Folgen
Dominik Herrmann
Dominik Herrmann
Bestätigte E-Mail-Adresse bei uni-bamberg.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
D Herrmann, R Wendolsky, H Federrath
Proceedings of the 2009 ACM workshop on Cloud computing security, 31-42, 2009
5462009
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
D Herrmann, C Banse, H Federrath
Computers & Security 39, 17-33, 2013
1042013
Performance comparison of low-latency anonymisation services from a user perspective
R Wendolsky, D Herrmann, H Federrath
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
722007
How do app vendors respond to subject access requests? A longitudinal privacy study on iOS and Android Apps
JL Kröger, J Lindemann, D Herrmann
Proceedings of the 15th International Conference on Availability …, 2020
552020
Tracking users on the internet with behavioral patterns: Evaluation of its practical feasibility
C Banse, D Herrmann, H Federrath
IFIP International Information Security Conference, 235-248, 2012
552012
VANETsim: An open source simulator for security and privacy concepts in VANETs
A Tomandl, D Herrmann, KP Fuchs, H Federrath, F Scheuer
2014 International Conference on High Performance Computing & Simulation …, 2014
482014
Privacy-preserving DNS: analysis of broadcast, range queries and mix-based protection methods
H Federrath, KP Fuchs, D Herrmann, C Piosecny
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
472011
Analyzing characteristic host access patterns for re-identification of web user sessions
D Herrmann, C Gerber, C Banse, H Federrath
Information Security Technology for Applications: 15th Nordic Conference on …, 2012
462012
Pneumothorax—time for new guidelines?
R Hallifax, JP Janssen
Seminars in respiratory and critical care medicine 40 (03), 314-322, 2019
422019
Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their DNS traffic
M Kirchler, D Herrmann, J Lindemann, M Kloft
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security …, 2016
402016
Privacyscore: Improving privacy and security via crowd-sourced benchmarks of websites
M Maass, P Wichmann, H Pridöhl, D Herrmann
Privacy Technologies and Policy: 5th Annual Privacy Forum, APF 2017, Vienna …, 2017
372017
Encdns: A lightweight privacy-preserving name resolution service
D Herrmann, KP Fuchs, J Lindemann, H Federrath
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
372014
Obtaining personal data and asking for erasure: Do app vendors and website owners honour your privacy rights?
D Herrmann, J Lindemann
GI Sicherheit 2016, 2016
262016
Effective notification campaigns on the web: A matter of trust, framing, and support
M Maass, A Stöver, H Pridöhl, S Bretthauer, D Herrmann, M Hollick, ...
30th USENIX Security Symposium (USENIX Security 21), 2489-2506, 2021
252021
Grenzen des „digitalen Radiergummis “
H Federrath, KP Fuchs, D Herrmann, D Maier, F Scheuer, K Wagner
Datenschutz und Datensicherheit-DuD 35, 403-407, 2011
252011
Evaluating the security of a DNS query obfuscation scheme for private web surfing
D Herrmann, M Maaß, H Federrath
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
242014
Basic concepts and models of cybersecurity
D Herrmann, H Pridöhl
The ethics of cybersecurity, 11-44, 2020
212020
Fingerprinting techniques for target-oriented investigations in network forensics
D Herrmann, KP Fuchs, H Federrath
Gesellschaft für Informatik eV, 2014
182014
Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet
M Maaß, H Pridöhl, D Herrmann, M Hollick
Proceedings of the 16th International Conference on Availability …, 2021
142021
Ipv6 prefix alteration: An opportunity to improve online privacy
D Herrmann, C Arndt, H Federrath
arXiv preprint arXiv:1211.4704, 2012
132012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20