This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-24 Creation time: 22-49-28 --- Number of references 40 article 2017-pennekamp-pmc-survey A Survey on the Evolution of Privacy Enforcement on Smartphones and the Road Ahead Pervasive and Mobile Computing 2017 12 42 58-76 With the increasing proliferation of smartphones, enforcing privacy of smartphone users becomes evermore important. Nowadays, one of the major privacy challenges is the tremendous amount of permissions requested by applications, which can significantly invade users' privacy, often without their knowledge. In this paper, we provide a comprehensive review of approaches that can be used to report on applications' permission usage, tune permission access, contain sensitive information, and nudge users towards more privacy-conscious behavior. We discuss key shortcomings of privacy enforcement on smartphones so far and identify suitable actions for the future. Smartphones; Permission Granting; Privacy; Nudging trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-pennekamp-pmc-survey.pdf Online Elsevier en 1574-1192 10.1016/j.pmcj.2017.09.005 1 JanPennekamp MartinHenze KlausWehrle inproceedings 2017-poormohammady Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems 13th International Conference on Network and Service Management 2017 11 26 Online IEEE 13th International Conference on Network and Service Management, Tokyo, Japan en 10.23919/CNSM.2017.8256009 1 EhsanPoormohammady Jens HelgeReelfs MirkoStoffers KlausWehrle ApostolosPapageorgiou incollection 2017-cps-henze-network Network Security and Privacy for Cyber-Physical Systems 2017 11 13 25-56 sensorcloud,ipacs Song, Houbing and Fink, Glenn A. and Jeschke, Sabina Wiley-IEEE Press First 2 Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications en 978-1-119-22604-8 10.1002/9781119226079.ch2 1 MartinHenze JensHiller RenéHummen RomanMatzutt KlausWehrle Jan HenrikZiegeldorf inproceedings 2017-henze-mobiquitous-comparison Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps 2017 11 7 543-544 trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-comparison.pdf Online ACM Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia en 978-1-4503-5368-7 10.1145/3144457.3144511 1 MartinHenze RitsumaInaba Ina BereniceFink Jan HenrikZiegeldorf inproceedings 2017-henze-mobiquitous-cloudanalyzer CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps 2017 11 7 262-271 Developers of smartphone apps increasingly rely on cloud services for ready-made functionalities, e.g., to track app usage, to store data, or to integrate social networks. At the same time, mobile apps have access to various private information, ranging from users' contact lists to their precise locations. As a result, app deployment models and data flows have become too complex and entangled for users to understand. We present CloudAnalyzer, a transparency technology that reveals the cloud usage of smartphone apps and hence provides users with the means to reclaim informational self-determination. We apply CloudAnalyzer to study the cloud exposure of 29 volunteers over the course of 19 days. In addition, we analyze the cloud usage of the 5000 most accessed mobile websites as well as 500 popular apps from five different countries. Our results reveal an excessive exposure to cloud services: 90 % of apps use cloud services and 36 % of apps used by volunteers solely communicate with cloud services. Given the information provided by CloudAnalyzer, users can critically review the cloud usage of their apps. Privacy; Smartphones; Cloud Computing; Traffic Analysis trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-cloudanalyzer.pdf Online ACM Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia Melbourne, VIC, Australia November 7-10, 2017 en 978-1-4503-5368-7 10.1145/3144457.3144471 1 MartinHenze JanPennekamp DavidHellmanns ErikMühmer Jan HenrikZiegeldorf ArthurDrichel KlausWehrle inproceedings 2017-rueth-iwmeasure Large-Scale Scanning of TCP’s Initial Window 2017 11 1 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf ACM In Proceedings of the Internet Measurement Conference (IMC '17) London, UK Proceedings of the 2017 Internet Measurement Conference 01.11.2017 - 03.11.2017 en 10.1145/3131365.3131370 1 JanRüth ChristianBormann OliverHohlfeld inproceedings 2017-liew-schemmel-fp Floating-Point Symbolic Execution: A Case Study in N-Version Programming 2017 10 30 symbiosys file:1848 Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering Urbana-Champaign, IL, USA en 978-1-5386-2684-9/17 1 DanielLiew DanielSchemmel CristianCadar AlastairDonaldson RafaelZähl KlausWehrle inproceedings 2017-panchenko-wpes-fingerprinting Analysis of Fingerprinting Techniques for Tor Hidden Services 2017 10 30 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-panchenko-wpes-fingerprinting.pdf Online ACM Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA en 978-1-4503-5175-1 10.1145/3139550.3139564 1 AndriyPanchenko AsyaMitseva MartinHenze FabianLanze KlausWehrle ThomasEngel inproceedings 2017-stoffers-dsrt-memo-ident Automated Memoization: Automatically Identifying Memoization Units in Simulation Parameter Studies 2017 10 18 33-42 Automatic Memoization; Accelerating Parameter Studies; Performance Prediction memosim,symbiosys http://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-stoffers-dsrt-memo-ident.pdf Online IEEE Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2017), Rome, Italy Rome, Italy en 10.1109/DISTRA.2017.8167664 1 MirkoStoffers RalfBettermann KlausWehrle conference 2017-fink-brainlab-gmds BrainLab - Ein Framework für mobile neurologische Untersuchungen 2017 8 29 Best Abstract Award https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml 06.09.19 German Medical Science GMS Publishing House (2017) 62. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS). Oldenburg GMDS 2017 17-21 September 2017 10.3205/17gmds137 1 Ina BereniceFink BerndHankammer ThomasStopinski YannicTitgemeyer RoannRamos EkaterinaKutafina Jó AgilaBitsch Stephan MichaelJonas proceedings 2017-SymPerfPoster SymPerf: Predicting Network Function Performance 2017 8 21 spp,erc,symbiosys,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf ACM Los Angeles, USA ACM SIGCOMM 2017 Poster 21.8.2017 - 25.8.2017 en 978-1-4503-5057-0/17/08 10.1145/3123878.3131977 1 FelixRath JohannesKrude JanRüth DanielSchemmel OliverHohlfeld Jó AgilaBitsch Link KlausWehrle inproceedings 2017-zimmermann-qoe A QoE Perspective on HTTP/2 Server Push 2017 8 21 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf ACM ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA Los Angeles, USA ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017) 21.8.2017 - 25.8.2017 en 978-1-4503-5056-3 10.1145/3098603.3098604 1 TorstenZimmermann BenediktWolters OliverHohlfeld inproceedings 2017-henze-trustcom-dcam Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things 2017 8 1 185-192 sscilops, ipacs https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-trustcom-dcam.pdf Online IEEE Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia en 978-1-5090-4905-9 2324-9013 10.1109/Trustcom/BigDataSE/ICESS.2017.236 1 MartinHenze BenediktWolters RomanMatzutt TorstenZimmermann KlausWehrle inproceedings 2017-maurer-trustcom-coinjoin Anonymous CoinJoin Transactions with Arbitrary Values 2017 8 1 522-529 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-maurer-trustcom-coinjoin.pdf Online IEEE 2017 IEEE Trustcom/BigDataSE/ICESS Sydney, NSW, Australia 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) 1. - 4. August 2017 978-1-5090-4906-6 2324-9013 10.1109/Trustcom/BigDataSE/ICESS.2017.280 1 Felix KonstantinMaurer TillNeudecker MartinFlorian article 2017-ziegeldorf-bmcmedgenomics-bloom BLOOM: BLoom filter based Oblivious Outsourced Matchings BMC Medical Genomics 2017 7 26 10 Suppl 2 29-42 Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude. Proceedings of the 5th iDASH Privacy and Security Workshop 2016 Secure outsourcing; Homomorphic encryption; Bloom filters sscilops; mynedata; rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf Online BioMed Central Chicago, IL, USA November 11, 2016 en 1755-8794 10.1186/s12920-017-0277-y 1 Jan HenrikZiegeldorf JanPennekamp DavidHellmanns FelixSchwinger IkeKunze MartinHenze JensHiller RomanMatzutt KlausWehrle inproceedings 2017-henze-tma-cloudemail Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape 2017 6 21 trinics, ssiclops https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-tma-cloudemail.pdf Online IEEE / IFIP Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland en 978-3-901882-95-1 10.23919/TMA.2017.8002910 1 MartinHenze Mary PeytonSanford OliverHohlfeld phdthesis phd-dombrowski Design and Evaluation of an Ultra-Reliable Low-Latency Wireless Network Protocol 2017 6 14 Shaker Verlag GmbH
Shaker Verlag GmbH, Herzogenrath, Germany
Reports on Communications and Distributed Systems RWTH Aachen University Dissertation 978-3-8440-5510-8 ChristianDombrowski
inproceedings 2017-zimmermann-networking-http2 How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push 2017 6 12 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf IEEE Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden Stockholm, Sweden IFIP Networking 2017 12.-16.6.2017 978-3-901882-94-4 10.23919/IFIPNetworking.2017.8264830 1 TorstenZimmermann JanRüth BenediktWolters OliverHohlfeld inproceedings 2017-zimmermann-secon Resource and Execution Control for Mobile Offloadee Devices 2017 6 12 maki IEEE 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA San Diego, USA 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017) 12.06.2017 - 14.06.2017 en 978-1-5090-6599-8 10.1109/SAHCN.2017.7964939 1 TorstenZimmermann HannoWirtz Jan HenrikZiegeldorf ChristianSteinhaus KlausWehrle article dombrowski-vdi Funktechnologien für Industrie 4.0 VDE Positionspapier 2017 6 1 VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas AlexanderBentkus FlorianBonanati ArminDekorsy ChristianDombrowski MichaelDoubrava AliGolestani FrankHofmann MikeHeidrich StefanHiensch RüdigerKays MichaelMeyer AndreasMüller Stephanten Brink NedaPetreska MilanPopovic LutzRauchhaupt AhmadSaad HansSchotten ChristophWöste IngoWolff
inproceedings 2017-serror-pads-cows Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping 2017 5 24 memosim,symbiosys https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-pads-cows.pdf ACM online Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), Singapore, Singapore Singapore, Singapore 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17) May 24-26, 2017 978-1-4503-4489-0 10.1145/3064911.3064913 1 MartinSerror Jörg ChristianKirchhof MirkoStoffers KlausWehrle JamesGross inproceedings 2017-serror-ew-koi From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication 2017 5 17 koi https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-radio-design-ew17.pdf IEEE Proc. of 23rd European Wireless Conference (EW17), Dresden, Germany Dresden, Germany Proc. of 23rd European Wireless Conference (EW17) 17.-19. May 2017 1 Shehzad AliAshraf Y.-P. EricWang SamehEldessoki BerndHolfeld DonaldParruca MartinSerror JamesGross conference 2017-burgdorf-sleepylab SleepyLab: An extendable mobile sleeplab based on wearable sensors 2017 4 24 1 abstract+poster /fileadmin/papers/2017/2017-burgdorf-sleepylab-ifh17.pdf http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf 2017-05-09 Online Informatics for Health 2017, Manchester UK Manchester, UK Informatics for Health 2017, Manchester UK 24-26 April 2017 en 1 AndreasBurgdorf Jó AgilaBitsch Link StephanJonas conference 2017-fink-brainlab BrainLab – towards mobile brain research 2017 4 24 2 /fileadmin/papers/2017/2017-fink-brainlab.pdf http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf 2017-05-09 Online Informatics for Health 2017, Manchester UK Manchester, UK Informatics for Health 2017, Manchester UK 24-26 April 2017 en 1 Ina BereniceFink BerndHankammer ThomasStopinsky RoannRamos EkaterinaKutafina Jó AgilaBitsch Link StephanJonas inproceedings 2017-henze-ic2e-prada Practical Data Compliance for Cloud Storage 2017 4 4 252-258 ssiclops, ipacs https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf Online IEEE Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada en 978-1-5090-5817-4 10.1109/IC2E.2017.32 1 MartinHenze RomanMatzutt JensHiller ErikMühmer Jan HenrikZiegeldorf Johannesvan der Giet KlausWehrle inproceedings 2017-ziegeldorf-codaspy-priward Privacy-Preserving HMM Forward Computation 2017 3 22 83-94 mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf Online ACM Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA en 978-1-4503-4523-1 10.1145/3029806.3029816 1 Jan HenrikZiegeldorf JanMetzke JanRüth MartinHenze KlausWehrle phdthesis bitsch-2017-enabling-dtn Enabling disruption tolerant services 2017 3 20 14 146 Disruption Tolerant Networking; Neighbor Discovery; Routing https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-5164-3 2017-03-20 Online, Print Klaus Wehrle Shaker
Aachen, Germany
Reports on Communications and Distributed Systems RWTH Aachen University Chair for Communication and Distributed Systems Ph.D. Thesis en 978-3-8440-5164-3 10.2370/9783844051643 1 1 Jó AgilaBitsch
proceedings 2017-serror-netsys-industrial Demo: A Realistic Use-case for Wireless Industrial Automation and Control 2017 3 16 koi https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf IEEE Göttingen, Germany International Conference on Networked Systems (NetSys 2017) 10.1109/NetSys.2017.7931496 1 JunaidAnsari IsmetAktas ChristianBrecher ChristophPallasch NicolaiHoffmann MarkusObdenbusch MartinSerror KlausWehrle JamesGross inproceedings 2017-wirtz-zimmermann-percom-etc Encrypting Data to Pervasive Contexts 2017 3 13 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-wirtz-zimmermann-percom-etc.pdf Online IEEE Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA en 978-1-5090-4328-6 10.1109/PERCOM.2017.7917877 1 HannoWirtz TorstenZimmermann MatteoCeriotti KlausWehrle inproceedings 2017-ziegeldorf-wons-tracemixer TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party 2017 2 21 17-24 mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf Online IEEE Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA en 978-3-901882-88-3 10.1109/WONS.2017.7888771 1 Jan HenrikZiegeldorf MartinHenze JensBavendiek KlausWehrle article Jakobs_2017_5 Two Dimensions of Success in ICT Standardization – A Review ICT Express 2017 3 2 231 - 244 KaiJakobs article 2017-comnet-lru Performance Evaluation for New Web Caching Strategies Combining LRU with Score Based Object Selection Elsevier Computer Networks 2017 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/COMNET-D-16-957R1-Updated-Submit.pdf accepted GerhardHasslinger KonstantinosNtougias FrankHasslinger OliverHohlfeld book Jakobs_2017_1 Digitalisation: Challenge and Opportunity for Standardisation. Proc. 22nd EURAS Annual Standardisation Conference 2017 12 Hiert gibt es keine Autoren, nur Herausgeber. Kai Jakobs, Knut Blind Mainz Publishers EURAS contributions to standardisation research, 978-3-95886-172-5 KaiJakobs KnutBlind inbook Jakobs_2017_3 Encyclopedia of Information Science and Technology (4th Edition) 2017 4679 - 4691 Mehdi Khosrow-Pour, IGI Gloabl ICT Standardization KaiJakobs inbook Jakobs_2017_2 Handbook of Standards and Innovation 2017 377 - 397 Richard Hawkins Edward Elgar Corporate Standardisation Management and Innovation KaiJakobs incollection 2016-iiot-rueth-comm Communication and Networking for the Industrial Internet of Things 2017 317-346 Online Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B. Springer Industrial Internet of Things en 978-3-319-42558-0 10.1007/978-3-319-42559-7_12 1 JanRüth FlorianSchmidt MartinSerror KlausWehrle TorstenZimmermann inproceedings Jakobs_2017_4 Emerging Smart Technologies and the European Standardisation System. 2017 Proc. 30th Bled eConference: Digital Transformation – From Connecting Things to Transforming Our Lives KaiJakobs inproceedings 2017-matzutt-mynedata myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data 2017 1073-1084 Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform. Presentation slides are in German Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling mynedata_show https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf Presentation slides Eibl, Maximilian and Gaedke, Martin Gesellschaft für Informatik, Bonn INFORMATIK 2017 Chemnitz INFORMATIK 2017 2017-09-28 English 978-3-88579-669-5 1617-5468 10.18420/in2017_109 1 RomanMatzutt DirkMüllmann Eva-MariaZeissig ChristianeHorst KaiKasugai SeanLidynia SimonWieninger Jan HenrikZiegeldorf GerhardGudergan IndraSpiecker gen. Döhmann KlausWehrle MartinaZiefle phdthesis 2017-parruca-phdthesis Stochastic Optimization in OFDMA/LTE Networks 2017 RWTH Aachen University DonaldParruca phdthesis 2017-ziegeldorf-phdthesis Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy 2017 RWTH Aachen University Jan HenrikZiegeldorf