What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hannes Federrath
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/sec
Reduce to the MACs - Privacy Friendly Generic Probe Requests.
Johanna Ansohn McDougall
Alessandro Brighente
Anne Kunstmann
Niklas Zapatka
Hannes Federrath
2023
conf/sec
SecPassInput: Towards Secure Memory and Password Handling in Web Applications.
Pascal Wichmann
August See
Hannes Federrath
2022
conf/sec
Evaluation of Circuit Lifetimes in Tor.
Kevin Köster
Matthias Marx
Anne Kunstmann
Hannes Federrath
2022
conf/sec
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations.
Christian Burkert
Johanna Ansohn McDougall
Hannes Federrath
2022
conf/acns
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests.
Johanna Ansohn McDougall
Christian Burkert
Daniel Demmler
Monina Schwarz
Vincent Hubbe
Hannes Federrath
2021
conf/sec
Compiling Personal Data and Subject Categories from App Data Models.
Christian Burkert
Maximilian Blochberger
Hannes Federrath
2020
journals/popets
Enhanced Performance and Privacy for TLS over TCP Fast Open.
Erik Sy
Tobias Mueller
Christian Burkert
Hannes Federrath
Mathias Fischer
2019
journals/popets
A QUIC Look at Web Tracking.
Erik Sy
Christian Burkert
Hannes Federrath
Mathias Fischer
2019
conf/ccs
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
Hoai Viet Nguyen
Luigi Lo Iacono
Hannes Federrath
2019
conf/sec
Automatically Proving Purpose Limitation in Software Architectures.
Kai Bavendiek
Tobias Mueller
Florian Wittner
Thea Schwaneberg
Christian-Alexander Behrendt
Wolfgang Schulz
Hannes Federrath
Sibylle Schupp
2019
conf/esorics
Towards Minimising Timestamp Usage In Application Software - A Case Study of the Mattermost Application.
Christian Burkert
Hannes Federrath
2019
conf/icics
Context-Aware IPv6 Address Hopping.
Matthias Marx
Monina Schwarz
Maximilian Blochberger
Frederik Wille
Hannes Federrath
2018
conf/acsac
Tracking Users across the Web via TLS Session Resumption.
Erik Sy
Christian Burkert
Hannes Federrath
Mathias Fischer
2017
journals/compsec
Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015).
Dominik Herrmann
Hannes Federrath
2015
journals/compsec
Workload modelling for mix-based anonymity services.
Karl-Peter Fuchs
Dominik Herrmann
Hannes Federrath
2014
conf/sec
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing.
Dominik Herrmann
Max Maaß
Hannes Federrath
2014
conf/esorics
EncDNS: A Lightweight Privacy-Preserving Name Resolution Service.
Dominik Herrmann
Karl-Peter Fuchs
Jens Lindemann
Hannes Federrath
2013
journals/compsec
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic.
Dominik Herrmann
Christian Banse
Hannes Federrath
2013
conf/sec
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation.
Karl-Peter Fuchs
Dominik Herrmann
Hannes Federrath
2012
conf/sec
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility.
Christian Banse
Dominik Herrmann
Hannes Federrath
2012
conf/esorics
Introducing the gMix Open Source Framework for Mix Implementations.
Karl-Peter Fuchs
Dominik Herrmann
Hannes Federrath
2011
conf/esorics
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods.
Hannes Federrath
Karl-Peter Fuchs
Dominik Herrmann
Christopher Piosecny
2009
conf/ccs
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier.
Dominik Herrmann
Rolf Wendolsky
Hannes Federrath
1998
conf/ih
Modeling the Security of Steganographic Systems.
Jan Zöllner
Hannes Federrath
Herbert Klimant
Andreas Pfitzmann
Rudi Piotraschke
Andreas Westfeld
Guntram Wicke
Gritta Wolf
1997
conf/sec
Individual management of personal reachability in mobile communication.
Martin Reichenbach
Herbert Damker
Hannes Federrath
Kai Rannenberg
1996
conf/sec
Location management strategies increasing privacy in mobile communication.
Dogan Kesdogan
Hannes Federrath
Anja Jerichow
Andreas Pfitzmann
1996
conf/ih
MIXes in Mobile Communication Systems: Location Management with Privacy.
Hannes Federrath
Anja Jerichow
Andreas Pfitzmann
Coauthors
Alessandro Brighente
(1)
Andreas Pfitzmann
(3)
Andreas Westfeld
(1)
Anja Jerichow
(2)
Anne Kunstmann
(2)
August See
(1)
Christian Banse
(2)
Christian Burkert
(7)
Christian-Alexander Behrendt
(1)
Christopher Piosecny
(1)
Daniel Demmler
(1)
Dogan Kesdogan
(1)
Dominik Herrmann
(10)
Erik Sy
(3)
Florian Wittner
(1)
Frederik Wille
(1)
Gritta Wolf
(1)
Guntram Wicke
(1)
Hannes Federrath
(27)
Herbert Damker
(1)
Herbert Klimant
(1)
Hoai Viet Nguyen
(1)
Jan Zöllner
(1)
Jens Lindemann
(1)
Johanna Ansohn McDougall
(3)
Kai Bavendiek
(1)
Kai Rannenberg
(1)
Karl-Peter Fuchs
(5)
Kevin Köster
(1)
Luigi Lo Iacono
(1)
Martin Reichenbach
(1)
Mathias Fischer
(3)
Matthias Marx
(2)
Max Maaß
(1)
Maximilian Blochberger
(2)
Monina Schwarz
(2)
Niklas Zapatka
(1)
Pascal Wichmann
(1)
Rolf Wendolsky
(1)
Rudi Piotraschke
(1)
Sibylle Schupp
(1)
Thea Schwaneberg
(1)
Tobias Mueller
(2)
Vincent Hubbe
(1)
Wolfgang Schulz
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to