
Anja Jerichow- Consultant at Nokia
Anja Jerichow
- Consultant at Nokia
About
26
Publications
1,615
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
385
Citations
Introduction
Current institution
Publications
Publications (26)
The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. Building blocks of 5G supporting use cases and requirements from the manufacturing sector are extreme mobile broadband, massive machine-type communication, ultra-reliable critical machine communication, non-public networks, time sensitiv...
A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256, 262) only if the zapping includes termination of a password-protected service (X, Y, Z). In one embodiment, the trigger message is sent to a smartcard (S...
Mixes allow anonymous communication. They hide the communication relation between sender and recipient and, thereby, guarantee that messages are untraceable in an electronic communication network. Nonetheless, depending on the strength of the attacker, several known attacks on mixes still allow the tracing of messages through the network.
We discu...
The European project " mCDN – Multimedia Content Delivery Networks " aims at an optimized and personalized content management and content delivery, being adaptive to a rich variety of clients in heterogeneous fixed-mobile networks. Security is an important issue in the mCDN project. Content and identity protection, user privacy, and also the integr...
A major goal of the European project “mCDN” is the enhancement of Content Delivery Networks (CDNs) for secure multimedia content discovery and delivery that is very well suited for converged fixed-mobile environments. This is achieved by introducing specific Web service components such as personalization, optimal content placement and discovery, pe...
This paper introduces a new technique for location management in cellular networks. It avoids the recording of moving tracks of mobile subscribers. The described procedures are derived from the well known untraceable MIX network and the distributed storage of location information according to GSM networks. 1 Terminology The served area of a cellula...
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our objective is to increase the network's trustworthiness by providing means to prevent generation of moving tracks: The protection should be shifted into a subscriber`s domain...
Introduction The increasing use of mobile communication networks results in ever more stringent security requirements. In an information society, availability, integrity and confidentiality are essential. Especially the provision of the latter is hard to demonstrate. If someone or some component is able to collect and store personal data, one canno...
Location Management of mobile users in a cellular network is considered from a performance and privacy point of view. Location management covers tracking functionality and paging (searching) functionality. After a risk analysis of location management w.r.t. privacy, we focus on the paging strategy. A sequential search strategy is proposed which red...
One measure to provide anonymity for the users of a communication network are mixes whose usage was proposed in several applications recently. However, in practice such concepts are not widely used. One reason may be that the payment for providers, who commercially offer such mix-mediated anonymity service, has not been considered yet. We present d...
We present techniques for efficient anonymous communication with
real-time constraints as necessary for services like telephony, where a
continuous data stream has to be transmitted. For concreteness, we
present the detailed protocols for the narrow-band ISDN (integrated
services digital network), although the heart of our
techniques-anonymous chan...
Mixes allow the users of electronic data networks to communicate with each other without identifying themselves or uncovering
their relationship. Several security applications suggest the usage of mixes. However, such concepts are often not commercially
used in practice. One reason may be that providers are only willing to offer anonymous communica...
Location management of mobile users in a cellular network is
considered from a performance and privacy point of view. Location
management covers tracking functionality and paging (searching)
functionality. After a risk analysis of location management w.r.t.
privacy, we focus on the paging strategy. A sequential search strategy
is proposed which red...
Zusammenfassung Es wird ein Verfahren zur Verwaltung von Aufenthaltsinformationen in Mobilkommunikations-systemen vorgestellt. Dabei wird von dem in existierenden Netzen verwendeten Konzept der mehrstufigen Speicherung von Aufenthaltsinformationen ausgegangen. Das Verfahren erfüllt die Datenschutzforderung nach Vertraulichkeit des Aufenthaltsorts v...
Es wird ein Verfahren zum Schutz der Vermittlungsdaten vorgestellt, das es den Nutzern von Kommunikationsnetzen ermöglicht, diese Netze unbeobachtbar und anonym zu nutzen. Dieses Verfahren der getakteten Mix-Kanäle [PfPW_89] basiert auf dem Mix-Netz, einer Methode für anonyme Kommunikation von D. Chaum. Die Realisierung dieses Konzeptes wird für di...
Ausgehend von der ursprünglichen Definition der Mixe von D. Chaum und fortführenden Arbeiten von A. Pfitzmann et al. werden Erweiterungen dieses Konzepts betrachtet. Daraus wird ein mögliches allgemeines Modell abgeleitet, welches verschiedene Anwendungen des Mix-Konzepts berücksichtigt.
In einem ablauforientierten Modell werden die möglichen Konfi...
Es wird ein Verfahren zur Verwaltung von Aufenthaltsinformationen in Mobilkommunikationssystemen vorgestellt. Dabei wird von dem in existierenden Netzen verwendeten Konzept der mehrstufigen Speicherung von Aufenthaltsinformationen ausgegangen. Das Verfahren erfüllt die Datenschutzforderung nach Vertraulichkeit des Aufenthaltsorts von Mobilkommunika...
In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give...
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues.
Our objective is to increase the network’s trustworthiness by providing means to prevent generation of moving tracks: The protection should be shifted into a subscriber’s domain...
Wir untersuchen Möglichkeiten mehrseitig sicherer und vertrauenswürdiger Schlüsselerzeugung, also vertrauenswürdig für den individuellen Nutzer und seine Kommunikationspartner sowie bei Signierschlüsseln auch vertrauenswürdig für die staatlichen Regulierer von Kryptographie.
Zunächst werden für Signierschlüssel einige Verfahren diskutiert, wie Vert...