Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Dr. Marhöfer is active.

Publication


Featured researches published by Michael Dr. Marhöfer.


international conference on intelligence in next generation networks | 2012

Privacy-preserving data mining demonstrator

Martin Beck; Michael Dr. Marhöfer

We present a system for demonstrating anonymized data mining on user profiles, which also evaluates the remaining utility of the generalized information through comparison of the classification results. The use case for this scenario builds around profiles containing personally identifiable information, which should be analyzed and classified by a third party. Our goal is to preserve the privacy of the users while maintaining a certain level of utility to allow data mining over the anonymized information.


IFIP PrimeLife International Summer School on Privacy and Identity Management for Life | 2011

Do-Not-Track Techniques for Browsers and Their Implications for Consumers

Martin Beck; Michael Dr. Marhöfer

Recent efforts to increase online privacy by offering the user a more general choice to opt out of online tracking were mainly pushed by the FTC in late 2010. As the FTC explicitly omitted technical details, browser developers started to implement what they thought might be appropriate to either limit user tracking directly, or let the advertiser know about the user’s wish to not be tracked. This paper gives a short overview on the positions and arguments of stakeholders and evaluates the technical proposals and implementations aiming to support the consumer in keeping control over his personal data.


Archive | 2006

Integration of device integrity attestation into user authentication

Jörg Abendroth; Jorge Dr. Cuellar; Michael Dr. Marhöfer; Hariharan Rajasekaran; Manfred Schäfer


Archive | 2006

Token-based service access

Jörg Abendroth; Jorge Dr. Cuellar; Michael Dr. Marhöfer; Hariharan Rajasekaran; Manfred Schäfer


Archive | 2006

Flexible generation of trusted time sources

Jörg Abendroth; Jorge Dr. Cuellar; Nicolai Kuntze; Michael Dr. Marhöfer; Hariharan Rajasekaran; Andreas Dr. Schmidt; Manfred Schäfer


Archive | 2006

Method and entity for protected distribution of data

Nicolai Kuntze; Michael Dr. Marhöfer; Andreas Schmidt


Archive | 2008

Changing the configuration of a user equipment for a telecommunication network

Jörg Abendroth; Michael Dr. Marhöfer


Archive | 2008

Method for data communication and device as well as communication system comprising such device

Jörg Abendroth; Michael Dr. Marhöfer; Manfred Schäfer


Archive | 2007

Data object backing up method, involves encrypting data objects by key, determining another key dependent on parameters representative of application and data processing device, and encrypting former key by latter key

Jörg Abendroth; Jorge Dr. Cuellar; Michael Dr. Marhöfer; Hariharan Rajasekaran; Manfred Schäfer


Archive | 2007

Method for securing data objects

Jörg Abendroth; Jorge Cuellar; Michael Dr. Marhöfer; Hariharan Rajasekaran; Manfred Schäfer

Collaboration


Dive into the Michael Dr. Marhöfer's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Martin Beck

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge