% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-20 % Creation time: 12-56-39 % --- Number of references % 16 % @Techreport { 2014-draft-moskowitz-hip-dex-02, title = {HIP Diet EXchange (DEX)}, year = {2014}, month = {12}, day = {19}, number = {draft-moskowitz-hip-dex-02}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Incollection { 2014-tcc-henze-trustpoint, title = {A Trust Point-based Security Architecture for Sensor Data in the Cloud}, year = {2014}, month = {12}, day = {14}, pages = {77-106}, tags = {sensorcloud}, misc2 = {Online}, editor = {Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard}, publisher = {Springer}, booktitle = {Trusted Cloud Computing}, ISBN = {978-3-319-12717-0}, DOI = {10.1007/978-3-319-12718-7_6}, reviewed = {1}, author = {Henze, Martin and Hummen, Ren{\'e} and Matzutt, Roman and Wehrle, Klaus} } @Incollection { 2013-wtc-eggert-sensorcloud, title = {SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators}, year = {2014}, month = {12}, day = {14}, pages = {203-218}, tags = {sensorcloud}, url = {fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf}, misc2 = {Online}, editor = {Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard}, publisher = {Springer}, booktitle = {Trusted Cloud Computing}, language = {en}, ISBN = {978-3-319-12717-0}, DOI = {10.1007/978-3-319-12718-7_13}, reviewed = {1}, author = {Eggert, Michael and H{\"a}u{\ss}ling, Roger and Henze, Martin and Hermerschmidt, Lars and Hummen, Ren{\'e} and Kerpen, Daniel and Navarro P{\'e}rez, Antonio and Rumpe, Bernhard and Thi{\ss}en, Dirk and Wehrle, Klaus} } @Techreport { 2015-aib-schmidt-hotbox, title = {HotBox: Testing Temperature Effects in Sensor Networks}, year = {2014}, month = {12}, day = {4}, number = {AIB-2014-14}, number2 = {arXiv:1412.2257 [cs.NI]}, pages = {1--17}, tags = {senserr}, url = {fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Schmidt, Florian and Ceriotti, Matteo and Hauser, Niklas and Wehrle, Klaus} } @Conference { HohlfeldIMC, title = {A QoE Perspective on Sizing Network Buffers}, year = {2014}, month = {11}, booktitle = {ACM Internet Measurement Conference}, state = {accepted}, author = {Hohlfeld, Oliver and Pujol, Enric and Ciucu, Florin and Feldmann, Anja and Barford, Paul} } @Proceedings { 2014-kuvs-zimmermann-mindgap, title = {Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols}, year = {2014}, month = {9}, day = {29}, event_place = {Stuttgart}, event_name = {1st KuVS Workshop on Anticipatory Networks}, event_date = {September 29-30, 2014}, reviewed = {1}, author = {Werner, Marc and Lange, Tobias and Hollick, Matthias and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2014-aasnet-henze-scslib, title = {SCSlib: Transparently Accessing Protected Sensor Data in the Cloud}, year = {2014}, month = {9}, day = {24}, volume = {37}, pages = {370-375}, tags = {sensorcloud}, url = {/fileadmin/papers/2014/2014-henze-aasnet-scslib.pdf}, misc2 = {Online}, publisher = {Elsevier}, series = {Procedia Computer Science}, booktitle = {The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada}, event_place = {Halifax, NS, Canada}, event_name = {The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14)}, language = {en}, DOI = {10.1016/j.procs.2014.08.055}, reviewed = {1}, author = {Henze, Martin and Bereda, Sebastian and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2014-ficloud-henze-upecsi, title = {User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things}, year = {2014}, month = {8}, day = {27}, pages = {191-196}, tags = {ipacs}, url = {/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)}, language = {en}, ISBN = {978-1-4799-4357-9}, DOI = {10.1109/FiCloud.2014.38}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Poster { 2014-wisec-ziegeldorf-ipin, title = {POSTER: Privacy-preserving Indoor Localization}, year = {2014}, month = {7}, day = {23}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf}, organization = {7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)}, language = {en}, DOI = {10.13140/2.1.2847.4886}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Viol, Nicolai and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2014-hummen-delegation, title = {Delegation-based Authentication and Authorization for the IP-based Internet of Things}, year = {2014}, month = {6}, day = {30}, pages = {284-292}, tags = {iotsec; sensorcloud}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)}, event_place = {Singapore}, event_name = {11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)}, event_date = {30.06. - 03.07.2014}, language = {en}, DOI = {10.1109/SAHCN.2014.6990364}, reviewed = {1}, author = {Hummen, Ren{\'e} and Shafagh, Hossein and Raza, Shahid and Voigt, Thiemo and Wehrle, Klaus} } @Inproceedings { 2014-schmidt-piccett, title = {Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic}, year = {2014}, month = {6}, day = {24}, tags = {refector}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-schmidt-iscc-piccett.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal}, language = {en}, DOI = {10.1109/ISCC.2014.6912582}, reviewed = {1}, author = {Schmidt, Florian and Henze, Martin and Wehrle, Klaus} } @Conference { 2014-hohlfeld-harvester, title = {The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape}, year = {2014}, month = {6}, url = {http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf}, web_url = {http://asiaccs2014.nict.go.jp/}, publisher = {ACM}, booktitle = {9th ACM Symposium on Information, Computer and Communications Security}, DOI = {10.1145/2590296.2590302}, reviewed = {1}, author = {Stringhini, Gianluca and Hohlfeld, Oliver and Kruegel, Christopher and Vigna, Giovanni} } @Conference { CiucuPH2014, title = {On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values}, year = {2014}, month = {5}, web_url = {http://www.ieee-lanman.org/}, publisher = {IEEE}, booktitle = {IEEE LANMAN}, event_place = {Reno, NV, USA}, reviewed = {1}, author = {Ciucu, Florin and Poloczek, Felix and Hohlfeld, Oliver} } @Techreport { 2014-draft-moskowitz-hip-dex-01, title = {HIP Diet EXchange (DEX)}, year = {2014}, month = {3}, day = {4}, number = {draft-moskowitz-hip-dex-01}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis]. The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIP BEX. The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used together with another suitable security protocol such as the Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection of upper layer protocols. HIP DEX can also be used as a keying mechanism for a MAC layer security protocol as is supported by IEEE 802.15.4 [IEEE.802-15-4.2011].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Inproceedings { 2014-comsnets-aktas-graph-based-redundancy-removal, title = {Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions}, year = {2014}, month = {1}, day = {7}, pages = {1-8}, tags = {crawler}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-aktas-comsnets-redundancy.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India}, event_place = {Bangalore, India}, event_name = {2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)}, event_date = {7-10 January, 2014}, language = {en}, ISBN = {978-1-4799-3635-9}, DOI = {10.1109/COMSNETS.2014.6734899}, reviewed = {1}, author = {Aktas, Ismet and Henze, Martin and Alizai, Muhammad Hamad and M{\"o}llering, Kevin and Wehrle, Klaus} } @Article { HohlfeldCCR14, title = {An Internet census taken by an illegal botnet - A qualitative assessment of published measurements}, journal = {ACM SIGCOMM Computer Communication Review}, year = {2014}, volume = {44}, number = {3}, url = {http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf}, web_url = {http://www.sigcomm.org/ccr/papers/2014/July}, author = {Krenc, Thomas and Hohlfeld, Oliver and Feldmann, Anja} }