Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Kesdogan, Dogan"'
Autor:
Harborth, David, Herrmann, Dominik, Köpsell, Stefan, Pape, Sebastian, Roth, Christian, Federrath, Hannes, Kesdogan, Dogan, Rannenberg, Kai
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet's infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an imp
Externí odkaz:
http://arxiv.org/abs/1711.07220
Autor:
Pham, Dang Vinh *, Kesdogan, Dogan
Publikováno v:
In Computers & Security June 2017 67:350-368
Autor:
Camenisch, Jan, Kesdogan, Dogan
In the past decade, computer networks have fundamentally influenced the ways in which information is exchanged and handled. Pervasive electronic devices make our everyday life easier, e.g., by helping us to connect with other people while being mobil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::16890ea5dbdf8751620125cadedc37f2
https://inria.hal.science/hal-01666537
https://inria.hal.science/hal-01666537
Autor:
Harborth, David, Herrmann, Dominik, Köpsell, Stefan, Pape, Sebastian, Roth, Christian, Federrath, Hannes, Kesdogan, Dogan, Rannenberg, Kai
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dfd01091318985e2071fe28c13387758
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bourimi, Mohamed, Heupel, Marcel, Kesdogan, Dogan, Fielenbach, Thomas, Arbeitsgruppe IT-Sicherheitsmanagement
Authentication and authorization are an essential part of any system allowing for information sharing and social interaction. Especially in such social settings where mobile devices with restricted capabilities and new possibilities (e.g. screen size
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______691::926134a8ffbb529bc10b9a0068249a65
http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:467-4839
http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:467-4839
Publikováno v:
Intelligent Interactive Assistance and Mobile Multimedia Computing ISBN: 9783642102622
IMC
IMC
The Internet is accepted as the de facto information support system in most areas of our professional and leisure life. Nowadays, a shift from single-user-centered usage to support multi-user needs can be observed either in professional life (e.g. wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eac46ebeaac7abb1cf6dd962abdbe94b
https://doi.org/10.1007/978-3-642-10263-9_33
https://doi.org/10.1007/978-3-642-10263-9_33
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, an efficient smart card based implementation of SMC for any number of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2393::faaa11411bf67fb57d41c9c8ca0ce9ae
https://ub-madoc.bib.uni-mannheim.de/1207
https://ub-madoc.bib.uni-mannheim.de/1207