Stefan Köpsell

  • TU Dresden, Faculty of Computer Science, Germany

According to our database1, Stefan Köpsell authored at least 50 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal.
CoRR, 2023

Secure and Dynamic Publish/Subscribe: LCMsec.
CoRR, 2023

Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Context-Aware Security for 6G Wireless: The Role of Physical Layer Security.
IEEE Commun. Stand. Mag., 2022

A Case for Practical Configuration Management Using Hardware-based Security Tokens.
CoRR, 2022

Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases.
CoRR, 2022

Transparency for Bystanders in IoT regarding audiovisual Recordings.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Enabling and Optimizing MACsec for Industrial Environments.
IEEE Trans. Ind. Informatics, 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation.
EURASIP J. Wirel. Commun. Netw., 2020

Enabling and Optimizing MACsec for Industrial Environments (Extended Abstract).
Proceedings of the 16th IEEE International Conference on Factory Communication Systems, 2020

Switchbox - Low-latency Fail-safe Assurance of Availability in Industrial Environments.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

Transparent Microsegmentation in Smart Home IoT Networks.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Edge Computing, 2020

Towards Transparency in the Internet of Things.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

Secure end-to-end processing of smart metering data.
J. Cloud Comput., 2019

A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

Towards Secure Communication for High-Density Longitudinal Platooning.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Attribute-Based Credentials in High-Density Platooning.
Proceedings of the ACM Computer Science in Cars Symposium, 2019

Cloud Challenge: Secure End-to-End Processing of Smart Metering Data.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Transparent Low-Latency Network Anonymisation for Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

Chains and Whips - An approach to lighweight MACs.
Proceedings of the 28. Krypto-Tag, 2018

Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

Analysis of Mozambican websites: How do they protect their users?
Proceedings of the 2017 Information Security for South Africa, 2017

SecureCloud: Secure big data processing in untrusted clouds.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

A simple and secure e-ticketing system for intelligent public transportation based on NFC.
Proceedings of the First International Conference on IoT in Urban Space, 2014

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices.
Proceedings of the Advances in Communication Networking, 2013

Anonymous Web Browsing and Publishing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Identity and Privacy Issues Throughout Life.
Proceedings of the Privacy and Identity Management for Life, 2011

Open Source Contributions.
Proceedings of the Privacy and Identity Management for Life, 2011

Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW.
PhD thesis, 2010

Trained to accept?: a field experiment on consent dialogs.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Risiken der Vorratsspeicherung - Grenzen der Nutzungsüberwachung.
Datenschutz und Datensicherheit, 2009

Secure Logging of Retained Data for an Anonymity Service.
Proceedings of the Privacy and Identity Management for Life, 2009

Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models.
Proceedings of the Future of Identity in the Information Society, 2008

Masterstudiengang Datenschutz und Datensicherheit in Russland - Zu einer international harmonisierten Datenschutzausbildung.
Datenschutz und Datensicherheit, 2007

Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der Anonymisierungsdienste AN.ON und Tor.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Revocable Anonymity.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Low Latency Anonymous Communication - How Long Are Users Willing to Wait?.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

How to achieve blocking resistance for existing systems enabling anonymous web surfing.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes.
Datenschutz und Datensicherheit, 2003

Modelling Unlinkability.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

Bezahlsystem für einen Mixkaskaden-basierten Anonymisierungsdienst.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

Wie viel Anonymität verträgt unsere Gesellschaft?
Proceedings of the Security, 2003

Anonym im Netz - eine neue Gefahr?
Proceedings of the Security, 2003

Anonyme und unbeobachtbare Kommunikation im Internet.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002

Efficiency Improvements of the Private Message Service.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Web MIXes: A System for Anonymous and Unobservable Internet Access.
Proceedings of the Designing Privacy Enhancing Technologies, 2000