2022 | |
29. |
IEEE Transactions on Cloud Computing,
10(3):1661-1674
September
2022
ISSN: 2168-7161
|
2018 | |
28. |
Proceedings of the 34rd Annual Computer Security Applications Conference, page 1-15.
Publisher: ACM, New York, NY, USA
December
2018
|
27. |
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
26. |
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
25. |
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
2017 | |
24. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
23. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
22. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
21. |
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
20. |
Resource and Execution Control for Mobile Offloadee Devices
14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA
Publisher: IEEE,
June
2017
ISBN: 978-1-5090-6599-8
|
19. |
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
18. |
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
17. |
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
16. |
INFORMATIK 2017, page 1073-1084.
Publisher: Gesellschaft für Informatik, Bonn,
2017
DOI: 10.18420/in2017_109
ISBN: 978-3-88579-669-5
|
15. |
Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy
RWTH Aachen University,
2017
|
2016 | |
14. |
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
13. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
2015 | |
12. |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
11. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
10. |
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany
The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA Volume 3, page 815--822.
Publisher: Elsevier,
July
2015
|
9. |
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
8. |
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
2014 | |
7. |
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
2013 | |
6. |
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
5. |
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World',
June
2013
DOI: 10.1002/sec.795
|
4. |
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0
|
3. |
Securing the IP-based Internet of Things with HIP and DTLS
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper), page 119--124.
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
2. |
HIP security architecture for the IP-based Internet of Things
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013, page 1331 - 1336.
Publisher: IEEE,
March
2013
|
2012 | |
1. |
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3
|