This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-09-08
Creation time: 02-12-42
--- Number of references
15
inproceedings
2016-henze-cloudcom-trinics
Towards Transparent Information on Individual Cloud Service Usage
2016
12
12
366-370
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf
Online
IEEE
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg
en
978-1-5090-1445-3
10.1109/CloudCom.2016.0064
1
MartinHenze
DanielKerpen
JensHiller
MichaelEggert
DavidHellmanns
ErikMühmer
OussamaRenuli
HenningMaier
ChristianStüble
RogerHäußling
KlausWehrle
inproceedings
2016-henze-wpes-cppl
CPPL: Compact Privacy Policy Language
2016
10
24
99-110
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf
Online
ACM
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4569-9
10.1145/2994620.2994627
1
MartinHenze
JensHiller
SaschaSchmerling
Jan HenrikZiegeldorf
KlausWehrle
inproceedings
2016-mitseva-ccs-fingerprinting
POSTER: Fingerprinting Tor Hidden Services
2016
10
24
1766-1768
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-mitseva-ccs-fingerprinting.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989054
1
AsyaMitseva
AndriyPanchenko
FabianLanze
MartinHenze
KlausWehrle
ThomasEngel
inproceedings
2016-matzutt-ccs-bitcoin
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
2016
10
24
1769-1771
mynedata
/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989059
1
RomanMatzutt
OliverHohlfeld
MartinHenze
RobinRawiel
Jan HenrikZiegeldorf
KlausWehrle
conference
2016-itc-caching
Performance Evaluation for New Web Caching Strategies Combining RU with Score Based Object Selection
2016
9
ITC 28
ITC 28
GerhardHasslinger
KostasNtougias
FrankHasslinger
OliverHohlfeld
conference
2016-hohlfeld-qcman
Insensitivity to Network Delay: Minecraft Gaming Experience of Casual Gamers
2016
9
Assessing the impact of network delay on perceived quality of gaming has been subject to many studies involving different genres ranging from fast-paced first-person shooters to strategy games. This paper assesses the impact of network latency on the Quality of Experience (QoE) of casual gamers playing Minecraft. It is based on a user study involving 12 casual gamers with no prior experience with Minecraft. QoE is assessed using the Game Experience Questionnaire (GEQ) and dedicated questions for the overall perceived quality and experienced gameplay interruptions. The main finding is that casual Minecraft players are rather insensitive to network delay of up to 1 sec.
https://i-teletraffic.org/_Resources/Persistent/bc99ba4324ebc7cf1369f09a6caa334c0203943f/Hohlfeld2016.pdf
http://ieeexplore.ieee.org/abstract/document/7810715/?reload=true
IEEE QCMan
IEEE QCMan
10.1109/ITC-28.2016.313
OliverHohlfeld
HannesFiedler
EnricPujol
DennisGuse
techreport
2016-henze-aib-sensorcloud
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud
2016
7
11
AIB-2016-06
arXiv:1607.03239 [cs.NI]
1--24
sensorcloud
fileadmin/papers/2016/2016-henze-aib-sensorcloud.pdf
Online
Department of Computer Science, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen University
Technical Report
en
0935-3232
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
article
2016-hohlfeld-nfv_ccr
New Kid on the Block: Network Functions Virtualization: From Big Boxes to Carrier Clouds
ACM SIGCOMM CCR
2016
7
http://ccracmsigcomm.info.ucl.ac.be/wp-content/uploads/2016/07/sigcomm-ccr-paper29.pdf
LeonhardNobach
OliverHohlfeld
DavidHausheer
inproceedings
2016-serror-wowmom-arq
Performance Analysis of Cooperative ARQ Systems for Wireless Industrial
Networks
2016
6
21
koi
IEEE
online
17th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal
Coimbra, Portugal
en
10.1109/WoWMoM.2016.7523534
1
MartinSerror
YulinHu
ChristianDombrowski
KlausWehrle
JamesGross
inproceedings
2016-werner-networking-stean
STEAN: A Storage and Transformation Engine for Advanced Networking Context
2016
5
17
maki
IEEE
Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Vienna, Austria
IFIP Networking 2016
17.-19.5.2016
978-3-9018-8283-8
10.1109/IFIPNetworking.2016.7497203
1
MarcWerner
JohannesSchwandtke
MatthiasHollick
OliverHohlfeld
TorstenZimmermann
KlausWehrle
inproceedings
2016-henze-claw-dpc
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
2016
4
8
130-135
ssiclops
/fileadmin/papers/2016/2016-henze-claw-dpc.pdf
Online
IEEE
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany
en
978-1-5090-3684-4
10.1109/IC2EW.2016.24
1
MartinHenze
JensHiller
OliverHohlfeld
KlausWehrle
article
2016-fgcs-henze-iotprivacy
A Comprehensive Approach to Privacy in the Cloud-based Internet of Things
Future Generation Computer Systems
2016
3
56
701-718
ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf
Online
Elsevier
en
0167-739X
10.1016/j.future.2015.09.016
1
MartinHenze
LarsHermerschmidt
DanielKerpen
RogerHäußling
BernhardRumpe
KlausWehrle
inproceedings
2016-panchenko-ndss-fingerprinting
Website Fingerprinting at Internet Scale
2016
2
21
The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf
https://www.informatik.tu-cottbus.de/~andriy/zwiebelfreunde/
Internet Society
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
San Diego, CA, USA
February 21-24, 2016
978-1-891562-41-9
10.14722/ndss.2016.23477
1
AndriyPanchenko
FabianLanze
AndreasZinnen
MartinHenze
JanPennekamp
KlausWehrle
ThomasEngel
article
2016-sdnflex_si
Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management
Wiley Journal of Network Management
2016
26
1
http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf
OliverHohlfeld
ThomasZinner
TheophilusBenson
DavidHausheer
conference
2016-erwin
ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
2016
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938&tag=1
IEEE QoMEX
IEEE QoMEX
10.1109/QoMEX.2016.7498938
ThomasZinner
MatthiasHirth
ValentinFischer
OliverHohlfeld