This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-04-26
Creation time: 18-25-47
--- Number of references
16
techreport
2014-draft-moskowitz-hip-dex-02
HIP Diet EXchange (DEX)
2014
12
19
draft-moskowitz-hip-dex-02
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-02
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
incollection
2014-tcc-henze-trustpoint
A Trust Point-based Security Architecture for Sensor Data in the Cloud
2014
12
14
77-106
sensorcloud
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
978-3-319-12717-0
10.1007/978-3-319-12718-7_6
1
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
incollection
2013-wtc-eggert-sensorcloud
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
2014
12
14
203-218
sensorcloud
fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
en
978-3-319-12717-0
10.1007/978-3-319-12718-7_13
1
MichaelEggert
RogerHäußling
MartinHenze
LarsHermerschmidt
RenéHummen
DanielKerpen
AntonioNavarro Pérez
BernhardRumpe
DirkThißen
KlausWehrle
techreport
2015-aib-schmidt-hotbox
HotBox: Testing Temperature Effects in Sensor Networks
2014
12
4
AIB-2014-14
arXiv:1412.2257 [cs.NI]
1--17
senserr
fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
MatteoCeriotti
NiklasHauser
KlausWehrle
conference
HohlfeldIMC
A QoE Perspective on Sizing Network Buffers
2014
11
ACM Internet Measurement Conference
accepted
OliverHohlfeld
EnricPujol
FlorinCiucu
AnjaFeldmann
PaulBarford
proceedings
2014-kuvs-zimmermann-mindgap
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
2014
9
29
Stuttgart
1st KuVS Workshop on Anticipatory Networks
September 29-30, 2014
1
MarcWerner
TobiasLange
MatthiasHollick
TorstenZimmermann
KlausWehrle
inproceedings
2014-aasnet-henze-scslib
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
2014
9
24
37
370-375
sensorcloud
/fileadmin/papers/2014/2014-henze-aasnet-scslib.pdf
Online
Elsevier
Procedia Computer Science
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada
Halifax, NS, Canada
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14)
en
10.1016/j.procs.2014.08.055
1
MartinHenze
SebastianBereda
RenéHummen
KlausWehrle
inproceedings
2014-ficloud-henze-upecsi
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things
2014
8
27
191-196
ipacs
/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf
Online
IEEE
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain
Barcelona, Spain
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)
en
978-1-4799-4357-9
10.1109/FiCloud.2014.38
1
MartinHenze
LarsHermerschmidt
DanielKerpen
RogerHäußling
BernhardRumpe
KlausWehrle
poster
2014-wisec-ziegeldorf-ipin
POSTER: Privacy-preserving Indoor Localization
2014
7
23
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
en
10.13140/2.1.2847.4886
1
Jan HenrikZiegeldorf
NicolaiViol
MartinHenze
KlausWehrle
inproceedings
2014-hummen-delegation
Delegation-based Authentication and Authorization for the IP-based Internet of Things
2014
6
30
284-292
iotsec; sensorcloud
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf
Online
IEEE
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)
Singapore
11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)
30.06. - 03.07.2014
en
10.1109/SAHCN.2014.6990364
1
RenéHummen
HosseinShafagh
ShahidRaza
ThiemoVoigt
KlausWehrle
inproceedings
2014-schmidt-piccett
Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic
2014
6
24
refector
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-schmidt-iscc-piccett.pdf
IEEE
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
en
10.1109/ISCC.2014.6912582
1
FlorianSchmidt
MartinHenze
KlausWehrle
conference
2014-hohlfeld-harvester
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape
2014
6
http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf
http://asiaccs2014.nict.go.jp/
ACM
9th ACM Symposium on Information, Computer and Communications Security
10.1145/2590296.2590302
1
GianlucaStringhini
OliverHohlfeld
ChristopherKruegel
GiovanniVigna
conference
CiucuPH2014
On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values
2014
5
http://www.ieee-lanman.org/
IEEE
IEEE LANMAN
Reno, NV, USA
1
FlorinCiucu
FelixPoloczek
OliverHohlfeld
techreport
2014-draft-moskowitz-hip-dex-01
HIP Diet EXchange (DEX)
2014
3
4
draft-moskowitz-hip-dex-01
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis].
The HIP DEX protocol design aims at reducing the overhead of the
employed cryptographic primitives by omitting public-key signatures
and hash functions. In doing so, the main goal is to still deliver
similar security properties to HIP BEX.
The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used
together with another suitable security protocol such as the
Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection
of upper layer protocols. HIP DEX can also be used as a keying
mechanism for a MAC layer security protocol as is supported by IEEE
802.15.4 [IEEE.802-15-4.2011].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-01
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2014-comsnets-aktas-graph-based-redundancy-removal
Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions
2014
1
7
1-8
crawler
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-aktas-comsnets-redundancy.pdf
Online
IEEE
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India
Bangalore, India
2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)
7-10 January, 2014
en
978-1-4799-3635-9
10.1109/COMSNETS.2014.6734899
1
IsmetAktas
MartinHenze
Muhammad HamadAlizai
KevinMöllering
KlausWehrle
article
HohlfeldCCR14
An Internet census taken by an illegal botnet - A qualitative assessment of published measurements
ACM SIGCOMM Computer Communication Review
2014
44
3
http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf
http://www.sigcomm.org/ccr/papers/2014/July
ThomasKrenc
OliverHohlfeld
AnjaFeldmann