und Datensicherheit 45(12): 849 (2021) - [c69]Pascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer:
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic. ARES 2021: 56:1-56:9 - [c68]Christian Burkert, Johanna Ansohn McDougall, Hannes Federrath, Mathias Fischer:
Analysing Leakage during VPN Establishment in Public Wi-Fi Networks. ICC 2021: 1-6 - [c67]Christian Burkert, Maximilian Blochberger, Hannes Federrath:
Compiling Personal Data and Subject Categories from App Data Models. SEC 2021: 242-255 - [i11]Christoph Döpmann, Matthias Marx, Hannes Federrath, Florian Tschorsch:
Operating Tor Relays at Universities: Experiences and Considerations. CoRR abs/2106.04277 (2021) - [i10]Monina Schwarz, Matthias Marx, Hannes Federrath:
A Structured Analysis of Information Security Incidents in the Maritime Sector. CoRR abs/2112.06545 (2021) - 2020
- [j26]Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer:
Enhanced Performance and Privacy for TLS over TCP Fast Open. Proc. Priv. Enhancing Technol. 2020(2): 271-287 (2020) - [c66]Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:
Enhanced performance for the encrypted web through TLS resumption across hostnames. ARES 2020: 16:1-16:10 - [c65]Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Lösch, Sibylle Schupp, Hannes Federrath:
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids. DBSec 2020: 153-173 - [c64]Ephraim Zimmer, Christian Burkert, Tom Petersen, Hannes Federrath:
PEEPLL: privacy-enhanced event pseudonymisation with limited linkability. SAC 2020: 1308-1311
2010 – 2019
- 2019
- [j25]Tom Petersen, Maximilian Blochberger, Tobias Mueller, Hannes Federrath, Christian-Alexander Behrendt:
Sichere und datenschutzgerechte Umsetzung medizinischer Register. Datenschutz und Datensicherheit 43(8): 507-512 (2019) - [j24]Hannes Federrath:
Wie soll ich arbeiten? Was soll ich tun? Inform. Spektrum 42(1): 1-3 (2019) - [j23]Hannes Federrath, Christina B. Class, Carsten Trinitis:
Die neuen ethischen Leitlinien der GI. Inform. Spektrum 42(1): 4-10 (2019) - [j22]Hannes Federrath:
Privacy in Process Analytics. Inform. Spektrum 42(5): 321-322 (2019) - [j21]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
A QUIC Look at Web Tracking. Proc. Priv. Enhancing Technol. 2019(3): 255-266 (2019) - [c63]Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack. CCS 2019: 1915-1936 - [c62]Christian Burkert, Hannes Federrath:
Towards Minimising Timestamp Usage In Application Software - A Case Study of the Mattermost Application. DPM/CBT@ESORICS 2019: 138-155 - [c61]Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath:
Context-Aware IPv6 Address Hopping. ICICS 2019: 539-554 - [c60]Erik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath:
Accelerating QUIC's Connection Establishment on High-Latency Access Networks. IPCCC 2019: 1-8 - [c59]Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer:
QUICker Connection Establishment with Out-Of-Band Validation Tokens. LCN 2019: 105-108 - [c58]Maximilian Blochberger, Tom Petersen, Hannes Federrath:
Mitigating Cryptographic Mistakes by Design. MuC (Workshopband) 2019 - [c57]Tobias Mueller, Marius Stübs, Hannes Federrath:
Let's Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log. Open Identity Summit 2019: 143-154 - [c56]Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Mind the cache: large-scale explorative study of web caching. SAC 2019: 2497-2506 - [c55]Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp:
Automatically Proving Purpose Limitation in Software Architectures. SEC 2019: 345-358 - [c54]Tobias Mueller, Daniel Klotzsche, Dominik Herrmann, Hannes Federrath:
Dangers and Prevalence of Unprotected Web Fonts. SoftCOM 2019: 1-5 - [c53]Maximilian Blochberger, Jakob Rieck, Christian Burkert, Tobias Mueller, Hannes Federrath:
State of the Sandbox: Investigating macOS Application Security. WPES@CCS 2019: 150-161 - [i9]Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:
Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames. CoRR abs/1902.02531 (2019) - [i8]Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer:
QUICker connection establishment with out-of-band validation tokens. CoRR abs/1904.06228 (2019) - [i7]Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer:
Enhanced Performance and Privacy for TLS over TCP Fast Open. CoRR abs/1905.03518 (2019) - [i6]Erik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath:
Accelerating QUIC's Connection Establishment on High-Latency Access Networks. CoRR abs/1907.01291 (2019) - [i5]Ephraim Zimmer, Christian Burkert, Tom Petersen, Hannes Federrath:
PEEPLL: Privacy-Enhanced Event Pseudonymisation with Limited Linkability. CoRR abs/1912.05861 (2019) - 2018
- [c52]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. ACSAC 2018: 289-299 - [c51]Matthias Marx, Ephraim Zimmer, Tobias Mueller, Maximilian Blochberger, Hannes Federrath:
Hashing of personally identifiable information is not sufficient. Sicherheit 2018: 55-68 - [i4]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. CoRR abs/1810.07304 (2018) - 2017
- [j20]Dominik Herrmann, Hannes Federrath:
Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015). Comput. Secur. 67: 266 (2017) - [c50]Matthias Marx, Erik Sy, Christian Burkert, Hannes Federrath:
Anonymity Online - Current Solutions and Challenges. Privacy and Identity Management 2017: 38-55 - [i3]David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg:
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. CoRR abs/1711.07220 (2017) - 2016
- [c49]Bahareh Shojaie, Hannes Federrath, Iman Saberi:
Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. HAISA 2016: 88-100 - [i2]Dominik Herrmann, Max Maaß, Hannes Federrath:
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. CoRR abs/1603.06597 (2016) - 2015
- [j19]Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Workload modelling for mix-based anonymity services. Comput. Secur. 52: 221-233 (2015) - [j18]Karl-Peter Fuchs, Dominik Herrmann, Andrea Micheloni, Hannes Federrath:
Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network. EURASIP J. Inf. Secur. 2015: 1 (2015) - [j17]Hannes Federrath, Jörg Desel, Albert Endres, Patrick Stoll:
Internet der Zukunft - sicher, schnell, vertrauenswürdig. Inform. Spektrum 38(4): 277-282 (2015) - [c48]Bahareh Shojaie, Hannes Federrath, Iman Saberi:
The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001. ARES 2015: 159-167 - [c47]Hannes Federrath, Götz Neuneck:
Workshop "Cyberwarfare". GI-Jahrestagung 2015: 551 - [c46]Ephraim Zimmer, Jens Lindemann, Dominik Herrmann, Hannes Federrath:
Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees. iNetSeC 2015: 43-55 - [c45]Dominik Herrmann, Jens Lindemann, Ephraim Zimmer, Hannes Federrath:
Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet? iNetSeC 2015: 82-94 - [e3]Hannes Federrath, Dieter Gollmann:
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1 [contents] - 2014
- [c44]Bahareh Shojaie, Hannes Federrath, Iman Saberi:
Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A. ARES 2014: 259-264 - [c43]Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath:
EncDNS: A Lightweight Privacy-Preserving Name Resolution Service. ESORICS (1) 2014: 37-55 - [c42]Andreas Tomandl, Dominik Herrmann, Karl-Peter Fuchs, Hannes Federrath, Florian Scheuer:
VANETsim: An open source simulator for security and privacy concepts in VANETs. HPCS 2014: 543-550 - [c41]Andreas Tomandl, Karl-Peter Fuchs, Hannes Federrath:
REST-Net: A dynamic rule-based IDS for VANETs. WMNC 2014: 1-8 - [c40]Dominik Herrmann, Max Maaß, Hannes Federrath:
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. SEC 2014: 205-219 - [c39]Dominik Herrmann, Karl-Peter Fuchs, Hannes Federrath:
Fingerprinting Techniques for Target-oriented Investigations in Network Forensics. Sicherheit 2014: 375-390 - [c38]Andreas Tomandl, Dominik Herrmann, Hannes Federrath:
PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks. WiMob 2014: 487-493 - 2013
- [j16]Dominik Herrmann, Christian Banse, Hannes Federrath:
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic. Comput. Secur. 39: 17-33 (2013) - [c37]Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. ARES 2013: 1-10 - [c36]Andreas Tomandl, Hannes Federrath, Florian Scheuer:
VANET privacy by "defending and attacking". WMNC 2013: 1-7 - [c35]Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation. SEC 2013: 162-175 - 2012
- [c34]Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Introducing the gMix Open Source Framework for Mix Implementations. ESORICS 2012: 487-504 - [c33]Stefan Penninger, Tim Schneidermeier, Hannes Federrath, Christian Wolff:
VidPass Passwörter in Raum und Zeit. Zur Usability von Videopasswörtern. MuC 2012: 273-282 - [c32]Christian Banse, Dominik Herrmann, Hannes Federrath:
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. SEC 2012: 235-248 - [c31]Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
gMix: Eine generische Architektur für Mix-Implementierungen und ihre Umsetzung als Open-Source-Framework. Sicherheit 2012: 123-135 - [c30]Stefan Penninger, Stefan Meier, Hannes Federrath:
Usability von CAPTCHA-Systemen. Sicherheit 2012: 199-210 - [c29]Andreas Tomandl, Florian Scheuer, Hannes Federrath:
Simulation-based evaluation of techniques for privacy protection in VANETs. WiMob 2012: 165-172 - [i1]Dominik Herrmann, Christine Arndt, Hannes Federrath:
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy. CoRR abs/1211.4704 (2012) - 2011
- [j15]Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Daniel Maier, Florian Scheuer, Kai Wagner:
Grenzen des "digitalen Radiergummis". Datenschutz und Datensicherheit 35(6): 403-407 (2011) - [j14]Hannes Federrath, Christoph Gerber, Dominik Herrmann:
Verhaltensbasierte Verkettung von Internetsitzungen. Datenschutz und Datensicherheit 35(11): 791-796 (2011) - [j13]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958 - 2010. it Inf. Technol. 53(1): 5-7 (2011) - [c28]Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny:
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. ESORICS 2011: 665-683 - [c27]Hannes Federrath, Christoph Gerber:
Kollaboratives IT-sicherheitsmanagement auf basis von BSI-grundschutz. GI-Jahrestagung 2011: 112 - [c26]Florian Scheuer, Karl-Peter Fuchs, Hannes Federrath:
A Safety-Preserving Mix Zone for VANETs. TrustBus 2011: 37-48 - 2010
- [c25]Dominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath:
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions. NordSec 2010: 136-154 - [c24]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society. PrimeLife 2010: 349-352 - [c23]Florian Scheuer, Matthias Brecht, Hannes Federrath:
A privacy-aware location service for VANETs using Chaum's mixes. WiMob 2010: 159-164
2000 – 2009
- 2009
- [c22]Dominik Herrmann, Rolf Wendolsky, Hannes Federrath:
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. CCSW 2009: 31-42 - [c21]Dominik Herrmann, Florian Scheuer, Philipp Feustel, Thomas Nowey, Hannes Federrath:
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. TrustBus 2009: 32-41 - 2008
- [j12]Klaus Plößl, Hannes Federrath:
A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Comput. Stand. Interfaces 30(6): 390-397 (2008) - [c20]Hannes Federrath, Wolfgang Pöppel:
Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner. Sicherheit 2008: 59-70 - [c19]Florian Scheuer, Klaus Poessel, Hannes Federrath:
Preventing Profile Generation in Vehicular Networks. WiMob 2008: 520-525 - 2007
- [c18]Thomas Nowey, Hannes Federrath:
Collection of Quantitative Data on Security Incidents. ARES 2007: 325-334 - [c17]Rolf Wendolsky, Dominik Herrmann, Hannes Federrath:
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. Privacy Enhancing Technologies 2007: 233-253 - [c16]Klaus Plößl, Hannes Federrath:
A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. WOSIS 2007: 145-154 - 2006
- [c15]Stefan Köpsell, Rolf Wendolsky, Hannes Federrath:
Revocable Anonymity. ETRICS 2006: 206-220 - [c14]Simone Dimler, Hannes Federrath, Thomas Nowey, Klaus Plößl:
Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung - Eine empirirsche Untersuchung. Sicherheit 2006: 18-21 - 2005
- [c13]Thomas Nowey, Hannes Federrath, Christian Klein, Klaus Plößl:
Ansätze zur Evaluierung von Sicherheitsinvestitionen. Sicherheit 2005: 15-26 - [c12]Klaus Plößl, Hannes Federrath, Thomas Nowey:
Schutzmöglichkeiten gegen Phishing. Sicherheit 2005: 161-164 - [c11]Hannes Federrath:
Privacy Enhanced Technologies: Methods - Markets - Misuse. TrustBus 2005: 1-9 - [c10]Klaus Plößl, Hannes Federrath, Thomas Nowey:
Protection Mechanisms Against Phishing Attacks. TrustBus 2005: 20-29 - [e2]Hannes Federrath:
Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 5.-8. April 2005 in Regensburg. LNI P-62, GI 2005, ISBN 3-88579-391-1 [contents] - 2003
- [j11]Hannes Federrath:
Umkodierende Mixe. Datenschutz und Datensicherheit 27(3) (2003) - [j10]Hannes Federrath, Marit Hansen:
Anonym - total (l)egal? Datenschutz und Datensicherheit 27(3) (2003) - [j9]Stefan Köpsell, Hannes Federrath, Marit Hansen:
Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes. Datenschutz und Datensicherheit 27(3) (2003) - [j8]Oliver Berthold, Hannes Federrath:
CookieCooker - Cookies tauschen - Profile vermischen. Datenschutz und Datensicherheit 27(5) (2003) - [j7]Hannes Federrath, Marit Hansen:
Wer bin ich? Datenschutz und Datensicherheit 27(5) (2003) - 2002
- [c9]Hannes Federrath, Stefan Köpsell, Heinrich Langos:
Anonyme und unbeobachtbare Kommunikation im Internet. GI Jahrestagung 2002: 481-487 - 2001
- [e1]Hannes Federrath:
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings. Lecture Notes in Computer Science 2009, Springer 2001, ISBN 3-540-41724-9 [contents] - 2000
- [j6]Hannes Federrath, Andreas Pfitzmann:
Gliederung und Systematisierung von Schutzzielen in IT-Systemen. Datenschutz und Datensicherheit 24(12) (2000) - [j5]Katrin Borcea, Hannes Federrath, Olaf Neumann, Alexander Schill:
Entwicklung und Einsatz multimedialer Werkzeuge für die Internet-unterstützte Lehre. Prax. Inf.verarb. Kommun. 23(3): 164-168 (2000) - [c8]Oliver Berthold, Hannes Federrath, Marit Köhntopp:
Project "anonymity and unobservability in the Internet". CFP 2000: 57-65 - [c7]Oliver Berthold, Hannes Federrath, Stefan Köpsell:
Web MIXes: A System for Anonymous and Unobservable Internet Access. Workshop on Design Issues in Anonymity and Unobservability 2000: 115-129
1990 – 1999
- 1999
- [b1]Hannes Federrath:
Sicherheit mobiler Kommunikation - Schutz in GSM-Netzen, Mobilitätsmanagement und mehrseitige Sicherheit. DuD-Fachbeiträge, Vieweg 1999, ISBN 978-3-528-05695-7, pp. I-XIX, 1-263 - 1998
- [c6]Jan Zöllner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf:
Modeling the Security of Steganographic Systems. Information Hiding 1998: 344-354 - 1997
- [j4]Hannes Federrath, Guntram Wicke:
Vertrauliche Kommunikation mit Steganographie. Prax. Inf.verarb. Kommun. 20(3): 134-137 (1997) - [c5]Hannes Federrath, Elke Franz, Anja Jerichow, Jan Müller, Andreas Pfitzmann:
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen. Kommunikation in Verteilten Systemen 1997: 77-91 - [c4]Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg:
Individual management of personal reachability in mobile communication. SEC 1997: 164-174 - [p2]Hannes Federrath, Anja Jerichow, Jan Müller, Andreas Pfitzmann:
Unbeobachtbarkeit in Kommunikationsnetzen. Verläßliche IT-Systeme 1997: 191-210 - [p1]Jan Zöllner, Hannes Federrath, Andreas Pfitzmann, Andreas Westfeld, Guntram Wicke, Gritta Wolf:
Über die Modellierung steganographischer Systeme. Verläßliche IT-Systeme 1997: 211-223 - 1996
- [j3]Andreas Bertsch, Herbert Damker, Hannes Federrath:
Persönliches Erreichbarkeitsmanagement. Informationstechnik Tech. Inform. 38(4): 20-23 (1996) - [j2]Anja Jerichow, Hannes Federrath, Dogan Kesdogan, Otto Spaniol, Andreas Pfitzmann:
Mobilkommunikation ohne Bewegungsprofile. Informationstechnik Tech. Inform. 38(4): 24-29 (1996) - [c3]Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:
MIXes in Mobile Communication Systems: Location Management with Privacy. Information Hiding 1996: 121-135 - [c2]Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:
Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 - 1995
- [j1]Andreas Bertsch, Herbert Damker, Hannes Federrath, Dogan Kesdogan, Michael J. Schneider:
Erreichbarkeitsmanagement. Prax. Inf.verarb. Kommun. 18(4): 231-234 (1995) - [c1]J. Thees, Hannes Federrath:
Methoden zum Schutz von Verkehrsdaten in Funknetzen. VIS 1995: 181-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint