Anja Jerichow

Anja Jerichow
  • Consultant at Nokia

About

26
Publications
1,615
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
385
Citations
Current institution
Nokia
Current position
  • Consultant

Publications

Publications (26)
Article
The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. Building blocks of 5G supporting use cases and requirements from the manufacturing sector are extreme mobile broadband, massive machine-type communication, ultra-reliable critical machine communication, non-public networks, time sensitiv...
Patent
Full-text available
A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256, 262) only if the zapping includes termination of a password-protected service (X, Y, Z). In one embodiment, the trigger message is sent to a smartcard (S...
Chapter
Mixes allow anonymous communication. They hide the communication relation between sender and recipient and, thereby, guarantee that messages are untraceable in an electronic communication network. Nonetheless, depending on the strength of the attacker, several known attacks on mixes still allow the tracing of messages through the network. We discu...
Conference Paper
Full-text available
The European project " mCDN – Multimedia Content Delivery Networks " aims at an optimized and personalized content management and content delivery, being adaptive to a rich variety of clients in heterogeneous fixed-mobile networks. Security is an important issue in the mCDN project. Content and identity protection, user privacy, and also the integr...
Conference Paper
Full-text available
A major goal of the European project “mCDN” is the enhancement of Content Delivery Networks (CDNs) for secure multimedia content discovery and delivery that is very well suited for converged fixed-mobile environments. This is achieved by introducing specific Web service components such as personalization, optimal content placement and discovery, pe...
Article
This paper introduces a new technique for location management in cellular networks. It avoids the recording of moving tracks of mobile subscribers. The described procedures are derived from the well known untraceable MIX network and the distributed storage of location information according to GSM networks. 1 Terminology The served area of a cellula...
Article
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our objective is to increase the network's trustworthiness by providing means to prevent generation of moving tracks: The protection should be shifted into a subscriber`s domain...
Article
Introduction The increasing use of mobile communication networks results in ever more stringent security requirements. In an information society, availability, integrity and confidentiality are essential. Especially the provision of the latter is hard to demonstrate. If someone or some component is able to collect and store personal data, one canno...
Article
Location Management of mobile users in a cellular network is considered from a performance and privacy point of view. Location management covers tracking functionality and paging (searching) functionality. After a risk analysis of location management w.r.t. privacy, we focus on the paging strategy. A sequential search strategy is proposed which red...
Conference Paper
One measure to provide anonymity for the users of a communication network are mixes whose usage was proposed in several applications recently. However, in practice such concepts are not widely used. One reason may be that the payment for providers, who commercially offer such mix-mediated anonymity service, has not been considered yet. We present d...
Article
Full-text available
We present techniques for efficient anonymous communication with real-time constraints as necessary for services like telephony, where a continuous data stream has to be transmitted. For concreteness, we present the detailed protocols for the narrow-band ISDN (integrated services digital network), although the heart of our techniques-anonymous chan...
Conference Paper
Full-text available
Mixes allow the users of electronic data networks to communicate with each other without identifying themselves or uncovering their relationship. Several security applications suggest the usage of mixes. However, such concepts are often not commercially used in practice. One reason may be that providers are only willing to offer anonymous communica...
Conference Paper
Location management of mobile users in a cellular network is considered from a performance and privacy point of view. Location management covers tracking functionality and paging (searching) functionality. After a risk analysis of location management w.r.t. privacy, we focus on the paging strategy. A sequential search strategy is proposed which red...
Article
Full-text available
Zusammenfassung Es wird ein Verfahren zur Verwaltung von Aufenthaltsinformationen in Mobilkommunikations-systemen vorgestellt. Dabei wird von dem in existierenden Netzen verwendeten Konzept der mehrstufigen Speicherung von Aufenthaltsinformationen ausgegangen. Das Verfahren erfüllt die Datenschutzforderung nach Vertraulichkeit des Aufenthaltsorts v...
Article
Es wird ein Verfahren zum Schutz der Vermittlungsdaten vorgestellt, das es den Nutzern von Kommunikationsnetzen ermöglicht, diese Netze unbeobachtbar und anonym zu nutzen. Dieses Verfahren der getakteten Mix-Kanäle [PfPW_89] basiert auf dem Mix-Netz, einer Methode für anonyme Kommunikation von D. Chaum. Die Realisierung dieses Konzeptes wird für di...
Chapter
Ausgehend von der ursprünglichen Definition der Mixe von D. Chaum und fortführenden Arbeiten von A. Pfitzmann et al. werden Erweiterungen dieses Konzepts betrachtet. Daraus wird ein mögliches allgemeines Modell abgeleitet, welches verschiedene Anwendungen des Mix-Konzepts berücksichtigt. In einem ablauforientierten Modell werden die möglichen Konfi...
Chapter
Es wird ein Verfahren zur Verwaltung von Aufenthaltsinformationen in Mobilkommunikationssystemen vorgestellt. Dabei wird von dem in existierenden Netzen verwendeten Konzept der mehrstufigen Speicherung von Aufenthaltsinformationen ausgegangen. Das Verfahren erfüllt die Datenschutzforderung nach Vertraulichkeit des Aufenthaltsorts von Mobilkommunika...
Conference Paper
In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give...
Conference Paper
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our objective is to increase the network’s trustworthiness by providing means to prevent generation of moving tracks: The protection should be shifted into a subscriber’s domain...
Article
Wir untersuchen Möglichkeiten mehrseitig sicherer und vertrauenswürdiger Schlüsselerzeugung, also vertrauenswürdig für den individuellen Nutzer und seine Kommunikationspartner sowie bei Signierschlüsseln auch vertrauenswürdig für die staatlichen Regulierer von Kryptographie. Zunächst werden für Signierschlüssel einige Verfahren diskutiert, wie Vert...

Network

Cited By