default search action
Stefan Köpsell
Person information
- affiliation: TU Dresden, Faculty of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Prajnamaya Dass, Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell:
Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects. APF 2024: 87-111 - [c38]Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell:
Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security. GIIS 2024: 1-7 - [c37]Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell:
Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach. JC&S 2024: 1-6 - [c36]Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangómez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Ramez Askar, Julia Beuster, Oliver Blume, Norman Franchi, Reiner S. Thomä, Slawomir Stanczak, Hans D. Schotten:
Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal. JC&S 2024: 1-6 - [c35]Kenneth-Raphael Keil, Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke:
Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity. Open Identity Summit 2024: 61-72 - [i14]Prajnamaya Dass, Marcel Gräfenstein, Stefan Köpsell:
Exploring Privacy Issues in Mission Critical Communication: Navigating 5G and Beyond Networks. CoRR abs/2405.01492 (2024) - [i13]Prajnamaya Dass, Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell:
Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects. CoRR abs/2405.01742 (2024) - [i12]Sebastian Rehms, Stefan Köpsell, Verena Klös, Florian Tschorsch:
A Model-oriented Reasoning Framework for Privacy Analysis of Complex Systems. CoRR abs/2405.08356 (2024) - [i11]Gerhard P. Fettweis, Patricia Grünberg, Tim Hentschel, Stefan Köpsell:
Conceptualizing Trustworthiness and Trust in Communications. CoRR abs/2408.01447 (2024) - [i10]Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, Maryam Zarezadeh:
Post-Quantum Access Control with Application to Secure Data Retrieval. IACR Cryptol. ePrint Arch. 2024: 1160 (2024) - 2023
- [c34]Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell:
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. ICISSP 2023: 677-685 - [c33]Moritz Jasper, Stefan Köpsell:
Secure and Dynamic Publish/Subscribe: LCMsec. VTC Fall 2023: 1-7 - [i9]Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell:
Improving unlinkability in C-ITS: a methodology for optimal obfuscation. CoRR abs/2301.04130 (2023) - [i8]Moritz Jasper, Stefan Köpsell:
Secure and Dynamic Publish/Subscribe: LCMsec. CoRR abs/2308.07095 (2023) - [i7]Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangómez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner S. Thomä, Slawomir Stanczak, Hans D. Schotten:
Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal. CoRR abs/2311.11623 (2023) - 2022
- [j7]Arsenia Chorti, André Noll Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard P. Fettweis, H. Vincent Poor:
Context-Aware Security for 6G Wireless: The Role of Physical Layer Security. IEEE Commun. Stand. Mag. 6(1): 102-108 (2022) - [c32]Sebastian Haas, Mattis Hasler, Friedrich Pauls, Stefan Köpsell, Nils Asmussen, Michael Roitzsch, Gerhard P. Fettweis:
Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment. GLOBECOM (Workshops) 2022: 826-831 - [c31]Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan Köpsell, Thorsten Strufe:
Transparency for Bystanders in IoT regarding audiovisual Recordings. PerCom Workshops 2022: 649-654 - [i6]Tim Lackorzynski, Sebastian Rehms, Tao Li, Stefan Köpsell, Hermann Härtig:
Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases. CoRR abs/2205.12748 (2022) - [i5]Tim Lackorzynski, Max Ostermann, Stefan Köpsell, Hermann Härtig:
A Case for Practical Configuration Management Using Hardware-based Security Tokens. CoRR abs/2205.12757 (2022) - 2021
- [j6]Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig:
Enabling and Optimizing MACsec for Industrial Environments. IEEE Trans. Ind. Informatics 17(11): 7599-7606 (2021) - [c30]Stephan Escher, Markus Sontowski, Knut Berling, Stefan Köpsell, Thorsten Strufe:
How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme. VTC Spring 2021: 1-6 - [i4]Arsenia Chorti, André Noll Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard P. Fettweis, H. Vincent Poor:
Context-Aware Security for 6G Wireless The Role of Physical Layer Security. CoRR abs/2101.01536 (2021) - [i3]André Noll Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelée, Kumar Ashwinee:
Towards Intelligent Context-Aware 6G Security. CoRR abs/2112.09411 (2021) - 2020
- [j5]Marco Zoli, André Noll Barreto, Stefan Köpsell, Padmanava Sen, Gerhard P. Fettweis:
Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation. EURASIP J. Wirel. Commun. Netw. 2020(1): 114 (2020) - [c29]Stephan Escher, Benjamin Weller, Stefan Köpsell, Thorsten Strufe:
Towards Transparency in the Internet of Things. APF 2020: 186-200 - [c28]Amr Osman, Armin Wasicek, Stefan Köpsell, Thorsten Strufe:
Transparent Microsegmentation in Smart Home IoT Networks. HotEdge 2020 - [c27]Tim Lackorzynski, Philipp Rietzsch, Stefan Köpsell:
Switchbox - Low-latency Fail-safe Assurance of Availability in Industrial Environments. ICIT 2020: 328-333 - [c26]Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig:
Enabling and Optimizing MACsec for Industrial Environments (Extended Abstract). WFCS 2020: 1-4
2010 – 2019
- 2019
- [j4]Andrey Brito, Christof Fetzer, Stefan Köpsell, Peter R. Pietzuch, Marcelo Pasin, Pascal Felber, Keiko Verônica Ono Fonseca, Marcelo de Oliveira Rosa, Luiz Celso Gomes Jr., Rodrigo Jardim Riella, Charles B. Prado, Luiz Fernando Rust da Costa Carmo, Daniel E. Lucani, Márton Ákos Sipos, László Nagy, Marcell Fehér:
Secure end-to-end processing of smart metering data. J. Cloud Comput. 8: 19 (2019) - [c25]Christian Zimmermann, Markus Sontowski, Stefan Köpsell:
Attribute-Based Credentials in High-Density Platooning. CSCS 2019: 5:1-5:9 - [c24]Markus Sontowski, Stefan Köpsell, Thorsten Strufe, Christian Zimmermann, Andreas Weinand, Hans D. Schotten, Norbert Bissmeyer:
Towards Secure Communication for High-Density Longitudinal Platooning. VTC Fall 2019: 1-7 - [c23]Tim Lackorzynski, Stefan Köpsell, Thorsten Strufe:
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems. WFCS 2019: 1-8 - 2018
- [c22]Paul Walther, Stefan Köpsell, Frederik Armknecht, Gene Tsudik, Thorsten Strufe:
Chains and Whips - An approach to lighweight MACs. Krypto-Tag 2018 - [c21]Martin Byrenheid, Stefan Köpsell, Alexander Naumenko, Thorsten Strufe:
Transparent Low-Latency Network Anonymisation for Mobile Devices. SecureComm (1) 2018: 193-209 - [c20]Andrey Brito, Christof Fetzer, Stefan Köpsell, Marcelo Pasin, Pascal Felber, Keiko Ono Fonseca, Marcelo de Oliveira Rosa, Luiz Celso Gomes Jr., Rodrigo Jardim Riella, Charles B. Prado, Luiz F. R. da Costa Carmo, Daniel E. Lucani, Márton Sipos, László Nagy, Marcell Fehér:
Cloud Challenge: Secure End-to-End Processing of Smart Metering Data. UCC Companion 2018: 36-42 - [i2]Florian Kelbert, Franz Gregor, Rafael Pires, Stefan Köpsell, Marcelo Pasin, Aurélien Havet, Valerio Schiavoni, Pascal Felber, Christof Fetzer, Peter R. Pietzuch:
SecureCloud: Secure Big Data Processing in Untrusted Clouds. CoRR abs/1805.01783 (2018) - 2017
- [c19]Florian Kelbert, Franz Gregor, Rafael Pires, Stefan Köpsell, Marcelo Pasin, Aurelien Havet, Valerio Schiavoni, Pascal Felber, Christof Fetzer, Peter R. Pietzuch:
SecureCloud: Secure big data processing in untrusted clouds. DATE 2017: 282-285 - [c18]Ambrosio Patricio Vumo, Josef Spillner, Stefan Köpsell:
Analysis of Mozambican websites: How do they protect their users? ISSA 2017: 90-97 - [i1]David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg:
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. CoRR abs/1711.07220 (2017) - 2014
- [c17]Ivan Gudymenko, Felipe Sousa, Stefan Köpsell:
A simple and secure e-ticketing system for intelligent public transportation based on NFC. Urb-IoT 2014: 19-24 - 2013
- [c16]Florent Fourcot, Laurent Toutain, Stefan Köpsell, Frédéric Cuppens, Nora Cuppens-Boulahia:
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices. EUNICE 2013: 148-160 - 2011
- [p2]Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg:
Identity and Privacy Issues Throughout Life. Privacy and Identity Management for Life 2011: 87-110 - [p1]Jan Camenisch, Benjamin Kellermann, Stefan Köpsell, Stefano Paraboschi, Franz-Stefan Preiss, Stefanie Pötzsch, Dave Raggett, Pierangela Samarati, Karel Wouters:
Open Source Contributions. Privacy and Identity Management for Life 2011: 459-477 - [r1]Stefan Köpsell:
Anonymous Web Browsing and Publishing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 40-42 - 2010
- [b1]Stefan Köpsell:
Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW. Dresden University of Technology, 2010, pp. 1-431 - [c15]Rainer Böhme, Stefan Köpsell:
Trained to accept?: a field experiment on consent dialogs. CHI 2010: 2403-2406
2000 – 2009
- 2009
- [j3]Andreas Pfitzmann, Stefan Köpsell:
Risiken der Vorratsspeicherung - Grenzen der Nutzungsüberwachung. Datenschutz und Datensicherheit 33(9): 542-546 (2009) - [c14]Stefan Köpsell, Petr Svenda:
Secure Logging of Retained Data for an Anonymity Service. PrimeLife 2009: 284-298 - 2008
- [c13]Stefan Berthold, Rainer Böhme, Stefan Köpsell:
Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models. FIDIS 2008: 92-106 - 2007
- [j2]René Balzer, Horst Lazarek, Stefan Köpsell:
Masterstudiengang Datenschutz und Datensicherheit in Russland - Zu einer international harmonisierten Datenschutzausbildung. Datenschutz und Datensicherheit 31(5): 345-349 (2007) - 2006
- [c12]Stefan Köpsell, Rolf Wendolsky, Hannes Federrath:
Revocable Anonymity. ETRICS 2006: 206-220 - [c11]Stefan Köpsell:
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. ETRICS 2006: 221-237 - [c10]Stefan Köpsell:
Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der Anonymisierungsdienste AN.ON und Tor. Sicherheit 2006: 183-187 - 2004
- [c9]Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann:
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". Privacy Enhancing Technologies 2004: 243-255 - [c8]Stefan Köpsell, Ulf Hillig:
How to achieve blocking resistance for existing systems enabling anonymous web surfing. WPES 2004: 47-58 - 2003
- [j1]Stefan Köpsell, Hannes Federrath, Marit Hansen:
Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes. Datenschutz und Datensicherheit 27(3) (2003) - [c7]Stefan Köpsell, Andreas Pfitzmann:
Wie viel Anonymität verträgt unsere Gesellschaft? DFN-Arbeitstagung über Kommunikationsnetze 2003: 13-26 - [c6]Stefan Köpsell:
Anonym im Netz - eine neue Gefahr? DFN-Arbeitstagung über Kommunikationsnetze 2003: 677-690 - [c5]Stefan Köpsell, Andreas Müller:
Bezahlsystem für einen Mixkaskaden-basierten Anonymisierungsdienst. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 305-316 - [c4]Sandra Steinbrecher, Stefan Köpsell:
Modelling Unlinkability. Privacy Enhancing Technologies 2003: 32-47 - 2002
- [c3]Hannes Federrath, Stefan Köpsell, Heinrich Langos:
Anonyme und unbeobachtbare Kommunikation im Internet. GI Jahrestagung 2002: 481-487 - 2001
- [c2]Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann:
Efficiency Improvements of the Private Message Service. Information Hiding 2001: 112-125 - 2000
- [c1]Oliver Berthold, Hannes Federrath, Stefan Köpsell:
Web MIXes: A System for Anonymous and Unobservable Internet Access. Workshop on Design Issues in Anonymity and Unobservability 2000: 115-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint