This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-09-15
Creation time: 14-09-25
--- Number of references
12
inproceedings
2015-ziegeldorf-cans-boma
Bandwidth-optimized Secure Two-Party Computation of Minima
2015
12
8
9476
197-213
/fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf
Online
Springer
Lecture Notes in Computer Science
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco
en
978-3-319-26822-4
10.1007/978-3-319-26823-1_14
1
Jan HenrikZiegeldorf
JensHiller
MartinHenze
HannoWirtz
KlausWehrle
inproceedings
2015-ziegeldorf-dpm-comparison
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper)
2015
9
22
9481
226-234
fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf
Online
Springer
Lecture Notes in Computer Science
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria
en
978-3-319-29882-5
10.1007/978-3-319-29883-2_15
1
Jan HenrikZiegeldorf
MartinHenze
RenéHummen
KlausWehrle
inproceedings
2015-gerdes-authorization
Autorisierungsmanagement für das Internet of Things
2015
9
iotsec
Online
D•A•CH Security 2015
Sankt Augustin, Germany
D•A•CH Security 2015
08.09. - 09.09.2015
accepted
de
1
StefanieGerdes
RenéHummen
OlafBergmann
inproceedings
2015-schmidt-santa
Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]
2015
8
19
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf
Online
ACM
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
London, United Kingdom
43rd ACM SIGCOMM Conference (SIGCOMM '15)
17–21 August, 2015
en
10.1145/2785956.2790014
1
FlorianSchmidt
OliverHohlfeld
RenéGlebke
KlausWehrle
techreport
2015-draft-moskowitz-hip-dex-04
HIP Diet EXchange (DEX)
2015
7
20
draft-moskowitz-hip-dex-04
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-04
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
phdthesis
2015-hummen-resource-conscious
Resource-Conscious Network Security for the IP-Based Internet of Things
2015
6
30
iot
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-hummen-phd-thesis.pdf
Shaker Verlag
Aachen, Germany
Reports on Communications and Distributed Systems
11
RWTH Aachen University
Chair of Communication and Distributed Systems
Ph.D. Thesis
978-3-8440-3755-5
RenéHummen
techreport
2015-draft-moskowitz-hip-dex-03
HIP Diet EXchange (DEX)
2015
6
19
draft-moskowitz-hip-dex-03
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-03
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2015-ziegeldorf-iwpe-comparison
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
2015
5
21
198-205
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf
Online
IEEE
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA
en
10.1109/SPW.2015.9
1
Jan HenrikZiegeldorf
JanMetzke
MartinHenze
KlausWehrle
proceedings
2015-sdnflex-heuschkel-dyns
Protocol Virtualization through Dynamic Network Stacks
2015
3
9
IEEE
Cottbus
SDNFlex Workshop (NetSys 2015)
March 2015, 9-12
en
10.1109/NetSys.2015.7089055
1
JensHeuschkel
ImmanuelSchweizer
TorstenZimmermann
KlausWehrle
MaxMühlhäuser
inproceedings
2014-ziegeldorf-codaspy-coinparty
CoinParty: Secure Multi-Party Mixing of Bitcoins
2015
3
2
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf
Online
ACM
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
San Antonio, TX, USA
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)
en
978-1-4503-3191-3
10.1145/2699026.2699100
1
Jan HenrikZiegeldorf
FredGrossmann
MartinHenze
NicolasInden
KlausWehrle
inproceedings
2015-ewsn-schmidt-canttaketheheat
If You Can't Take The Heat: Temperature Effects On Low-Power Wireless Networks And How To Mitigate Them
2015
2
10
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-ewsn-canttaketheheat.pdf
Online
Springer
Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal
Porto, Portugal
12th European Conference on Wireless Sensor Networks (EWSN 2015)
9-11 February, 2015
en
978-3-319-15581-4
10.1007/978-3-319-15582-1_19
1
FlorianSchmidt
MatteoCeriotti
NiklasHauser
KlausWehrle
phdthesis
2015-hummen-phdthesis
Resource-Conscious Network Security for the IP-Based Internet of Things
2015
RWTH Aachen University
RenéHummen