BibTeX records: Dirk Westhoff

download as .bib file

@inproceedings{DBLP:conf/sicherheit/BreigW22,
  author       = {Jan Breig and
                  Dirk Westhoff},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Short Paper: Debating Ethics with Cybersecurity Students},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {183--192},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_12},
  doi          = {10.18420/SICHERHEIT2022\_12},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BreigW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/TajanWA20,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Frederik Armknecht},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Solving Set Relations with Secure Bloom Filters Keeping Cardinality
                  Private},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {443--450},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009835904430450},
  doi          = {10.5220/0009835904430450},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/TajanWA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08248,
  author       = {Louis Tajan and
                  Dirk Westhoff},
  title        = {Approach for {GDPR} Compliant Detection of {COVID-19} Infection Chains},
  journal      = {CoRR},
  volume       = {abs/2007.08248},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08248},
  eprinttype    = {arXiv},
  eprint       = {2007.08248},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/TajanW19,
  author       = {Louis Tajan and
                  Dirk Westhoff},
  title        = {Retrospective Tracking of Suspects in {GDPR} Conform Mobile Access
                  Networks Datasets},
  booktitle    = {Proceedings of the Third Central European Cybersecurity Conference,
                  {CECC} 2019, Munich, Germany, November 14-15, 2019},
  pages        = {16:1--16:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360664.3360680},
  doi          = {10.1145/3360664.3360680},
  timestamp    = {Mon, 28 Oct 2019 08:10:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/TajanW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TajanWA19,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Frederik Armknecht},
  title        = {Private Set Relations with Bloom Filters for Outsourced {SLA} Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TajanWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/WesthoffZ18,
  author       = {Dirk Westhoff and
                  Maximilian Zeiser},
  title        = {Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence
                  Credibility},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {2},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018040101},
  doi          = {10.4018/IJCWT.2018040101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/WesthoffZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/TajanKW18,
  author       = {Louis Tajan and
                  Moritz Kaumanns and
                  Dirk Westhoff},
  title        = {Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic
                  Encryption for Cloud Auditing},
  booktitle    = {9th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2018, Paris, France, February 26-28, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NTMS.2018.8328713},
  doi          = {10.1109/NTMS.2018.8328713},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/TajanKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BetzWM17,
  author       = {Johann Betz and
                  Dirk Westhoff and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Survey on covert channels in virtual machines and cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {28},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/ett.3134},
  doi          = {10.1002/ETT.3134},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/BetzWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZeiserBW17,
  author       = {Maximilian Zeiser and
                  Johann Betz and
                  Dirk Westhoff},
  title        = {Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's
                  Credit Scheduler},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8253984},
  doi          = {10.1109/GLOCOM.2017.8253984},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZeiserBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TajanWRA16,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Christian A. Reuter and
                  Frederik Armknecht},
  title        = {Private information retrieval and Searchable Encryption for privacy-preserving
                  multi-client cloud auditing},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {162--169},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856690},
  doi          = {10.1109/ICITST.2016.7856690},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/ZeiserW16,
  author       = {Maximilian Zeiser and
                  Dirk Westhoff},
  editor       = {G{\"{u}}nter Fahrnberger and
                  Gerald Eichler and
                  Christian Erfurth},
  title        = {Re-visited: On the Value of Purely Software-Based Code Attestation
                  for Embedded Devices},
  booktitle    = {Innovations for Community Services - 16th International Conference,
                  {I4CS} 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {648},
  pages        = {75--89},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49466-1\_6},
  doi          = {10.1007/978-3-319-49466-1\_6},
  timestamp    = {Sat, 19 Oct 2019 20:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/ZeiserW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/MohammadSW15,
  author       = {Asif Mohammad and
                  Jurgen Stader and
                  Dirk Westhoff},
  editor       = {J{\"{o}}rg Roth and
                  Gerald Eichler and
                  Christian Erfurth},
  title        = {A privacy-friendly smart metering architecture with few-instance storage},
  booktitle    = {15th International Conference on Innovations for Community Services,
                  {I4CS} 2015, Nuremberg, Germany, July 8-10, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/I4CS.2015.7294485},
  doi          = {10.1109/I4CS.2015.7294485},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/MohammadSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/StecklinaKGJKLS15,
  author       = {Oliver Stecklina and
                  Stephan Kornemann and
                  Felix Grehl and
                  Ramona Jung and
                  Thorsten Kranz and
                  Gregor Leander and
                  Dennis Schweer and
                  Katharina Mollus and
                  Dirk Westhoff},
  editor       = {J{\"{o}}rg Roth and
                  Gerald Eichler and
                  Christian Erfurth},
  title        = {Custom-fit security for efficient and pollution-resistant multicast
                  OTA-programming with fountain codes},
  booktitle    = {15th International Conference on Innovations for Community Services,
                  {I4CS} 2015, Nuremberg, Germany, July 8-10, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/I4CS.2015.7294492},
  doi          = {10.1109/I4CS.2015.7294492},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/StecklinaKGJKLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saso/NiroLWC15,
  author       = {Sascha Niro and
                  Jose M. Lopez and
                  Dirk Westhoff and
                  Andreas H. Christ},
  title        = {A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for
                  Prosumer Markets},
  booktitle    = {2015 {IEEE} International Conference on Self-Adaptive and Self-Organizing
                  Systems Workshops, {SASO} Workshops 2015, Cambridge, MA, USA, September
                  21-25, 2015},
  pages        = {31--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SASOW.2015.10},
  doi          = {10.1109/SASOW.2015.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saso/NiroLWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/KasparLW14,
  author       = {Friedbert Kaspar and
                  Bertold Laschinger and
                  Dirk Westhoff},
  title        = {Portrait: Arbeitsgruppe IT-Sicherheit, Hochschule Furtwangen {(HFU)}},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {37},
  number       = {1},
  pages        = {67--68},
  year         = {2014},
  url          = {https://doi.org/10.1515/pik-2013-0029},
  doi          = {10.1515/PIK-2013-0029},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/KasparLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BetzW14,
  author       = {Johann Betz and
                  Dirk Westhoff},
  title        = {C\({}^{\mbox{3}}\)-Sched - {A} cache covert channel robust cloud computing
                  scheduler},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {54--60},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038775},
  doi          = {10.1109/ICITST.2014.7038775},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BetzW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/MollusWM14,
  author       = {Katharina Mollus and
                  Dirk Westhoff and
                  Tobias Markmann},
  editor       = {Gerald Eichler and
                  Hac{\`{e}}ne Fouchal and
                  Christian Erfurth},
  title        = {Curtailing privilege escalation attacks over asynchronous channels
                  on Android},
  booktitle    = {14th International Conference on Innovations for Community Services,
                  {I4CS} 2014, 4-6 June, 2014, Reims, France},
  pages        = {87--94},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/I4CS.2014.6860558},
  doi          = {10.1109/I4CS.2014.6860558},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/MollusWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/LopezRW14,
  author       = {Jose M. Lopez and
                  Thomas R{\"{u}}bsamen and
                  Dirk Westhoff},
  editor       = {Gerald Eichler and
                  Hac{\`{e}}ne Fouchal and
                  Christian Erfurth},
  title        = {Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable
                  Encryption},
  booktitle    = {14th International Conference on Innovations for Community Services,
                  {I4CS} 2014, 4-6 June, 2014, Reims, France},
  pages        = {95--103},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/I4CS.2014.6860559},
  doi          = {10.1109/I4CS.2014.6860559},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/LopezRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/Dstep/2014,
  editor       = {Jens{-}Matthias Bohli and
                  Friedbert Kaspar and
                  Dirk Westhoff},
  title        = {Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit
                  in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP
                  2014, Hochschule Furtwangen},
  publisher    = {De Gruyter Oldenbourg},
  year         = {2014},
  url          = {http://www.degruyter.com/view/product/428427},
  isbn         = {978-3-11-035865-0},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/Dstep/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MarmolSPUWP13,
  author       = {F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
                  Christoph Sorge and
                  Ronald Petrlic and
                  Osman Ugus and
                  Dirk Westhoff and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Privacy-enhanced architecture for smart metering},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {67--82},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0181-6},
  doi          = {10.1007/S10207-012-0181-6},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MarmolSPUWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MarkmannGW13,
  author       = {Tobias Markmann and
                  Dennis Gessner and
                  Dirk Westhoff},
  title        = {QuantDroid: Quantitative approach towards mitigating privilege escalation
                  on Android},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2144--2149},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654844},
  doi          = {10.1109/ICC.2013.6654844},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MarkmannGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/WesthoffU13,
  author       = {Dirk Westhoff and
                  Osman Ugus},
  title        = {Malleability resilient (premium) Concealed Data Aggregation},
  booktitle    = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile
                  and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WoWMoM.2013.6583470},
  doi          = {10.1109/WOWMOM.2013.6583470},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/WesthoffU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HesslerKPW12,
  author       = {Alban Hessler and
                  Takahiro Kakumaru and
                  Heiner Perrey and
                  Dirk Westhoff},
  title        = {Data obfuscation with network coding},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {1},
  pages        = {48--61},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2010.11.004},
  doi          = {10.1016/J.COMCOM.2010.11.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/HesslerKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/UgusLGW12,
  author       = {Osman Ugus and
                  Martin Landsmann and
                  Dennis Gessner and
                  Dirk Westhoff},
  title        = {A Smartphone Security Architecture for App Verification and Process
                  Authentication},
  booktitle    = {21st International Conference on Computer Communications and Networks,
                  {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCCN.2012.6289217},
  doi          = {10.1109/ICCCN.2012.6289217},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/UgusLGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/VetterW12,
  author       = {Benjamin Vetter and
                  Dirk Westhoff},
  title        = {Simulation study on code attestation with compressed instruction code},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {296--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197498},
  doi          = {10.1109/PERCOMW.2012.6197498},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/VetterW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/UgusWR12,
  author       = {Osman Ugus and
                  Dirk Westhoff and
                  Hariharan Rajasekaran},
  title        = {A leaky bucket called smartphone},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {374--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197513},
  doi          = {10.1109/PERCOMW.2012.6197513},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/UgusWR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VetterUWS12,
  author       = {Benjamin Vetter and
                  Osman Ugus and
                  Dirk Westhoff and
                  Christoph Sorge},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {102--112},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/VetterUWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WahlischTSJNSUWKKKS12,
  author       = {Matthias W{\"{a}}hlisch and
                  Sebastian Trapp and
                  Jochen H. Schiller and
                  Benjamin Jochheim and
                  Theodor Nolte and
                  Thomas C. Schmidt and
                  Osman Ugus and
                  Dirk Westhoff and
                  Martin Kutscher and
                  Matthias K{\"{u}}ster and
                  Christian Keil and
                  Jochen Sch{\"{o}}nfelder},
  editor       = {Lars Eggert and
                  J{\"{o}}rg Ott and
                  Venkata N. Padmanabhan and
                  George Varghese},
  title        = {Vitamin {C} for your smartphone: the {SKIMS} approach for cooperativeand
                  lightweight security at mobiles},
  booktitle    = {{ACM} {SIGCOMM} 2012 Conference, {SIGCOMM} '12, Helsinki, Finland
                  - August 13 - 17, 2012},
  pages        = {271--272},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342356.2342405},
  doi          = {10.1145/2342356.2342405},
  timestamp    = {Mon, 22 Mar 2021 16:55:03 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WahlischTSJNSUWKKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/BohliHMU11,
  author       = {Jens{-}Matthias Bohli and
                  Alban Hessler and
                  Klaus Maier and
                  Osman Ugus and
                  Dirk Westhoff},
  title        = {Dependable Over-the-Air Programming},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {13},
  number       = {3-4},
  pages        = {313--340},
  year         = {2011},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-13-number-3-4-2011/ahswn-13-3-4-p-313-340/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/BohliHMU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/PerreyUW11,
  author       = {Heiner Perrey and
                  Osman Ugus and
                  Dirk Westhoff},
  title        = {WiSec' 2011 poster: security enhancement for bluetooth low energy
                  with Merkle's puzzle},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {15},
  number       = {3},
  pages        = {45--46},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073290.2073302},
  doi          = {10.1145/2073290.2073302},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/PerreyUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/VetterW11,
  author       = {Benjamin Vetter and
                  Dirk Westhoff},
  editor       = {Gerald Eichler and
                  Axel K{\"{u}}pper and
                  Volkmar Schau and
                  Hac{\`{e}}ne Fouchal and
                  Herwig Unger},
  title        = {Code Attestation with Compressed Instruction Code},
  booktitle    = {11th International Conference on Innovative Internet Community Services
                  (I\({}^{\mbox{2}}\)CS 2011), June 15-17, 2011, Deutsche Telekom Laboratories,
                  Berlin, Germany},
  series       = {{LNI}},
  volume       = {{P-186}},
  pages        = {170--181},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18986},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/VetterW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iics/UgusW11,
  author       = {Osman Ugus and
                  Dirk Westhoff},
  editor       = {Gerald Eichler and
                  Axel K{\"{u}}pper and
                  Volkmar Schau and
                  Hac{\`{e}}ne Fouchal and
                  Herwig Unger},
  title        = {An {MTM} based Watchdog for Malware Famishment in Smartphones},
  booktitle    = {11th International Conference on Innovative Internet Community Services
                  (I\({}^{\mbox{2}}\)CS 2011), June 15-17, 2011, Deutsche Telekom Laboratories,
                  Berlin, Germany},
  series       = {{LNI}},
  volume       = {{P-186}},
  pages        = {251--262},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18994},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iics/UgusW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/BohliPVW11,
  author       = {Jens{-}Matthias Bohli and
                  Panos Papadimitratos and
                  Donato Verardi and
                  Dirk Westhoff},
  editor       = {Chun Tung Chou and
                  Tom Pfeifer and
                  Anura P. Jayasumana},
  title        = {Resilient data aggregation for unattended WSNs},
  booktitle    = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn,
                  Germany, October 4-7, 2011},
  pages        = {994--1002},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCN.2011.6114411},
  doi          = {10.1109/LCN.2011.6114411},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/BohliPVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2011,
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  isbn         = {978-1-4503-0692-8},
  timestamp    = {Wed, 24 Aug 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-5322,
  author       = {Benjamin Vetter and
                  Dirk Westhoff},
  title        = {Code Attestation with Compressed Instruction Code},
  journal      = {CoRR},
  volume       = {abs/1102.5322},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.5322},
  eprinttype    = {arXiv},
  eprint       = {1102.5322},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-5322.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/BohliHUW10,
  author       = {Jens{-}Matthias Bohli and
                  Alban Hessler and
                  Osman Ugus and
                  Dirk Westhoff},
  title        = {Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor
                  Networks (Sicherheitsl{\"{o}}sungen f{\"{u}}r Uplink- und
                  Downlink-Verkehr in drahtlosen Sensornetzen)},
  journal      = {it Inf. Technol.},
  volume       = {52},
  number       = {6},
  pages        = {313--319},
  year         = {2010},
  url          = {https://doi.org/10.1524/itit.2010.0608},
  doi          = {10.1524/ITIT.2010.0608},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/BohliHUW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PeterWC10,
  author       = {Steffen Peter and
                  Dirk Westhoff and
                  Claude Castelluccia},
  title        = {A Survey on the Encryption of Convergecast Traffic with In-Network
                  Processing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {20--34},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.23},
  doi          = {10.1109/TDSC.2008.23},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PeterWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HesslerKW10,
  author       = {Alban Hessler and
                  Takahiro Kakumaru and
                  Dirk Westhoff},
  title        = {When Eco-IT meets security: Concealed network coding for multicast
                  traffic},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  pages        = {630--635},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470512},
  doi          = {10.1109/PERCOMW.2010.5470512},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HesslerKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/BohliSW09,
  author       = {Jens{-}Matthias Bohli and
                  Christoph Sorge and
                  Dirk Westhoff},
  title        = {Initial observations on economics, pricing, and penetration of the
                  internet of things market},
  journal      = {Comput. Commun. Rev.},
  volume       = {39},
  number       = {2},
  pages        = {50--55},
  year         = {2009},
  url          = {https://doi.org/10.1145/1517480.1517491},
  doi          = {10.1145/1517480.1517491},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/BohliSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/BohliHUW09,
  author       = {Jens{-}Matthias Bohli and
                  Alban Hessler and
                  Osman Ugus and
                  Dirk Westhoff},
  title        = {Security enhanced multi-hop over the air reprogramming with Fountain
                  Codes},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {850--857},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355011},
  doi          = {10.1109/LCN.2009.5355011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/BohliHUW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ArmknechtW09,
  author       = {Frederik Armknecht and
                  Dirk Westhoff},
  title        = {Using Merkle's Puzzle for key agreement with low-end devices},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {858--864},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355012},
  doi          = {10.1109/LCN.2009.5355012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ArmknechtW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/UgusWB09,
  author       = {Osman Ugus and
                  Dirk Westhoff and
                  Jens{-}Matthias Bohli},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier
                  tau-time signature scheme},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514279},
  doi          = {10.1145/1514274.1514279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/UgusWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CristofaroBW09,
  author       = {Emiliano De Cristofaro and
                  Jens{-}Matthias Bohli and
                  Dirk Westhoff},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {{FAIR:} fuzzy-based aggregation providing in-network resilience for
                  real-time wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {253--260},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514309},
  doi          = {10.1145/1514274.1514309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CristofaroBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-1095,
  author       = {Emiliano De Cristofaro and
                  Jens{-}Matthias Bohli and
                  Dirk Westhoff},
  title        = {{FAIR:} Fuzzy-based Aggregation providing In-network Resilience for
                  real-time Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/0901.1095},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.1095},
  eprinttype    = {arXiv},
  eprint       = {0901.1095},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0901-1095.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-3900,
  author       = {Osman Ugus and
                  Dirk Westhoff and
                  Ralf Laue and
                  Abdulhadi Shoufan and
                  Sorin A. Huss},
  title        = {Optimized Implementation of Elliptic Curve Based Additive Homomorphic
                  Encryption for Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/0903.3900},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.3900},
  eprinttype    = {arXiv},
  eprint       = {0903.3900},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-3900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LucksZWW09,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  title        = {Concrete Security for Entity Recognition: The Jane Doe Protocol (Full
                  Paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LucksZWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ArmknechtWGH08,
  author       = {Frederik Armknecht and
                  Dirk Westhoff and
                  Joao Gir{\~{a}}o and
                  Alban Hessler},
  title        = {A lifetime-optimized end-to-end encryption scheme for sensor networks
                  allowing in-network processing},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {4},
  pages        = {734--749},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.019},
  doi          = {10.1016/J.COMCOM.2007.10.019},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ArmknechtWGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SorgeW08,
  author       = {Christoph Sorge and
                  Dirk Westhoff},
  title        = {eIDs und Identit{\"{a}}tsmanagement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {32},
  number       = {5},
  pages        = {337--341},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11623-008-0080-1},
  doi          = {10.1007/S11623-008-0080-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SorgeW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LucksZWW08,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Concrete Security for Entity Recognition: The Jane Doe Protocol},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_13},
  doi          = {10.1007/978-3-540-89754-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LucksZWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BohliHUW08,
  author       = {Jens{-}Matthias Bohli and
                  Alban Hessler and
                  Osman Ugus and
                  Dirk Westhoff},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {A secure and resilient {WSN} roadside architecture for intelligent
                  transport systems},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {161--171},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352562},
  doi          = {10.1145/1352533.1352562},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BohliHUW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wiopt/2008,
  editor       = {Holger Karl and
                  Dirk Westhoff},
  title        = {6th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks and Workshops, {WIOPT} 2008, March 31
                  - April 4, 2008, Berlin, Germany},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4568415/proceeding},
  isbn         = {978-963-9799-18-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/GiraoWMA07,
  author       = {Joao Gir{\~{a}}o and
                  Dirk Westhoff and
                  Einar Mykletun and
                  Toshinori Araki},
  title        = {TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless
                  sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {5},
  number       = {7},
  pages        = {1073--1089},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.adhoc.2006.05.004},
  doi          = {10.1016/J.ADHOC.2006.05.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/GiraoWMA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/SirivianosWAG07,
  author       = {Michael Sirivianos and
                  Dirk Westhoff and
                  Frederik Armknecht and
                  Joao Gir{\~{a}}o},
  editor       = {Leandros Tassiulas and
                  Andreas Pitsillides and
                  Thanasis Korakis},
  title        = {Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor
                  Networks},
  booktitle    = {5th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc and Wireless Networks and Workshops, {WIOPT} 2007, April 16-20,
                  2007, Limassol, Cyprus},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIOPT.2007.4480031},
  doi          = {10.1109/WIOPT.2007.4480031},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/SirivianosWAG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/StanzeWZABGLWW06,
  author       = {Oliver Stanze and
                  Kilian Weniger and
                  Martina Zitterbart and
                  Stefan Aust and
                  Nico Bayer and
                  Michael Gerharz and
                  Bernd Lamparter and
                  Dirk Westhoff and
                  Erik Weiss},
  title        = {Routing and Self-organization in {IP} based Wireless Access Networks
                  (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen)},
  journal      = {it Inf. Technol.},
  volume       = {48},
  number       = {5},
  pages        = {287},
  year         = {2006},
  url          = {https://doi.org/10.1524/itit.2006.48.5.287},
  doi          = {10.1524/ITIT.2006.48.5.287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/StanzeWZABGLWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/WesthoffGA06,
  author       = {Dirk Westhoff and
                  Joao Gir{\~{a}}o and
                  Mithun Acharya},
  title        = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
                  Networks: Encryption, Key Distribution, and Routing Adaptation},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {5},
  number       = {10},
  pages        = {1417--1431},
  year         = {2006},
  url          = {https://doi.org/10.1109/TMC.2006.144},
  doi          = {10.1109/TMC.2006.144},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/WesthoffGA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ArmknechtGSW06,
  author       = {Frederik Armknecht and
                  Joao Gir{\~{a}}o and
                  Marc Ph. Stoecklin and
                  Dirk Westhoff},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Re-visited: Denial of Service Resilient Access Control for Wireless
                  Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_4},
  doi          = {10.1007/11964254\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MykletunGW06,
  author       = {Einar Mykletun and
                  Joao Gir{\~{a}}o and
                  Dirk Westhoff},
  title        = {Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor
                  Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2288--2295},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255111},
  doi          = {10.1109/ICC.2006.255111},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MykletunGW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2006,
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254},
  doi          = {10.1007/11964254},
  isbn         = {978-3-540-69172-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/LamparterPW05,
  author       = {Bernd Lamparter and
                  Marc Plaggemeier and
                  Dirk Westhoff},
  title        = {Estimating the value of co-operation approaches for multi-hop ad hoc
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {3},
  number       = {1},
  pages        = {17--26},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.adhoc.2003.09.006},
  doi          = {10.1016/J.ADHOC.2003.09.006},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/LamparterPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/WesthoffLPW05,
  author       = {Dirk Westhoff and
                  Bernd Lamparter and
                  Christof Paar and
                  Andr{\'{e}} Weimerskirch},
  title        = {On digital signatures in ad hoc networks},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {16},
  number       = {5},
  pages        = {411--425},
  year         = {2005},
  url          = {https://doi.org/10.1002/ett.1061},
  doi          = {10.1002/ETT.1061},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/LucksZWW05,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Armin B. Cremers and
                  Rainer Manthey and
                  Peter Martini and
                  Volker Steinhage},
  title        = {Entity Recognition for Sensor Network Motes},
  booktitle    = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band
                  2},
  series       = {{LNI}},
  volume       = {{P-68}},
  pages        = {145--149},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28182},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/LucksZWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GiraoW005,
  author       = {Joao Gir{\~{a}}o and
                  Dirk Westhoff and
                  Markus Schneider},
  title        = {{CDA:} concealed data aggregation for reverse multicast traffic in
                  wireless sensor networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2005, Seoul, Korea, 16-20 May 2005},
  pages        = {3044--3049},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICC.2005.1494953},
  doi          = {10.1109/ICC.2005.1494953},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GiraoW005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/HammellWGW05,
  author       = {Jonathan Hammell and
                  Andr{\'{e}} Weimerskirch and
                  Joao Gir{\~{a}}o and
                  Dirk Westhoff},
  title        = {Recognition in a Low-Power Environment},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {933--938},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.119},
  doi          = {10.1109/ICDCSW.2005.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/HammellWGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/AcharyaGW05,
  author       = {Mithun Acharya and
                  Joao Gir{\~{a}}o and
                  Dirk Westhoff},
  editor       = {Eitan Altman and
                  Holger Karl},
  title        = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
  booktitle    = {3rd International Symposium on Modeling and Optimization in Mobile,
                  Ad-Hoc and Wireless Networks (WiOpt 2005), 4-6 April 2005, Trentino,
                  Italy},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WIOPT.2005.44},
  doi          = {10.1109/WIOPT.2005.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/AcharyaGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2004,
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105219},
  doi          = {10.1007/B105219},
  isbn         = {3-540-24396-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2005,
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494},
  doi          = {10.1007/11601494},
  isbn         = {3-540-30912-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/FestagGMW04,
  author       = {Andreas Festag and
                  Joao Gir{\~{a}}o and
                  Telemaco Melia and
                  Dirk Westhoff},
  editor       = {Jan von Knop and
                  Wilhelm Haverkamp and
                  Eike Jessen},
  title        = {On the Limitations of Security Concepts for Mobile Adhoc Networks
                  Routing Protocols},
  booktitle    = {E-Science and Grid - Ad-hoc-Netze - Medienintegration, 18. DFN-Arbeitstagung
                  {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2004},
  series       = {{LNI}},
  volume       = {{P-55}},
  pages        = {61--76},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/28602},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/FestagGMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GiraoLWAB04,
  author       = {Joao Gir{\~{a}}o and
                  Bernd Lamparter and
                  Dirk Westhoff and
                  Rui L. Aguiar and
                  Jo{\~{a}}o Paulo Barraca},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Linking Ad Hoc Charging Schemes to {AAAC} Architectures},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_7},
  doi          = {10.1007/978-3-540-30496-8\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GiraoLWAB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/GiraoBLWA04,
  author       = {Joao Gir{\~{a}}o and
                  Jo{\~{a}}o Paulo Barraca and
                  Bernd Lamparter and
                  Dirk Westhoff and
                  Rui L. Aguiar},
  editor       = {Jos{\'{e}} Neuman de Souza and
                  Petre Dini and
                  Pascal Lorenz},
  title        = {QoS-Differentiated Secure Charging in Ad-Hoc Environments},
  booktitle    = {Telecommunications and Networking - {ICT} 2004, 11th International
                  Conference on Telecommunications, Fortaleza, Brazil, August 1-6, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3124},
  pages        = {1093--1100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27824-5\_142},
  doi          = {10.1007/978-3-540-27824-5\_142},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/GiraoBLWA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LamparterPW03,
  author       = {Bernd Lamparter and
                  Krishna Paul and
                  Dirk Westhoff},
  title        = {Charging support for ad hoc stub networks},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {13},
  pages        = {1504--1514},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00034-3},
  doi          = {10.1016/S0140-3664(03)00034-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/LamparterPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/ZitterbartWSAFGGGGHJLPWWWWYX03,
  author       = {Martina Zitterbart and
                  Kilian Weniger and
                  Oliver Stanze and
                  Stefan Aust and
                  Matthias Frank and
                  Michael Gerharz and
                  Reinhard Gloger and
                  Carmelita G{\"{o}}rg and
                  Ingo Gruber and
                  Sven Hischke and
                  Paul James and
                  Hui Li and
                  Cornel Pampu and
                  Christian de Waal and
                  Erik Weiss and
                  Dirk Westhoff and
                  Jingzhu Wu and
                  Di Yu and
                  Bangnan Xu},
  title        = {IPonAir - Drahtloses Internet der n{\"{a}}chsten Generation},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {26},
  number       = {4},
  pages        = {190--196},
  year         = {2003},
  url          = {https://doi.org/10.1515/PIKO.2003.190},
  doi          = {10.1515/PIKO.2003.190},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/ZitterbartWSAFGGGGHJLPWWWWYX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/LamparterRW03,
  author       = {Bernd Lamparter and
                  Ingo Riedel and
                  Dirk Westhoff},
  title        = {Anmerkungen zur Nutzung digitaler Signaturen in Ad Hoc Netzwerken},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {26},
  number       = {4},
  pages        = {223--227},
  year         = {2003},
  url          = {https://doi.org/10.1515/PIKO.2003.223},
  doi          = {10.1515/PIKO.2003.223},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/LamparterRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/LamparterPW03,
  author       = {Bernd Lamparter and
                  Marc Plaggemeier and
                  Dirk Westhoff},
  title        = {About the impact of co-operation approaches for Ad hoc networks},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {7},
  number       = {3},
  pages        = {41--42},
  year         = {2003},
  url          = {https://doi.org/10.1145/961268.961283},
  doi          = {10.1145/961268.961283},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/LamparterPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngc/LamparterW03,
  author       = {Bernd Lamparter and
                  Dirk Westhoff},
  editor       = {Burkhard Stiller and
                  Georg Carle and
                  Martin Karsten and
                  Peter Reichl},
  title        = {A Low-Cost Packet Originator Verification for Metering at Access-Routers},
  booktitle    = {Group Communications and Charges; Technology and Business Models,
                  5th {COST264} International Workshop on Networked Group Communications,
                  {NGC} 2003, and 3rd International Workshop on Internet Charging and
                  QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2816},
  pages        = {287--297},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39405-1\_26},
  doi          = {10.1007/978-3-540-39405-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ngc/LamparterW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WeimerskirchW03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Zero Common-Knowledge Authentication for Pervasive Networks},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_6},
  doi          = {10.1007/978-3-540-24654-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WeimerskirchW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/WeimerskirchW03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Identity certified authentication for ad-hoc networks},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986864},
  doi          = {10.1145/986858.986864},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/WeimerskirchW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PaulW02,
  author       = {Krishna Paul and
                  Dirk Westhoff},
  title        = {Context aware detection of selfish nodes in {DSR} based ad-hoc networks},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM}
                  '02, Taipei, Taiwan, 17-21 November, 2002},
  pages        = {178--182},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/GLOCOM.2002.1188065},
  doi          = {10.1109/GLOCOM.2002.1188065},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PaulW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/Westhoff01,
  author       = {Dirk Westhoff},
  title        = {An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary
                  Code},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {11},
  number       = {5},
  pages        = {607--619},
  year         = {2001},
  url          = {https://doi.org/10.1142/S0218194001000700},
  doi          = {10.1142/S0218194001000700},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/Westhoff01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/WesthoffL01,
  author       = {Dirk Westhoff and
                  Bernd Lamparter},
  editor       = {Kurt Bauknecht and
                  Wilfried Brauer and
                  Thomas A. M{\"{u}}ck},
  title        = {Charging related mobile Device Authentication},
  booktitle    = {Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft
                  f{\"{u}}r Informatik, Wirtschaft und Wissenschaft in der Network
                  Economy - Visionen und Wirklichkeit, Jahrestagung der {\"{O}}sterreichischen
                  Computer Gesellschaft 2001, {INFORMATIK/OCG} 2001, Vienna, Austria,
                  September 25-28, 2001, Band 1},
  series       = {Schriftenreihe der {\"{O}}sterreichischen Computer-Gesellschaft},
  volume       = {157},
  pages        = {129--135},
  publisher    = {Konstanz UVK-Verl.-Ges.},
  year         = {2001},
  timestamp    = {Fri, 17 Jul 2020 14:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/WesthoffL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/HartensteinJLSSW01,
  author       = {Hannes Hartenstein and
                  Karl Jonas and
                  Marco Liebsch and
                  Martin Stiemerling and
                  Ralf Schmitz and
                  Dirk Westhoff},
  title        = {Scalable Anonymous Connections in the Context of {MIP} and {AAA}},
  booktitle    = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge,
                  MA, {USA}},
  pages        = {217--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ENABL.2001.953417},
  doi          = {10.1109/ENABL.2001.953417},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/HartensteinJLSSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Westhoff00,
  author       = {Dirk Westhoff},
  title        = {Ein dezentrales Agentensystem unter Ber{\"{u}}cksichtigung von
                  mehrseitiger Sicherheit},
  school       = {University of Hagen, Germany},
  year         = {2000},
  url          = {https://d-nb.info/960142177},
  isbn         = {978-3-8265-8117-5},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Westhoff00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WesthoffSUK99,
  author       = {Dirk Westhoff and
                  Markus Schneider and
                  Claus Unger and
                  Firoz Kaderali},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Methods for Protecting a Mobile Agent's Route},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_7},
  doi          = {10.1007/3-540-47790-X\_7},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WesthoffSUK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WesthoffSUK99,
  author       = {Dirk Westhoff and
                  Markus Schneider and
                  Claus Unger and
                  Firoz Kaderali},
  editor       = {Howard M. Heys and
                  Carlisle M. Adams},
  title        = {Protecting a Mobile Agent's Route against Collusions},
  booktitle    = {Selected Areas in Cryptography, 6th Annual International Workshop,
                  SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1758},
  pages        = {215--225},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46513-8\_16},
  doi          = {10.1007/3-540-46513-8\_16},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WesthoffSUK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}