default search action
BibTeX records: Dirk Westhoff
@inproceedings{DBLP:conf/sicherheit/BreigW22, author = {Jan Breig and Dirk Westhoff}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Short Paper: Debating Ethics with Cybersecurity Students}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {183--192}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_12}, doi = {10.18420/SICHERHEIT2022\_12}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BreigW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/TajanWA20, author = {Louis Tajan and Dirk Westhoff and Frederik Armknecht}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {443--450}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009835904430450}, doi = {10.5220/0009835904430450}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/TajanWA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08248, author = {Louis Tajan and Dirk Westhoff}, title = {Approach for {GDPR} Compliant Detection of {COVID-19} Infection Chains}, journal = {CoRR}, volume = {abs/2007.08248}, year = {2020}, url = {https://arxiv.org/abs/2007.08248}, eprinttype = {arXiv}, eprint = {2007.08248}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/TajanW19, author = {Louis Tajan and Dirk Westhoff}, title = {Retrospective Tracking of Suspects in {GDPR} Conform Mobile Access Networks Datasets}, booktitle = {Proceedings of the Third Central European Cybersecurity Conference, {CECC} 2019, Munich, Germany, November 14-15, 2019}, pages = {16:1--16:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360664.3360680}, doi = {10.1145/3360664.3360680}, timestamp = {Mon, 28 Oct 2019 08:10:46 +0100}, biburl = {https://dblp.org/rec/conf/cecc/TajanW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TajanWA19, author = {Louis Tajan and Dirk Westhoff and Frederik Armknecht}, title = {Private Set Relations with Bloom Filters for Outsourced {SLA} Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2019}, url = {https://eprint.iacr.org/2019/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TajanWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/WesthoffZ18, author = {Dirk Westhoff and Maximilian Zeiser}, title = {Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {2}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018040101}, doi = {10.4018/IJCWT.2018040101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/WesthoffZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/TajanKW18, author = {Louis Tajan and Moritz Kaumanns and Dirk Westhoff}, title = {Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing}, booktitle = {9th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2018, Paris, France, February 26-28, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NTMS.2018.8328713}, doi = {10.1109/NTMS.2018.8328713}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/TajanKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BetzWM17, author = {Johann Betz and Dirk Westhoff and G{\"{u}}nter M{\"{u}}ller}, title = {Survey on covert channels in virtual machines and cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {28}, number = {6}, year = {2017}, url = {https://doi.org/10.1002/ett.3134}, doi = {10.1002/ETT.3134}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/BetzWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZeiserBW17, author = {Maximilian Zeiser and Johann Betz and Dirk Westhoff}, title = {Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's Credit Scheduler}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8253984}, doi = {10.1109/GLOCOM.2017.8253984}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZeiserBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TajanWRA16, author = {Louis Tajan and Dirk Westhoff and Christian A. Reuter and Frederik Armknecht}, title = {Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {162--169}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856690}, doi = {10.1109/ICITST.2016.7856690}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/ZeiserW16, author = {Maximilian Zeiser and Dirk Westhoff}, editor = {G{\"{u}}nter Fahrnberger and Gerald Eichler and Christian Erfurth}, title = {Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices}, booktitle = {Innovations for Community Services - 16th International Conference, {I4CS} 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {648}, pages = {75--89}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49466-1\_6}, doi = {10.1007/978-3-319-49466-1\_6}, timestamp = {Sat, 19 Oct 2019 20:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iics/ZeiserW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/MohammadSW15, author = {Asif Mohammad and Jurgen Stader and Dirk Westhoff}, editor = {J{\"{o}}rg Roth and Gerald Eichler and Christian Erfurth}, title = {A privacy-friendly smart metering architecture with few-instance storage}, booktitle = {15th International Conference on Innovations for Community Services, {I4CS} 2015, Nuremberg, Germany, July 8-10, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/I4CS.2015.7294485}, doi = {10.1109/I4CS.2015.7294485}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iics/MohammadSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/StecklinaKGJKLS15, author = {Oliver Stecklina and Stephan Kornemann and Felix Grehl and Ramona Jung and Thorsten Kranz and Gregor Leander and Dennis Schweer and Katharina Mollus and Dirk Westhoff}, editor = {J{\"{o}}rg Roth and Gerald Eichler and Christian Erfurth}, title = {Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes}, booktitle = {15th International Conference on Innovations for Community Services, {I4CS} 2015, Nuremberg, Germany, July 8-10, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/I4CS.2015.7294492}, doi = {10.1109/I4CS.2015.7294492}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iics/StecklinaKGJKLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saso/NiroLWC15, author = {Sascha Niro and Jose M. Lopez and Dirk Westhoff and Andreas H. Christ}, title = {A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for Prosumer Markets}, booktitle = {2015 {IEEE} International Conference on Self-Adaptive and Self-Organizing Systems Workshops, {SASO} Workshops 2015, Cambridge, MA, USA, September 21-25, 2015}, pages = {31--36}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SASOW.2015.10}, doi = {10.1109/SASOW.2015.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saso/NiroLWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/KasparLW14, author = {Friedbert Kaspar and Bertold Laschinger and Dirk Westhoff}, title = {Portrait: Arbeitsgruppe IT-Sicherheit, Hochschule Furtwangen {(HFU)}}, journal = {Prax. Inf.verarb. Kommun.}, volume = {37}, number = {1}, pages = {67--68}, year = {2014}, url = {https://doi.org/10.1515/pik-2013-0029}, doi = {10.1515/PIK-2013-0029}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/KasparLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BetzW14, author = {Johann Betz and Dirk Westhoff}, title = {C\({}^{\mbox{3}}\)-Sched - {A} cache covert channel robust cloud computing scheduler}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {54--60}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038775}, doi = {10.1109/ICITST.2014.7038775}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BetzW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/MollusWM14, author = {Katharina Mollus and Dirk Westhoff and Tobias Markmann}, editor = {Gerald Eichler and Hac{\`{e}}ne Fouchal and Christian Erfurth}, title = {Curtailing privilege escalation attacks over asynchronous channels on Android}, booktitle = {14th International Conference on Innovations for Community Services, {I4CS} 2014, 4-6 June, 2014, Reims, France}, pages = {87--94}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/I4CS.2014.6860558}, doi = {10.1109/I4CS.2014.6860558}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iics/MollusWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/LopezRW14, author = {Jose M. Lopez and Thomas R{\"{u}}bsamen and Dirk Westhoff}, editor = {Gerald Eichler and Hac{\`{e}}ne Fouchal and Christian Erfurth}, title = {Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption}, booktitle = {14th International Conference on Innovations for Community Services, {I4CS} 2014, 4-6 June, 2014, Reims, France}, pages = {95--103}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/I4CS.2014.6860559}, doi = {10.1109/I4CS.2014.6860559}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iics/LopezRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/Dstep/2014, editor = {Jens{-}Matthias Bohli and Friedbert Kaspar and Dirk Westhoff}, title = {Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen}, publisher = {De Gruyter Oldenbourg}, year = {2014}, url = {http://www.degruyter.com/view/product/428427}, isbn = {978-3-11-035865-0}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/Dstep/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MarmolSPUWP13, author = {F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and Christoph Sorge and Ronald Petrlic and Osman Ugus and Dirk Westhoff and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Privacy-enhanced architecture for smart metering}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {67--82}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0181-6}, doi = {10.1007/S10207-012-0181-6}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MarmolSPUWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MarkmannGW13, author = {Tobias Markmann and Dennis Gessner and Dirk Westhoff}, title = {QuantDroid: Quantitative approach towards mitigating privilege escalation on Android}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2144--2149}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654844}, doi = {10.1109/ICC.2013.6654844}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MarkmannGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/WesthoffU13, author = {Dirk Westhoff and Osman Ugus}, title = {Malleability resilient (premium) Concealed Data Aggregation}, booktitle = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WoWMoM.2013.6583470}, doi = {10.1109/WOWMOM.2013.6583470}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/WesthoffU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HesslerKPW12, author = {Alban Hessler and Takahiro Kakumaru and Heiner Perrey and Dirk Westhoff}, title = {Data obfuscation with network coding}, journal = {Comput. Commun.}, volume = {35}, number = {1}, pages = {48--61}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2010.11.004}, doi = {10.1016/J.COMCOM.2010.11.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HesslerKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/UgusLGW12, author = {Osman Ugus and Martin Landsmann and Dennis Gessner and Dirk Westhoff}, title = {A Smartphone Security Architecture for App Verification and Process Authentication}, booktitle = {21st International Conference on Computer Communications and Networks, {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCCN.2012.6289217}, doi = {10.1109/ICCCN.2012.6289217}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/UgusLGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/VetterW12, author = {Benjamin Vetter and Dirk Westhoff}, title = {Simulation study on code attestation with compressed instruction code}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {296--301}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197498}, doi = {10.1109/PERCOMW.2012.6197498}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/VetterW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/UgusWR12, author = {Osman Ugus and Dirk Westhoff and Hariharan Rajasekaran}, title = {A leaky bucket called smartphone}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {374--380}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197513}, doi = {10.1109/PERCOMW.2012.6197513}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/UgusWR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VetterUWS12, author = {Benjamin Vetter and Osman Ugus and Dirk Westhoff and Christoph Sorge}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {102--112}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/VetterUWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WahlischTSJNSUWKKKS12, author = {Matthias W{\"{a}}hlisch and Sebastian Trapp and Jochen H. Schiller and Benjamin Jochheim and Theodor Nolte and Thomas C. Schmidt and Osman Ugus and Dirk Westhoff and Martin Kutscher and Matthias K{\"{u}}ster and Christian Keil and Jochen Sch{\"{o}}nfelder}, editor = {Lars Eggert and J{\"{o}}rg Ott and Venkata N. Padmanabhan and George Varghese}, title = {Vitamin {C} for your smartphone: the {SKIMS} approach for cooperativeand lightweight security at mobiles}, booktitle = {{ACM} {SIGCOMM} 2012 Conference, {SIGCOMM} '12, Helsinki, Finland - August 13 - 17, 2012}, pages = {271--272}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342356.2342405}, doi = {10.1145/2342356.2342405}, timestamp = {Mon, 22 Mar 2021 16:55:03 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WahlischTSJNSUWKKKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/BohliHMU11, author = {Jens{-}Matthias Bohli and Alban Hessler and Klaus Maier and Osman Ugus and Dirk Westhoff}, title = {Dependable Over-the-Air Programming}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {13}, number = {3-4}, pages = {313--340}, year = {2011}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-13-number-3-4-2011/ahswn-13-3-4-p-313-340/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/BohliHMU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/PerreyUW11, author = {Heiner Perrey and Osman Ugus and Dirk Westhoff}, title = {WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {15}, number = {3}, pages = {45--46}, year = {2011}, url = {https://doi.org/10.1145/2073290.2073302}, doi = {10.1145/2073290.2073302}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/PerreyUW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/VetterW11, author = {Benjamin Vetter and Dirk Westhoff}, editor = {Gerald Eichler and Axel K{\"{u}}pper and Volkmar Schau and Hac{\`{e}}ne Fouchal and Herwig Unger}, title = {Code Attestation with Compressed Instruction Code}, booktitle = {11th International Conference on Innovative Internet Community Services (I\({}^{\mbox{2}}\)CS 2011), June 15-17, 2011, Deutsche Telekom Laboratories, Berlin, Germany}, series = {{LNI}}, volume = {{P-186}}, pages = {170--181}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18986}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iics/VetterW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iics/UgusW11, author = {Osman Ugus and Dirk Westhoff}, editor = {Gerald Eichler and Axel K{\"{u}}pper and Volkmar Schau and Hac{\`{e}}ne Fouchal and Herwig Unger}, title = {An {MTM} based Watchdog for Malware Famishment in Smartphones}, booktitle = {11th International Conference on Innovative Internet Community Services (I\({}^{\mbox{2}}\)CS 2011), June 15-17, 2011, Deutsche Telekom Laboratories, Berlin, Germany}, series = {{LNI}}, volume = {{P-186}}, pages = {251--262}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18994}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iics/UgusW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/BohliPVW11, author = {Jens{-}Matthias Bohli and Panos Papadimitratos and Donato Verardi and Dirk Westhoff}, editor = {Chun Tung Chou and Tom Pfeifer and Anura P. Jayasumana}, title = {Resilient data aggregation for unattended WSNs}, booktitle = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn, Germany, October 4-7, 2011}, pages = {994--1002}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/LCN.2011.6114411}, doi = {10.1109/LCN.2011.6114411}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/BohliPVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2011, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, publisher = {{ACM}}, year = {2011}, isbn = {978-1-4503-0692-8}, timestamp = {Wed, 24 Aug 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-5322, author = {Benjamin Vetter and Dirk Westhoff}, title = {Code Attestation with Compressed Instruction Code}, journal = {CoRR}, volume = {abs/1102.5322}, year = {2011}, url = {http://arxiv.org/abs/1102.5322}, eprinttype = {arXiv}, eprint = {1102.5322}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-5322.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/BohliHUW10, author = {Jens{-}Matthias Bohli and Alban Hessler and Osman Ugus and Dirk Westhoff}, title = {Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitsl{\"{o}}sungen f{\"{u}}r Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen)}, journal = {it Inf. Technol.}, volume = {52}, number = {6}, pages = {313--319}, year = {2010}, url = {https://doi.org/10.1524/itit.2010.0608}, doi = {10.1524/ITIT.2010.0608}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/BohliHUW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PeterWC10, author = {Steffen Peter and Dirk Westhoff and Claude Castelluccia}, title = {A Survey on the Encryption of Convergecast Traffic with In-Network Processing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {20--34}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.23}, doi = {10.1109/TDSC.2008.23}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PeterWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HesslerKW10, author = {Alban Hessler and Takahiro Kakumaru and Dirk Westhoff}, title = {When Eco-IT meets security: Concealed network coding for multicast traffic}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, pages = {630--635}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470512}, doi = {10.1109/PERCOMW.2010.5470512}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HesslerKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/BohliSW09, author = {Jens{-}Matthias Bohli and Christoph Sorge and Dirk Westhoff}, title = {Initial observations on economics, pricing, and penetration of the internet of things market}, journal = {Comput. Commun. Rev.}, volume = {39}, number = {2}, pages = {50--55}, year = {2009}, url = {https://doi.org/10.1145/1517480.1517491}, doi = {10.1145/1517480.1517491}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/BohliSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/BohliHUW09, author = {Jens{-}Matthias Bohli and Alban Hessler and Osman Ugus and Dirk Westhoff}, title = {Security enhanced multi-hop over the air reprogramming with Fountain Codes}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {850--857}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355011}, doi = {10.1109/LCN.2009.5355011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/BohliHUW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ArmknechtW09, author = {Frederik Armknecht and Dirk Westhoff}, title = {Using Merkle's Puzzle for key agreement with low-end devices}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {858--864}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355012}, doi = {10.1109/LCN.2009.5355012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ArmknechtW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/UgusWB09, author = {Osman Ugus and Dirk Westhoff and Jens{-}Matthias Bohli}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {29--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514279}, doi = {10.1145/1514274.1514279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/UgusWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CristofaroBW09, author = {Emiliano De Cristofaro and Jens{-}Matthias Bohli and Dirk Westhoff}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {{FAIR:} fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {253--260}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514309}, doi = {10.1145/1514274.1514309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CristofaroBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-1095, author = {Emiliano De Cristofaro and Jens{-}Matthias Bohli and Dirk Westhoff}, title = {{FAIR:} Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/0901.1095}, year = {2009}, url = {http://arxiv.org/abs/0901.1095}, eprinttype = {arXiv}, eprint = {0901.1095}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-1095.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-3900, author = {Osman Ugus and Dirk Westhoff and Ralf Laue and Abdulhadi Shoufan and Sorin A. Huss}, title = {Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/0903.3900}, year = {2009}, url = {http://arxiv.org/abs/0903.3900}, eprinttype = {arXiv}, eprint = {0903.3900}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-3900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LucksZWW09, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, title = {Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2009}, url = {http://eprint.iacr.org/2009/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LucksZWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ArmknechtWGH08, author = {Frederik Armknecht and Dirk Westhoff and Joao Gir{\~{a}}o and Alban Hessler}, title = {A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing}, journal = {Comput. Commun.}, volume = {31}, number = {4}, pages = {734--749}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.019}, doi = {10.1016/J.COMCOM.2007.10.019}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ArmknechtWGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SorgeW08, author = {Christoph Sorge and Dirk Westhoff}, title = {eIDs und Identit{\"{a}}tsmanagement}, journal = {Datenschutz und Datensicherheit}, volume = {32}, number = {5}, pages = {337--341}, year = {2008}, url = {https://doi.org/10.1007/s11623-008-0080-1}, doi = {10.1007/S11623-008-0080-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SorgeW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LucksZWW08, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Concrete Security for Entity Recognition: The Jane Doe Protocol}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {158--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_13}, doi = {10.1007/978-3-540-89754-5\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LucksZWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BohliHUW08, author = {Jens{-}Matthias Bohli and Alban Hessler and Osman Ugus and Dirk Westhoff}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {A secure and resilient {WSN} roadside architecture for intelligent transport systems}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {161--171}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352562}, doi = {10.1145/1352533.1352562}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BohliHUW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wiopt/2008, editor = {Holger Karl and Dirk Westhoff}, title = {6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, {WIOPT} 2008, March 31 - April 4, 2008, Berlin, Germany}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4568415/proceeding}, isbn = {978-963-9799-18-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wiopt/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/GiraoWMA07, author = {Joao Gir{\~{a}}o and Dirk Westhoff and Einar Mykletun and Toshinori Araki}, title = {TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {5}, number = {7}, pages = {1073--1089}, year = {2007}, url = {https://doi.org/10.1016/j.adhoc.2006.05.004}, doi = {10.1016/J.ADHOC.2006.05.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/GiraoWMA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/SirivianosWAG07, author = {Michael Sirivianos and Dirk Westhoff and Frederik Armknecht and Joao Gir{\~{a}}o}, editor = {Leandros Tassiulas and Andreas Pitsillides and Thanasis Korakis}, title = {Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks}, booktitle = {5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, {WIOPT} 2007, April 16-20, 2007, Limassol, Cyprus}, pages = {1--10}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/WIOPT.2007.4480031}, doi = {10.1109/WIOPT.2007.4480031}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/wiopt/SirivianosWAG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/StanzeWZABGLWW06, author = {Oliver Stanze and Kilian Weniger and Martina Zitterbart and Stefan Aust and Nico Bayer and Michael Gerharz and Bernd Lamparter and Dirk Westhoff and Erik Weiss}, title = {Routing and Self-organization in {IP} based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen)}, journal = {it Inf. Technol.}, volume = {48}, number = {5}, pages = {287}, year = {2006}, url = {https://doi.org/10.1524/itit.2006.48.5.287}, doi = {10.1524/ITIT.2006.48.5.287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/StanzeWZABGLWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/WesthoffGA06, author = {Dirk Westhoff and Joao Gir{\~{a}}o and Mithun Acharya}, title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {5}, number = {10}, pages = {1417--1431}, year = {2006}, url = {https://doi.org/10.1109/TMC.2006.144}, doi = {10.1109/TMC.2006.144}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/WesthoffGA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ArmknechtGSW06, author = {Frederik Armknecht and Joao Gir{\~{a}}o and Marc Ph. Stoecklin and Dirk Westhoff}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {18--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_4}, doi = {10.1007/11964254\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MykletunGW06, author = {Einar Mykletun and Joao Gir{\~{a}}o and Dirk Westhoff}, title = {Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2288--2295}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255111}, doi = {10.1109/ICC.2006.255111}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MykletunGW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2006, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254}, doi = {10.1007/11964254}, isbn = {978-3-540-69172-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/LamparterPW05, author = {Bernd Lamparter and Marc Plaggemeier and Dirk Westhoff}, title = {Estimating the value of co-operation approaches for multi-hop ad hoc networks}, journal = {Ad Hoc Networks}, volume = {3}, number = {1}, pages = {17--26}, year = {2005}, url = {https://doi.org/10.1016/j.adhoc.2003.09.006}, doi = {10.1016/J.ADHOC.2003.09.006}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/LamparterPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/WesthoffLPW05, author = {Dirk Westhoff and Bernd Lamparter and Christof Paar and Andr{\'{e}} Weimerskirch}, title = {On digital signatures in ad hoc networks}, journal = {Eur. Trans. Telecommun.}, volume = {16}, number = {5}, pages = {411--425}, year = {2005}, url = {https://doi.org/10.1002/ett.1061}, doi = {10.1002/ETT.1061}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/LucksZWW05, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Armin B. Cremers and Rainer Manthey and Peter Martini and Volker Steinhage}, title = {Entity Recognition for Sensor Network Motes}, booktitle = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band 2}, series = {{LNI}}, volume = {{P-68}}, pages = {145--149}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28182}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/LucksZWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GiraoW005, author = {Joao Gir{\~{a}}o and Dirk Westhoff and Markus Schneider}, title = {{CDA:} concealed data aggregation for reverse multicast traffic in wireless sensor networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {3044--3049}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICC.2005.1494953}, doi = {10.1109/ICC.2005.1494953}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/GiraoW005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/HammellWGW05, author = {Jonathan Hammell and Andr{\'{e}} Weimerskirch and Joao Gir{\~{a}}o and Dirk Westhoff}, title = {Recognition in a Low-Power Environment}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {933--938}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.119}, doi = {10.1109/ICDCSW.2005.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/HammellWGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/AcharyaGW05, author = {Mithun Acharya and Joao Gir{\~{a}}o and Dirk Westhoff}, editor = {Eitan Altman and Holger Karl}, title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks}, booktitle = {3rd International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2005), 4-6 April 2005, Trentino, Italy}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WIOPT.2005.44}, doi = {10.1109/WIOPT.2005.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/AcharyaGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2004, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105219}, doi = {10.1007/B105219}, isbn = {3-540-24396-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2005, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494}, doi = {10.1007/11601494}, isbn = {3-540-30912-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/FestagGMW04, author = {Andreas Festag and Joao Gir{\~{a}}o and Telemaco Melia and Dirk Westhoff}, editor = {Jan von Knop and Wilhelm Haverkamp and Eike Jessen}, title = {On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols}, booktitle = {E-Science and Grid - Ad-hoc-Netze - Medienintegration, 18. DFN-Arbeitstagung {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2004}, series = {{LNI}}, volume = {{P-55}}, pages = {61--76}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/28602}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/FestagGMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GiraoLWAB04, author = {Joao Gir{\~{a}}o and Bernd Lamparter and Dirk Westhoff and Rui L. Aguiar and Jo{\~{a}}o Paulo Barraca}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Linking Ad Hoc Charging Schemes to {AAAC} Architectures}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {66--81}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_7}, doi = {10.1007/978-3-540-30496-8\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GiraoLWAB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/GiraoBLWA04, author = {Joao Gir{\~{a}}o and Jo{\~{a}}o Paulo Barraca and Bernd Lamparter and Dirk Westhoff and Rui L. Aguiar}, editor = {Jos{\'{e}} Neuman de Souza and Petre Dini and Pascal Lorenz}, title = {QoS-Differentiated Secure Charging in Ad-Hoc Environments}, booktitle = {Telecommunications and Networking - {ICT} 2004, 11th International Conference on Telecommunications, Fortaleza, Brazil, August 1-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3124}, pages = {1093--1100}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27824-5\_142}, doi = {10.1007/978-3-540-27824-5\_142}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict/GiraoBLWA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LamparterPW03, author = {Bernd Lamparter and Krishna Paul and Dirk Westhoff}, title = {Charging support for ad hoc stub networks}, journal = {Comput. Commun.}, volume = {26}, number = {13}, pages = {1504--1514}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00034-3}, doi = {10.1016/S0140-3664(03)00034-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/LamparterPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/ZitterbartWSAFGGGGHJLPWWWWYX03, author = {Martina Zitterbart and Kilian Weniger and Oliver Stanze and Stefan Aust and Matthias Frank and Michael Gerharz and Reinhard Gloger and Carmelita G{\"{o}}rg and Ingo Gruber and Sven Hischke and Paul James and Hui Li and Cornel Pampu and Christian de Waal and Erik Weiss and Dirk Westhoff and Jingzhu Wu and Di Yu and Bangnan Xu}, title = {IPonAir - Drahtloses Internet der n{\"{a}}chsten Generation}, journal = {Prax. Inf.verarb. Kommun.}, volume = {26}, number = {4}, pages = {190--196}, year = {2003}, url = {https://doi.org/10.1515/PIKO.2003.190}, doi = {10.1515/PIKO.2003.190}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/ZitterbartWSAFGGGGHJLPWWWWYX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/LamparterRW03, author = {Bernd Lamparter and Ingo Riedel and Dirk Westhoff}, title = {Anmerkungen zur Nutzung digitaler Signaturen in Ad Hoc Netzwerken}, journal = {Prax. Inf.verarb. Kommun.}, volume = {26}, number = {4}, pages = {223--227}, year = {2003}, url = {https://doi.org/10.1515/PIKO.2003.223}, doi = {10.1515/PIKO.2003.223}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/LamparterRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/LamparterPW03, author = {Bernd Lamparter and Marc Plaggemeier and Dirk Westhoff}, title = {About the impact of co-operation approaches for Ad hoc networks}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {7}, number = {3}, pages = {41--42}, year = {2003}, url = {https://doi.org/10.1145/961268.961283}, doi = {10.1145/961268.961283}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/LamparterPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngc/LamparterW03, author = {Bernd Lamparter and Dirk Westhoff}, editor = {Burkhard Stiller and Georg Carle and Martin Karsten and Peter Reichl}, title = {A Low-Cost Packet Originator Verification for Metering at Access-Routers}, booktitle = {Group Communications and Charges; Technology and Business Models, 5th {COST264} International Workshop on Networked Group Communications, {NGC} 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2816}, pages = {287--297}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39405-1\_26}, doi = {10.1007/978-3-540-39405-1\_26}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/ngc/LamparterW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WeimerskirchW03, author = {Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Zero Common-Knowledge Authentication for Pervasive Networks}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {73--87}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_6}, doi = {10.1007/978-3-540-24654-1\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WeimerskirchW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/WeimerskirchW03, author = {Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Identity certified authentication for ad-hoc networks}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {33--40}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986864}, doi = {10.1145/986858.986864}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/WeimerskirchW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PaulW02, author = {Krishna Paul and Dirk Westhoff}, title = {Context aware detection of selfish nodes in {DSR} based ad-hoc networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM} '02, Taipei, Taiwan, 17-21 November, 2002}, pages = {178--182}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/GLOCOM.2002.1188065}, doi = {10.1109/GLOCOM.2002.1188065}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PaulW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/Westhoff01, author = {Dirk Westhoff}, title = {An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {11}, number = {5}, pages = {607--619}, year = {2001}, url = {https://doi.org/10.1142/S0218194001000700}, doi = {10.1142/S0218194001000700}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/Westhoff01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/WesthoffL01, author = {Dirk Westhoff and Bernd Lamparter}, editor = {Kurt Bauknecht and Wilfried Brauer and Thomas A. M{\"{u}}ck}, title = {Charging related mobile Device Authentication}, booktitle = {Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Wirtschaft und Wissenschaft in der Network Economy - Visionen und Wirklichkeit, Jahrestagung der {\"{O}}sterreichischen Computer Gesellschaft 2001, {INFORMATIK/OCG} 2001, Vienna, Austria, September 25-28, 2001, Band 1}, series = {Schriftenreihe der {\"{O}}sterreichischen Computer-Gesellschaft}, volume = {157}, pages = {129--135}, publisher = {Konstanz UVK-Verl.-Ges.}, year = {2001}, timestamp = {Fri, 17 Jul 2020 14:28:31 +0200}, biburl = {https://dblp.org/rec/conf/gi/WesthoffL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/HartensteinJLSSW01, author = {Hannes Hartenstein and Karl Jonas and Marco Liebsch and Martin Stiemerling and Ralf Schmitz and Dirk Westhoff}, title = {Scalable Anonymous Connections in the Context of {MIP} and {AAA}}, booktitle = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge, MA, {USA}}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ENABL.2001.953417}, doi = {10.1109/ENABL.2001.953417}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/HartensteinJLSSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Westhoff00, author = {Dirk Westhoff}, title = {Ein dezentrales Agentensystem unter Ber{\"{u}}cksichtigung von mehrseitiger Sicherheit}, school = {University of Hagen, Germany}, year = {2000}, url = {https://d-nb.info/960142177}, isbn = {978-3-8265-8117-5}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Westhoff00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WesthoffSUK99, author = {Dirk Westhoff and Markus Schneider and Claus Unger and Firoz Kaderali}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Methods for Protecting a Mobile Agent's Route}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {57--71}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_7}, doi = {10.1007/3-540-47790-X\_7}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/WesthoffSUK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WesthoffSUK99, author = {Dirk Westhoff and Markus Schneider and Claus Unger and Firoz Kaderali}, editor = {Howard M. Heys and Carlisle M. Adams}, title = {Protecting a Mobile Agent's Route against Collusions}, booktitle = {Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1758}, pages = {215--225}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46513-8\_16}, doi = {10.1007/3-540-46513-8\_16}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WesthoffSUK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.