Skip to content. | Skip to navigation

Personal tools

This is SunRain Plone Theme

Navigation

You are here: Home / Publications

Network Security

Raphael Hiesgen, Dominik Charousset, Thomas C. Schmidt,
OpenCL Actors–-Adding Data Parallelism to Actor-based Programming with CAF,
In: Programming with Actors - State-of-the-Art and Research Perspectives, (Alessandro Ricci, Philipp Haller, Travis Desel, Sylvan Clebsh Ed.), ser. Lecture Notes on Computer Sciences (LNCS), No. 10789, Springer Verlag : Berlin, Heidelberg, N.Y., 2018.
[BibTeX][Abstract]

Andreas Reuter, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
ACM Sigcomm Computer Communication Review, Vol. 48, No. 1, p. 19–27, January 2018.
[html][BibTeX][Abstract]

Peter Kietzmann, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch,
A PUF Seed Generator for RIOT: Introducing Crypto-Fundamentals to the Wild,
In: Proc. of 16th ACM International Conference on Mobile Systems, Applications (Mobsys), Poster Session, ACM : New York, NY, USA, June 2018.
[BibTeX][Abstract]

Andreas Reuter, Randy Bush, \'Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
Technical Report, No. arXiv:1706.04263, June 2017.
[html][BibTeX][Abstract]

Philipp Meyer, Raphael Hiesgen, Thomas C. Schmidt, Marcin Nawrocki, Matthias Wählisch,
Towards Distributed Threat Intelligence in Real-Time,
In: Proceedings of SIGCOMM Posters and Demos '17, Demo Session, ACM : New York, NY, USA, August 2017.
[pdf][BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of Intern. Conf. on Embedded Wireless Systems and Networks (EWSN '16), p. 59–64, ACM : New York, NY, USA, Feb. 2016.
[pdf][BibTeX][Abstract]

Martin Landsmann, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Demo: Topological Robustness of RPL with TRAIL,
In: Proc. of Intern. Conf. on Embedded Wireless Systems and Networks (EWSN '16), Demonstration, p. 219–220, ACM : New York, NY, USA, Feb. 2016.
[BibTeX][Abstract]

Matthias Wählisch,
Measuring and Implementing Internet Backbone Security: Current Challenges, Upcoming Deployment, and Future Trends,
Doctoral Dissertation, February 2016.
[html][BibTeX][Abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Let's Collect Names: How PANINI Limits FIB Tables in Name Based Routing,
In: Proc. of 15th IFIP Networking Conference, p. 458–466, IEEE Press : Piscataway, NJ, USA, May 2016.
[pdf][BibTeX][Abstract]

Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack,
CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP,
Technical Report, No. arXiv:1605.00618, May 2016.
[html][BibTeX][Abstract]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder,
A Survey on Honeypot Software and Data Analysis,
Technical Report, No. arXiv:1608.06249, 2016.
[html][BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
Technical Report, No. arXiv:1312.0984, December 2015.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
In: Traffic Monitoring and Analysis, ser. LNCS, Vol. 9053, p. 188–201, Springer-Verlag, April 2015.
[BibTeX][Abstract]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 107-108, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 115-116, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
In: Proc. of ACM SIGCOMM, Poster Session, p. 603–604, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt,
Amplification and DRDoS Attack Defense – A Survey and New Perspectives,
Technical Report, No. arXiv:1505.07892, June 2015.
[html][BibTeX][Abstract]

Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch,
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics,
In: Proc. of 9th USENIX Security Workshop on Offensive Technologies (WOOT), p. 1–8, USENIX Assoc. : Berkeley, CA, USA, 2015.
[pdf][BibTeX][Abstract]

Sebastian Meiling, Thomas C. Schmidt, Till Steinbach,
On Performance and Robustness of Internet-Based Smart Grid Communication: A Case Study for Germany,
In: 6th IEEE Int. Conf. on Smart Grid Communications (SmartGridComm'15), p. 300–305, IEEE Press : Piscataway, NJ, USA, 2015.
[pdf][BibTeX][Abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Partial Adaptive Name Information in ICN: PANINI Routing Limits FIB Table Sizes,
In: 2nd ACM Conference on Information-Centric Networking, Poster Session, ser. ICN 2015, p. 193–194, ACM : New York, Oct. 2015.
[pdf][BibTeX][Abstract]

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt,
Revisiting Countermeasures Against NDN Interest Flooding,
In: 2nd ACM Conference on Information-Centric Networking, Poster Session, ser. ICN 2015, p. 195–196, ACM : New York, Oct. 2015.
[pdf][BibTeX][Abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson,
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem,
In: Proc. of 14th ACM Workshop on Hot Topics in Networks (HotNets), p. 11:1–11:7, ACM : New York, Nov. 2015.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, pp. 115-116, ACM : New York, NY, USA, 2015.
[BibTeX][Details]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, p. 603–604, ACM : New York, NY, USA, 2015.
[BibTeX][Details]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, p. 107–108, ACM : New York, NY, USA, 2015.
[BibTeX][Abstract]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
Resource Public Key Infrastructure (RPKI) Router Implementation Report,
RFC, No. 7128, February 2014.
[html][BibTeX][Abstract]

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch,
Native Actors: How to Scale Network Forensics,
In: Proc. of ACM SIGCOMM, Demo Session, p. 141–142, ACM : New York, August 2014.
[pdf][BibTeX][Abstract]

Emmanuel Baccelli, Oliver Hahm, Matthias Wählisch,
Spontaneous Wireless Networking to Counter Pervasive Monitoring,
In: Proc. of W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
[html][BibTeX][Details]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig,
When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites,
Technical Report, No. arXiv:1408.0391, September 2014.
[html][BibTeX][Abstract]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
Technical Report, No. arXiv:1412.5052, December 2014.
[html][BibTeX][Abstract]

Felix Gomez Marmol, Christoph Sorge, Osman Ugus, Gregorio Martinez Perez,
WSANRep, WSAN Reputation-Based Selection in Open Environments,
Wireless Personal Communications, Vol. 68, No. 3, p. 921–937, Springer, February 2013.
[BibTeX][Details]

Felix Gomez Marmol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martinez Perez,
Privacy Enhanced Architecture for Smart Metering,
International Journal of Information Security, Vol. 12, No. 2, p. 67–82, Springer, April 2013.
[BibTeX][Abstract]

Dirk Westhoff, Osman Ugus,
Malleability Resilient (Premium) Concealed Data Aggregation,
In: Proc. of the 4th IEEE Int. Work. on Data Security and Privacy in Wireless Networks (D-SPAN'13), IEEE Press : Madrid, Spain, June 2013.
[BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
RPKI Router Implementation Report,
IETF Internet Draft – work in progress, No. 05, December 2013.
[html][BibTeX][Abstract]

Matthias Wählisch, André Vorbach, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen H. Schiller,
Design, Implementation, and Operation of a Mobile Honeypot,
Technical Report, No. arXiv:1205.4778, 2013.
[html][BibTeX][Abstract]

Martin Landsmann, Heiner Perrey, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
In: Proc. of the 32nd IEEE INFOCOM. Poster, IEEE Press : Piscataway, NJ, USA, 2013.
[pdf][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,
In: Proc. of IFIP Networking, IEEE Press : Piscataway, NJ, USA, 2013.
[pdf][BibTeX][Abstract]

Matthias Wählisch, Emmanuel Baccelli, Jochen Schiller, Agnènes Voisard, Thomas C. Schmidt, Stefan Pfennigschmidt, Mark Palkow, Uwe Weigmann, Uwe Hanewald,
Technische Dimensionen der Flughafensicherheit,
Crisis Prevention, No. 1, p. 15–16, Jan. 2013.
[BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
Updates from the Internet Backbone,
In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, The Internet Society, February 2013.
[html][BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation,
In: Proc. of USENIX Security Workshop CSET'13, USENIX Assoc. : Berkeley, CA, USA, 2013.
[html][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane – Threats to Stability and Security in Information-Centric Network Infrastructure,
Computer Networks, Vol. 57, No. 16, p. 3192–3206, Elsevier, Nov. 2013.
[html][pdf][BibTeX][Abstract]

Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling,
On Name-based Group Communication: Challenges, Concepts, and Transparent Deployment,
Computer Communications, Vol. 36, No. 15--16, p. 1657–1664, Elsevier, Sep--Oct 2013.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch,
Conference Reports. Sec '13: 22nd USENIX Security Symposium. Large Scale Systems Security III,
;login:, Vol. 38, No. 6, p. 29–31, Dec. 2013.
[BibTeX][Details]

Felix Gomez Marmol, Christoph Sorge, Osman Ugus, Gregorio Martinez Perez,
Do Not Snoop My Habits: Preserving Privacy in the Smart Grid,
IEEE Communications Magazine, Vol. 50, No. 5, p. 166–172, IEEE, May 2012.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Hariharan Rajasekaran,
A leaky bucket called smartphone,
In: 4th Workshop on Security and Social Networks (SESOC'12), p. 374–380, IEEE : Lugano, Switzerland, March 2012.
[BibTeX][Details]

Osman Ugus, Martin Landsmann, Dennis Gessner, Dirk Westhoff,
A Smartphone Security Architecture for App Verification and Process Authentication,
In: 21st International Conference on Computer Communications and Networks (ICCCN'12), p. 1–9, IEEE : Munich, Germany, August 2012.
[BibTeX][Details]

Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge,
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture,
In: International Conference on Security and Cryptography (SECRYPT'12), p. 102–112, July 2012.
[BibTeX][Details]

Osman Ugus,
Secure and Reliable Remote Programming in Wireless Sensor Networks,
Doctoral Dissertation, 2012.
[pdf][BibTeX][Details]

Emmanuel Baccelli, Lars Gerhold, Christophe Guettier, Jochen Schiller, Thomas C. Schmidt, Genevieve Sella, Ulrich Meissen, Agnes Voisard, Matthias Wählisch, Georg Wittenburg,
SAFEST: A Framework for Early Security Triggers in Public Spaces,
In: Proc. of WISG 2012 – Workshop Interdisciplinaire sur la Securite Globale, January 2012.
[html][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane –- Threats to Stability and Security in Information-Centric Networking,
Technical Report, No. arXiv:1205.4778, 2012.
[html][BibTeX][Abstract]

Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt,
Towards Detecting BGP Route Hijacking using the RPKI,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 103-104, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Bulk of Interest: Performance Measurement of Content-Centric Routing,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 99-100, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen Schiller,
First Insights from a Mobile Honeypot,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 305-306, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Sebastian Trapp, Jochen Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder,
Vitamin C for your Smartphone: The SKIMS Approach for Cooperative and Lightweight Security at Mobiles,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 271-272, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Alban Hessler, Takahiro Kakumaru, Heiner Perrey, Dirk Westhoff,
Data Obfuscation for Network Coding,
Computer Communications, Vol. 35, No. 1, p. 48–61, Elsevier, January 2012.
[BibTeX][Details]

Heiner Perrey, Osman Ugus, Dirk Westhoff,
WiSec' 2011 Poster: Security Enhancement for Bluetooth Low Energy with Merkle's Puzzle,
SIGMOBILE Mob. Comput. Commun. Rev. (MC2R), Vol. 15, No. 3, p. 45–46, ACM, November 2011.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff,
An MTM-based Watchdog for Malware Famishment in Smartphones,
In: 11th International Conference on Innovative Internet Community Services (I$^2$CS'11), p. 251–262, June 2011.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Klaus Meier, Osman Ugus, Dirk Westhoff,
Dependable Over-the-Air Programming,
Adhoc \& Sensor Wireless Networks, Vol. 13, No. 3-4, p. 313–340, 2011.
[BibTeX][Details]

Thomas C. Schmidt, Gabriel Hege, Matthias Wählisch, Hans L. Cycon, Mark Palkow, Detlev Marpe,
Distributed SIP Conference Management with Autonomously Authenticated Sources and its Application to an H.264 Videoconferencing Software for Mobiles,
Multimedia Tools and Applications, Vol. 53, No. 2, p. 349–370, Springer Verlag : Berlin, Heidelberg, June 2011.
[html][pdf][BibTeX][Abstract]

Thomas C. Schmidt, Matthias Wählisch, Michael Gröning,
Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
In: Poster at the ACM WiSec, ACM : New York, June 2011.
[BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus de Brün, Thomas Häberlen,
Exposure of the German Research Internet Infrastructure,
In: Proc. of the TERENA Networking Conference, p. Poster, Terena : Amsterdam, Mai 2011.
[html][BibTeX][Details]

Benjamin Jochheim, Thomas C. Schmidt, Matthias Wählisch,
A Signature-free approach to malicious code detection by applying entropy analysis to network streams,
In: Proc. of the TERENA Networking Conference, p. Poster, Terena : Amsterdam, Mai 2011.
[html][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning,
WiSec 2011 Poster: Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 15, No. 3, p. 47–48, ACM : New York, July 2011.
[BibTeX][Details]

Sebastian Trapp, Matthias Wählisch, Jochen Schiller,
Short Paper: Can Your Phone Trust Your Friend Selection?,
In: Proc. of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), p. 69–74, ACM : New York, 2011.
[pdf][BibTeX][Abstract]

Jens-Matthias Bohli, Christoph Sorge, Osman Ugus,
A Privacy Model for Smart Metering,
In: First International Workshop on Smart Grid Communications (in conjunction with IEEE ICC'10), IEEE : Cape Town, South Africa, May 2010.
[BibTeX][Details]

Nicola Bui, Osman Ugus, Moreno Dissegna, Michele Rossi, Michele Zorzi,
An integrated system for secure code distribution in Wireless Sensor Networks,
In: 6th PerCom Workshop on Pervasive Wireless Networking (PWN'10), p. 575–581, IEEE : Mannheim, Germany, April 2010.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen),
it - Information Technology, Vol. 52, No. 6, p. 313–319, 2010.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli,
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T-time signature scheme,
In: the second ACM conference on Wireless network security (WiSec'09), p. 29–40, ACM : Zurich, Switzerland, March 2009.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
Security enhanced multi-hop over the air reprogramming with Fountain Codes,
In: 34th Conference on Local Computer Networks (LCN'09), p. 850–857, IEEE : Zurich, Switzerland, October 2009.
[BibTeX][Details]

Klaus Meier, Alban Hessler, Osman Ugus, Jörg Keller, Dirk Westhoff,
Multi-Hop Over-The-Air Reprogramming of Wireless Sensor Networks using Fuzzy Control and Fountain Codes,
In: Workshop of Self-Organising Wireless Sensor and Communication Networks (Somsed'09), October 2009.
[BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Gabriel Hege,
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast,
In: Proceedings of the 28th IEEE INFOCOM. Student Workshop, IEEE Press : Piscataway, NJ, USA, April 2009.
[pdf][BibTeX][Abstract]

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wählisch,
Connecting the Worlds: Multipoint Videoconferencing Integrating H.323 and IPv4, SIP and IPv6 with Autonomous Sender Authentication,
In: ISCE2009 –- 13th International Symposium on Consumer Electronics, p. 890–893, IEEE Press : Piscataway, NJ, USA, May 2009.
[pdf][BibTeX][Abstract]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
A secure and resilient WSN roadside architecture for intelligent transport systems,
In: the first ACM conference on Wireless network security (WiSec'08), p. 161–171, ACM : Alexandria, VA, USA, March 2008.
[BibTeX][Details]

Osman Ugus, Takahiro Kakumaru, Dirk Westhoff,
On the Insecurity of Available Code Update Mechanism and its Improvements,
In: IEICE society conference, September 2008.
[BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ,
AuthoCast –- A Protocol for Mobile Multicast Sender Authentication,
In: MoMM 2008 - 6th International Conference on Advances in Mobile Computing & Multimedia, (Gabriele Kotsis, David Taniar, Eric Pardede, Ismail Khalil Ed.), ACM, p. 142–149, ACM : Linz, AU, November 2008.
[BibTeX][Abstract]

Thomas C. Schmidt, Olaf Christ, Matthias Wählisch,
Autonome Zertifizierung mobiler Multicast-Sender – AuthoCast –,
In: Endausscheidung für den Deutschen IT Sicherheitspreis 2008, Horst Görtz Stiftung, October 2008.
[pdf][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege,
AuthoCast –- a mobility-compliant protocol framework for multicast sender authentication,
Security and Communication Networks, Vol. 1, No. 6, p. 495 – 509, Wiley & Sons, Ltd, December 2008.
[html][pdf][BibTeX][Abstract]

Osman Ugus, Alban Hessler, Dirk Westhoff,
Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS,
In: 6th Fachgespräch Drahtlose Sensornetze, p. 55–58, July 2007.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Ralf Laue, Abdul Shoufan, Sorin A. Huss,
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks,
In: 2nd Workshop on Embedded Systems Security (WESS'07), p. 11–16, IEEE/ACM : Salzburg, Austria, October 2007.
[BibTeX][Details]

 


This page generated by bibTOhtml on Thu Jul 19 00:05:05 CEST 2018

Document Actions

« July 2018 »
July
MoTuWeThFrSaSu
1
2345678
9101112131415
16171819202122
23242526272829
3031
Upcoming Events
C++ User Group (2018/07) Jul 24, 2018 07:00 PM - 09:00 PM — to be determined
RIOT Hack'n'ACK (2018/07) Jul 31, 2018 05:00 PM - 11:00 PM — HAW Hamburg, BT7, R4.60
C++ User Group (2018/08) Aug 15, 2018 07:00 PM - 09:00 PM — to be determined
Upcoming events…