default search action
Jens Hiller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [b1]Jens Hiller:
Improving functionality, efficiency, and trustworthiness of secure communication on an Internet diversified by mobile devices and the Internet of Things. RWTH Aachen University, Germany, Shaker 2023, ISBN 978-3-8440-8952-3, pp. 1-314 - 2022
- [j5]Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle:
Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j4]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Complying With Data Handling Requirements in Cloud Storage Systems. IEEE Trans. Cloud Comput. 10(3): 1661-1674 (2022) - 2020
- [j3]Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, Oliver Hohlfeld:
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. Comput. Commun. Rev. 50(3): 3-15 (2020) - [c22]Jens Hiller, Johanna Amann, Oliver Hohlfeld:
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CCS 2020: 1289-1306 - [c21]Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. CCS 2020: 1971-1985 - [i3]Jens Hiller, Johanna Amann, Oliver Hohlfeld:
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CoRR abs/2009.08772 (2020)
2010 – 2019
- 2019
- [c20]Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
POSTER: Traffic Splitting to Counter Website Fingerprinting. CCS 2019: 2533-2535 - [c19]Markus Dahlmanns, Chris Dax, Roman Matzutt, Jan Pennekamp, Jens Hiller, Klaus Wehrle:
Privacy-Preserving Remote Knowledge System. ICNP 2019: 1-2 - [c18]Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle:
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. ICNP 2019: 1-12 - [c17]Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. ICNP 2019: 1-2 - [c16]Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle:
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. LCN Symposium 2019: 83-91 - [i2]Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle:
Application-Agnostic Offloading of Packet Processing. CoRR abs/1904.00671 (2019) - 2018
- [j2]Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, Ralph Holz, David R. Choffnes, Alan Mislove, Georg Carle:
A First Look at Certification Authority Authorization (CAA). Comput. Commun. Rev. 48(2): 10-23 (2018) - [c15]Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan Mislove:
Measuring Adoption of Security Additions to the HTTPS Ecosystem. ANRW 2018: 1-2 - [c14]Torsten Zimmermann, Jens Hiller, Helge Reelfs, Pascal Hein, Klaus Wehrle:
SPLIT: Smart Protocol Loading for the IoT. EWSN 2018: 49-54 - [c13]Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle:
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Financial Cryptography 2018: 420-438 - [c12]Jens Hiller, Maël Kimmerlin, Max Plauth, Seppo Heikkilä, Stefan Klauck, Ville Lindfors, Felix Eberhardt, Dariusz Bursztynowski, Jesus Llorente Santos, Oliver Hohlfeld, Klaus Wehrle:
Giving Customers Control Over Their Data: Integrating a Policy Language into the Cloud. IC2E 2018: 241-249 - [c11]Roman Matzutt, Martin Henze, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle:
Thwarting Unwanted Blockchain Content Insertion. IC2E 2018: 364-370 - [c10]Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, Klaus Wehrle:
Secure Low Latency Communication for Constrained Industrial IoT Scenarios. LCN 2018: 614-622 - [c9]Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle:
Application-Agnostic Offloading of Datagram Processing. ITC (1) 2018: 46-54 - [i1]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Complying with Data Handling Requirements in Cloud Storage Systems. CoRR abs/1806.11448 (2018) - 2017
- [c8]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Practical Data Compliance for Cloud Storage. IC2E 2017: 252-258 - 2016
- [c7]Martin Henze, Daniel Kerpen, Jens Hiller, Michael Eggert, David Hellmanns, Erik Mühmer, Oussama Renuli, Henning Maier, Christian Stüble, Roger Häußling, Klaus Wehrle:
Towards Transparent Information on Individual Cloud Service Usage. CloudCom 2016: 366-370 - [c6]Martin Henze, Jens Hiller, Oliver Hohlfeld, Klaus Wehrle:
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. IC2E Workshops 2016: 130-135 - [c5]Martin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, Klaus Wehrle:
CPPL: Compact Privacy Policy Language. WPES@CCS 2016: 99-110 - 2015
- [c4]Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle:
Bandwidth-Optimized Secure Two-Party Computation of Minima. CANS 2015: 197-213 - 2013
- [j1]Jens Hiller:
End-to-End Security for Internet-Connected Smart Objects. Prax. Inf.verarb. Kommun. 36(1): 23-29 (2013) - [c3]René Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle:
Tailoring end-to-end IP security protocols to the Internet of Things. ICNP 2013: 1-10 - [c2]René Hummen, Jens Hiller, Martin Henze, Klaus Wehrle:
Slimfit - A HIP DEX compression layer for the IP-based Internet of Things. WiMob 2013: 259-266 - [c1]René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle:
6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint