Hannes Federrath

Affiliations:
  • University of Hamburg, Department of Informatics, Germany


According to our database1, Hannes Federrath authored at least 116 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Lessons Learned: Defending Against Property Inference Attacks.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

SecPassInput: Towards Secure Memory and Password Handling in Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

The Applicability of Federated Learning to Official Statistics.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2023, 2023

LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Privatsphärefreundliches maschinelles Lernen.
Inform. Spektrum, 2022

PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Type.
CoRR, 2022

Property Unlearning: A Defense Strategy Against Property Inference Attacks.
CoRR, 2022

PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types.
Proceedings of the Sicherheit, 2022

Evaluation of Circuit Lifetimes in Tor.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Probing for Passwords - Privacy Implications of SSIDs in Probe Requests.
Proceedings of the Applied Cryptography and Network Security, 2022

FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Web Cryptography API: Prevalence and Possible Developer Mistakes.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Erratum zu: Tor Relays an Universitäten.
Datenschutz und Datensicherheit, 2021

Tor Relays an Universitäten.
Datenschutz und Datensicherheit, 2021

A Structured Analysis of Information Security Incidents in the Maritime Sector.
CoRR, 2021

Operating Tor Relays at Universities: Experiences and Considerations.
CoRR, 2021

Compiling Personal Data and Subject Categories from App Data Models.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Analysing Leakage during VPN Establishment in Public Wi-Fi Networks.
Proceedings of the ICC 2021, 2021

Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Enhanced Performance and Privacy for TLS over TCP Fast Open.
Proc. Priv. Enhancing Technol., 2020

PEEPLL: privacy-enhanced event pseudonymisation with limited linkability.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Enhanced performance for the encrypted web through TLS resumption across hostnames.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A QUIC Look at Web Tracking.
Proc. Priv. Enhancing Technol., 2019

Die neuen ethischen Leitlinien der GI.
Inform. Spektrum, 2019

Privacy in Process Analytics.
Inform. Spektrum, 2019

Wie soll ich arbeiten? Was soll ich tun?
Inform. Spektrum, 2019

Sichere und datenschutzgerechte Umsetzung medizinischer Register.
Datenschutz und Datensicherheit, 2019

State of the Sandbox: Investigating macOS Application Security.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Dangers and Prevalence of Unprotected Web Fonts.
Proceedings of the 2019 International Conference on Software, 2019

Automatically Proving Purpose Limitation in Software Architectures.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Mind the cache: large-scale explorative study of web caching.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Let's Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log.
Proceedings of the Open Identity Summit 2019, 2019

Mitigating Cryptographic Mistakes by Design.
Proceedings of the Mensch und Computer 2019, 2019

QUICker Connection Establishment with Out-Of-Band Validation Tokens.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Accelerating QUIC's Connection Establishment on High-Latency Access Networks.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Context-Aware IPv6 Address Hopping.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Towards Minimising Timestamp Usage In Application Software - A Case Study of the Mattermost Application.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Hashing of personally identifiable information is not sufficient.
Proceedings of the Sicherheit 2018, 2018

Tracking Users across the Web via TLS Session Resumption.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015).
Comput. Secur., 2017

Anonymity Online - Current Solutions and Challenges.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

2016
Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Internet der Zukunft - sicher, schnell, vertrauenswürdig.
Inform. Spektrum, 2015

Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network.
EURASIP J. Inf. Secur., 2015

Workload modelling for mix-based anonymity services.
Comput. Secur., 2015

Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Workshop "Cyberwarfare".
Proceedings of the 45. Jahrestagung der Gesellschaft für Informatik, Informatik, Energie und Umwelt, INFORMATIK 2015, Cottbus, Germany, September 28, 2015

The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Fingerprinting Techniques for Target-oriented Investigations in Network Forensics.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

REST-Net: A dynamic rule-based IDS for VANETs.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

VANETsim: An open source simulator for security and privacy concepts in VANETs.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

EncDNS: A Lightweight Privacy-Preserving Name Resolution Service.
Proceedings of the Computer Security - ESORICS 2014, 2014

Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic.
Comput. Secur., 2013

Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

VANET privacy by "defending and attacking".
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

2012
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy
CoRR, 2012

Simulation-based evaluation of techniques for privacy protection in VANETs.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Usability von CAPTCHA-Systemen.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

gMix: Eine generische Architektur für Mix-Implementierungen und ihre Umsetzung als Open-Source-Framework.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility.
Proceedings of the Information Security and Privacy Research, 2012

VidPass Passwörter in Raum und Zeit. Zur Usability von Videopasswörtern.
Proceedings of the Mensch & Computer 2012: interaktiv informiert, 2012

Introducing the gMix Open Source Framework for Mix Implementations.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Andreas Pfitzmann 1958 - 2010.
it Inf. Technol., 2011

Verhaltensbasierte Verkettung von Internetsitzungen.
Datenschutz und Datensicherheit, 2011

Grenzen des "digitalen Radiergummis".
Datenschutz und Datensicherheit, 2011

A Safety-Preserving Mix Zone for VANETs.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Kollaboratives IT-sicherheitsmanagement auf basis von BSI-grundschutz.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
A privacy-aware location service for VANETs using Chaum's mixes.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society.
Proceedings of the Privacy and Identity Management for Life, 2010

Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions.
Proceedings of the Information Security Technology for Applications, 2010

2009
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking.
Proceedings of the Trust, 2009

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
A privacy aware and efficient security infrastructure for vehicular ad hoc networks.
Comput. Stand. Interfaces, 2008

Preventing Profile Generation in Vehicular Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2007
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Collection of Quantitative Data on Security Incidents.
Proceedings of the The Second International Conference on Availability, 2007

2006
Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung - Eine empirirsche Untersuchung.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Revocable Anonymity.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Protection Mechanisms Against Phishing Attacks.
Proceedings of the Trust, 2005

Privacy Enhanced Technologies: Methods - Markets - Misuse.
Proceedings of the Trust, 2005

Schutzmöglichkeiten gegen Phishing.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Ansätze zur Evaluierung von Sicherheitsinvestitionen.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

2003
Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes.
Datenschutz und Datensicherheit, 2003

Wer bin ich?
Datenschutz und Datensicherheit, 2003

Anonym - total (l)egal?
Datenschutz und Datensicherheit, 2003

Umkodierende Mixe.
Datenschutz und Datensicherheit, 2003

CookieCooker - Cookies tauschen - Profile vermischen.
Datenschutz und Datensicherheit, 2003

2002
Anonyme und unbeobachtbare Kommunikation im Internet.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002

2000
Entwicklung und Einsatz multimedialer Werkzeuge für die Internet-unterstützte Lehre.
Prax. Inf.verarb. Kommun., 2000

Gliederung und Systematisierung von Schutzzielen in IT-Systemen.
Datenschutz und Datensicherheit, 2000

Web MIXes: A System for Anonymous and Unobservable Internet Access.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

Project "anonymity and unobservability in the Internet".
Proceedings of the Tenth Conference on Computers, 2000

1999
Sicherheit mobiler Kommunikation - Schutz in GSM-Netzen, Mobilitätsmanagement und mehrseitige Sicherheit.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05695-7, 1999

1998
Modeling the Security of Steganographic Systems.
Proceedings of the Information Hiding, 1998

1997
Vertrauliche Kommunikation mit Steganographie.
Prax. Inf.verarb. Kommun., 1997

Individual management of personal reachability in mobile communication.
Proceedings of the Information Security in Research and Business, 1997

Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

Unbeobachtbarkeit in Kommunikationsnetzen.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

Über die Modellierung steganographischer Systeme.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1996
Mobilkommunikation ohne Bewegungsprofile.
Informationstechnik Tech. Inform., 1996

Persönliches Erreichbarkeitsmanagement.
Informationstechnik Tech. Inform., 1996

Location management strategies increasing privacy in mobile communication.
Proceedings of the Information Systems Security, 1996

MIXes in Mobile Communication Systems: Location Management with Privacy.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

1995
Erreichbarkeitsmanagement.
Prax. Inf.verarb. Kommun., 1995

Methoden zum Schutz von Verkehrsdaten in Funknetzen.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995


  Loading...