Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Oliver Hanka
@inproceedings{DBLP:conf/noms/HeroldPHC16, author = {Nadine Herold and Stephan{-}Alexander Posselt and Oliver Hanka and Georg Carle}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Anomaly detection for {SOME/IP} using complex event processing}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {1221--1226}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502991}, doi = {10.1109/NOMS.2016.7502991}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/HeroldPHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DiekmannPNKHC16, author = {Cornelius Diekmann and Stephan{-}Alexander Posselt and Heiko Niedermayer and Holger Kinkelin and Oliver Hanka and Georg Carle}, title = {Verifying Security Policies using Host Attributes}, journal = {CoRR}, volume = {abs/1604.00204}, year = {2016}, url = {http://arxiv.org/abs/1604.00204}, eprinttype = {arXiv}, eprint = {1604.00204}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DiekmannPNKHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/MunchPHH15, author = {Daniel M{\"{u}}nch and Michael Paulitsch and Oliver Hanka and Andreas Herkersdorf}, editor = {Lu{\'{\i}}s Miguel Pinho and Wolfgang Karl and Albert Cohen and Uwe Brinkschulte}, title = {SgInt: Safeguarding Interrupts for Hardware-Based {I/O} Virtualization for Mixed-Criticality Embedded Real-Time Systems Using Non Transparent Bridges}, booktitle = {Architecture of Computing Systems - {ARCS} 2015 - 28th International Conference, Porto, Portugal, March 24-27, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9017}, pages = {15--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16086-3\_2}, doi = {10.1007/978-3-319-16086-3\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/arcs/MunchPHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MunchPHH15, author = {Daniel M{\"{u}}nch and Michael Paulitsch and Oliver Hanka and Andreas Herkersdorf}, editor = {Wolfgang Nebel and David Atienza}, title = {{MPIOV:} scaling hardware-based {I/O} virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {579--584}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755883}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/MunchPHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/DiekmannPNKHC14, author = {Cornelius Diekmann and Stephan{-}Alexander Posselt and Heiko Niedermayer and Holger Kinkelin and Oliver Hanka and Georg Carle}, editor = {Erika {\'{A}}brah{\'{a}}m and Catuscia Palamidessi}, title = {Verifying Security Policies Using Host Attributes}, booktitle = {Formal Techniques for Distributed Objects, Components, and Systems - 34th {IFIP} {WG} 6.1 International Conference, {FORTE} 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8461}, pages = {133--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43613-4\_9}, doi = {10.1007/978-3-662-43613-4\_9}, timestamp = {Fri, 09 Apr 2021 18:40:15 +0200}, biburl = {https://dblp.org/rec/conf/forte/DiekmannPNKHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KuntzeRH14, author = {Nicolai Kuntze and Carsten Rudolph and Oliver Hanka}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Security foundation for a distributed cabin core architecture}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950487}, doi = {10.1109/ISSA.2014.6950487}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KuntzeRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Hanka12, author = {Oliver Hanka}, title = {Locator, Identifier Split Based Internet Architecture With Integrated Security {\&} Privacy}, school = {Technical University Munich}, year = {2012}, url = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20121030-1096910-0-7}, urn = {urn:nbn:de:bvb:91-diss-20121030-1096910-0-7}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Hanka12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/WippelH12, author = {Hans Wippel and Oliver Hanka}, title = {End User Node Access to Application-Tailored Future Networks}, booktitle = {21st International Conference on Computer Communications and Networks, {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCCN.2012.6289290}, doi = {10.1109/ICCCN.2012.6289290}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/WippelH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/Hanka12, author = {Oliver Hanka}, title = {How to prevent identity fraud in locator/identifier - Split architectures}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2012, Maui, HI, USA, January 30 - February 2, 2012}, pages = {683--689}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICCNC.2012.6167510}, doi = {10.1109/ICCNC.2012.6167510}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/Hanka12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/HankaEPES11, author = {Oliver Hanka and Michael Eichhorn and Martin Pfannenstein and J{\"{o}}rg Ebersp{\"{a}}cher and Eckehard G. Steinbach}, title = {A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture}, journal = {Future Internet}, volume = {3}, number = {1}, pages = {14--30}, year = {2011}, url = {https://doi.org/10.3390/fi3010014}, doi = {10.3390/FI3010014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/HankaEPES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/Hanka11, author = {Oliver Hanka}, editor = {Sheng Zhong and Dejing Dou and Yu Wang}, title = {The cost of location privacy in locator/identifier-split architectures}, booktitle = {30th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PCCC.2011.6108112}, doi = {10.1109/PCCC.2011.6108112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/Hanka11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nof/HankaW11, author = {Oliver Hanka and Hans Wippel}, title = {Secure deployment of application-tailored protocols in future networks}, booktitle = {International Conference on the Network of the Future, {NOF} 2011, Paris, France, November 28-30, 2011}, pages = {10--14}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NOF.2011.6126668}, doi = {10.1109/NOF.2011.6126668}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/nof/HankaW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/LichtingerH10, author = {Bernhard Lichtinger and Oliver Hanka}, editor = {Yoshiaki Kiriha and Lisandro Zambenedetti Granville and Deep Medhi and Toshio Tonouchi and Myung{-}Sup Kim}, title = {Secure setup of inter-provider Ethernet services based on a novel naming schema}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010, 19-23 April 2010, Osaka, Japan}, pages = {886--889}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/NOMS.2010.5488349}, doi = {10.1109/NOMS.2010.5488349}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/LichtingerH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tridentcom/WippelHSM10, author = {Hans Wippel and Oliver Hanka and Christoph Splei{\ss} and Denis Martin}, editor = {Thomas Magedanz and Anastasius Gavras and Huu{-}Thanh Nguyen and Jeffrey S. Chase}, title = {Evaluation of Future Network Architectures and Services in the G-Lab Testbed}, booktitle = {Testbeds and Research Infrastructures. Development of Networks and Communities - 6th International {ICST} Conference, TridentCom 2010, Berlin, Germany, May 18-20, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {46}, pages = {587--589}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17851-1\_49}, doi = {10.1007/978-3-642-17851-1\_49}, timestamp = {Mon, 12 Aug 2019 15:36:15 +0200}, biburl = {https://dblp.org/rec/conf/tridentcom/WippelHSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/HankaSKE09, author = {Oliver Hanka and Christoph Splei{\ss} and Gerald Kunzmann and J{\"{o}}rg Ebersp{\"{a}}cher}, editor = {Robert Bestak and Laurent George and Vladimir S. Zaborovsky and Cosmin Dini}, title = {A Novel DHT-Based Network Architecture for the Next Generation Internet}, booktitle = {The Eighth International Conference on Networks, {ICN} 2009, 1-6 March 2009, Gosier, Guadeloupe, France}, pages = {332--341}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICN.2009.12}, doi = {10.1109/ICN.2009.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icn/HankaSKE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.