2024 | |
261. |
Proceedings of the International Workshop on AI-Driven Trust, Security and Privacy in Computer Networks (AI-Driven TSP '24), co-located with the 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '24), December 17-21, 2024, Sanya, China
Publisher: IEEE,
December
2024
Accepted
|
260. |
mcBERT: Patient-Level Single-cell Transcriptomics Data Representation
bioRxiv,
November
2024
|
259. |
19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS '24), Singapur
Publisher: ACM,
July
2024
|
258. |
Reliable and Secure Control Center to Station Device Communication
Proceedings of the CIRED workshop on Increasing Distribution Network Hosting Capacity 2024, June 19-20, 2024, Vienna, Austria
June
2024
|
257. |
Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea
Publisher: IEEE,
May
2024
|
256. |
Illicit Blockchain Content – Its Different Shapes, Consequences, and Remedies
Blockchains – A Handbook on Fundamentals, Platforms and Applications Volume 105
of Advances in Information Security
Chapter 10,
page 301-336.
Publisher: Springer,
March
2024
ISBN: 978-3-031-32145-0
|
255. |
Blockchain Technology Accelerating Industry 4.0
Blockchains – A Handbook on Fundamentals, Platforms and Applications Volume 105
of Advances in Information Security
Chapter 17,
page 531-564.
Publisher: Springer,
March
2024
ISBN: 978-3-031-32145-0
|
254. |
22nd International Conference on Applied Cryptography and Network Security (ACNS '24), Abu Dhabi, UAE
March
2024
Accepted
|
2023 | |
253. |
ACM Transactions on Internet Technology,
23(4)
November
2023
ISSN: 1533-5399
DOI: 10.1145/3599968
|
252. |
Journal of Systems Research,
3(1)
October
2023
ISSN: 2770-5501
DOI: 10.5070/SR33162445
|
251. |
Journal of Systems Research,
3(1)
October
2023
ISSN: 2770-5501
DOI: 10.5070/SR33162446
|
250. |
Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023)
Publisher: IEEE,
October
2023
|
249. |
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US
Publisher: IEEE,
October
2023
Accepted
|
248. |
Proceedings of the 9th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems
(CyberICPS '23), co-located with the the 28th European Symposium on Research in Computer Security (ESORICS '23)
September
2023
Accepted
|
247. |
Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS '23), September 25-29, 2023, The Hague, The Netherlands Volume 14345, page 102-122.
Publisher: Springer,
September
2023
ISBN: 978-3-031-51475-3
|
246. |
Preserving the Royalty-Free Standards Ecosystem
European Intellectual Property Review,
45(7):371-375
July
2023
ISSN: 0142-0461
DOI: 10.2139/ssrn.4235647
|
245. |
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain Volume 13901, page 489-505.
Publisher: Springer,
June
2023
ISBN: 978-3-031-34559-3
|
244. |
Internet of Production: Fundamentals, Applications and Proceedings
of Interdisciplinary Excellence Accelerator Series
page 35-60.
Publisher: Springer,
February
2023
ISBN: 978-3-031-44496-8
|
243. |
Internet of Production: Fundamentals, Applications and Proceedings
of Interdisciplinary Excellence Accelerator Series
page 303-328.
Publisher: Springer,
February
2023
ISBN: 978-3-031-44496-8
|
242. |
Interconnected grid protection systems - reference grid for testing an adaptive protection scheme
27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, June 12-15, 2023, page 3286-3290.
2023
|
2022 | |
241. |
38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Publisher: RWTH Aachen University,
December
2022
|
240. |
Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Publisher: ACSA,
December
2022
|
239. |
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM,
November
2022
|
238. |
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
October
2022
|
237. |
IEEE Transactions on Cloud Computing,
10(3):1661-1674
September
2022
ISSN: 2168-7161
|
236. |
47th IEEE Conference on Local Computer Networks (LCN)
Edmonton, Canada, September 26-29, 2022
Publisher: IEEE,
September
2022
|
235. |
Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS '22), September 26-30, 2022, Copenhagen, Denmark Volume 978-3-031-17143-7, page 574--594.
Publisher: Springer Nature Switzerland,
September
2022
|
234. |
Cyber Security Experimentation and Test Workshop (CSET 2022)
Virtual, August 8, 2022
Publisher: ACM, New York, NY, USA
August
2022
ISBN: 978-1-4503-9684-4/22/08
|
233. |
Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 252-266.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9140-5/22/05
|
232. |
Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 73-84.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9176-4/22/05
|
231. |
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 201-206.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9216-7/22/05
|
230. |
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 207-221.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9216-7/22/05
|
229. |
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Publisher: IEEE,
May
2022
ISBN: 978-1-6654-9538-7/22
|
2021 | |
228. |
Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Publisher: ACSA,
December
2021
ISBN: 978-1-891562-81-5
|
227. |
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures
In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)
Publisher: IEEE,
November
2021
|
226. |
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea, page 2411-2413.
Publisher: ACM,
November
2021
ISBN: 978-1-4503-8454-4/21/11
|
225. |
Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
Publisher: RWTH Aachen University,
November
2021
|
224. |
Proceedings of the 2021 International Conference on Networked Systems (NetSys '21), September 13-16, 2021, Lübeck, Germany
Publisher: TU Berlin,
September
2021
|
223. |
Automation,
2(3):202-219
September
2021
ISSN: 2673-4052
|
222. |
IEEE Transactions on Network and Service Management,
18(3):3064-3078
September
2021
ISSN: 1932-4537
|
221. |
ERCIM News,
126:24-25
July
2021
ISSN: 0926-4981
|
220. |
Procedia CIRP,
99:448-453
May
2021
ISSN: 2212-8271
|
219. |
Information Processing & Management,
58(3)
May
2021
ISSN: 0306-4573
|
218. |
Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '21), co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21), April 26-28, 2021, Virtual Event, USA, page 78–87.
Publisher: ACM,
April
2021
ISBN: 978-1-4503-8319-6/21/04
|
217. |
A Novel Receiver Design for Energy Packet‐Based Dispatching
Energy Technology,
9(2)
2021
|
2020 | |
216. |
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event, page 31-44.
Publisher: HomomorphicEncryption.org,
December
2020
DOI: 10.25835/0072999
ISBN: 978-3-00-067798-4
|
215. |
Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA, page 510-525.
Publisher: ACM,
December
2020
ISBN: 978-1-4503-8858-0/20/12
|
214. |
Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Orlando, FL, USA, page 1971-1985.
Publisher: ACM,
November
2020
ISBN: 978-1-4503-7089-9/20/11
|
213. |
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA., page 1289-1306.
Publisher: ACM, New York, NY, USA
November
2020
|
212. |
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Publisher: ACM, New York, NY, USA
November
2020
|
211. |
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Publisher: ACM, New York, NY, USA
November
2020
|
210. |
Proceedings of the Internet Measurement Conference (IMC '20), October 27-29, 2020, Pittsburgh, PA, USA, page 101-110.
Publisher: ACM,
October
2020
ISBN: 978-1-4503-8138-3/20/10
|
209. |
IEEE Transactions on Industrial Informatics,
17(5):2985-2996
September
2020
ISSN: 1941-0050
|
208. |
ACM SIGCOMM Computer Communications Review (CCR),
50(3):3-15
July
2020
|
207. |
Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France, page 298-306.
Publisher: IEEE,
June
2020
ISBN: 978-3-903176-28-7
|
206. |
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops '20), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS '20), June 7-11, 2020, Dublin, Ireland
Publisher: IEEE,
June
2020
ISBN: 978-1-7281-7440-2
|
205. |
Proceedings of the 1st ITG Workshop on IT Security (ITSec '20), April 2-3, 2020, Tübingen, Germany
Publisher: University of Tübingen,
April
2020
|
204. |
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Publisher: Springer,
March
2020
|
2019 | |
203. |
IEEE Transactions on Network and Service Management,
17(2):1224 - 1238
December
2019
ISSN: 1932-4537
|
202. |
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
Publisher: ACM,
December
2019
ISBN: 978-1-4503-7000-4/19/12
|
201. |
In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)
Publisher: ACM,
December
2019
|
200. |
Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom, page 2533-2535.
Publisher: ACM,
November
2019
ISBN: 978-1-4503-6747-9/19/11
|
199. |
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom, page 27-38.
Publisher: ACM,
November
2019
ISBN: 978-1-4503-6831-5/19/11
|
198. |
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9
|
197. |
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
196. |
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
195. |
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
194. |
Proceedings of the 2019 AEIT International Annual Conference, September 18-20, 2019, Firenze, Italy
Publisher: IEEE,
September
2019
ISBN: 978-8-8872-3745-0
|
193. |
In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19)
Publisher: ACM,
August
2019
|
192. |
In Proceedings of the Applied Networking Research Workshop (ANRW '19)
Publisher: ACM,
July
2019
|
191. |
IEEE International Conference on Network Softwarization (NetSoft)
Publisher: IEEE,
June
2019
|
190. |
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)
Publisher: IFIP/IEEE,
June
2019
|
189. |
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, page 197-205.
Publisher: ACM,
May
2019
ISBN: 978-1-4503-6675-5/19/05
|
188. |
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA, page 919-927.
Publisher: ACM,
May
2019
ISBN: 978-1-4503-6675-5/19/05
|
187. |
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW, page 31-37.
Publisher: IEEE,
May
2019
ISBN: 978-1-5386-8500-6/19
|
186. |
Technical Report
Report Number: arXiv:1905.03144 [cs.NI]
COMSYS, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
May
2019
|
185. |
Technical Report
Report Number: arXiv:1904.00671 [cs.NI]
COMSYS, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
April
2019
|
184. |
ITG-news,
02/2019:7-8
April
2019
|
183. |
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Publisher: Springer,
March
2019
|
182. |
In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
Publisher: ACM,
March
2019
|
181. |
IEEE Transactions on Network and Service Management,
16(2):389--402
January
2019
ISSN: 1932-4537
|
180. |
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA, page 7252-7261.
Publisher: University of Hawai'i at Manoa / AIS,
January
2019
ISBN: 978-0-9981331-2-6
|
2018 | |
179. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2018
ISBN: 978-3-8440-6389-9
|
178. |
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Publisher: ACM,
December
2018
|
177. |
Proceedings of the Internet Measurement Conference (IMC '18)
Publisher: ACM,
October
2018
|
176. |
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Publisher: ACM,
October
2018
|
175. |
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Publisher: IEEE,
October
2018
ISBN: 978-1-5386-4413-3
|
174. |
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Publisher: IEEE,
September
2018
|
173. |
Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany
Publisher: ACM,
August
2018
ISBN: 978-1-4503-6448-5
|
172. |
Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)
Publisher: ACM,
August
2018
|
171. |
IEEE Transactions on Vehicular Technology,
67(7):5778-5792
July
2018
ISSN: 0018-9545
|
170. |
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)
June
2018
|
169. |
Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA, page 241-249.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
168. |
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
167. |
ACM SIGCOMM Computer Communications Review (CCR),
48:10-23
April
2018
|
166. |
In Proceedings of the Passive and Active Measurement Conference (PAM '18), page 255-268.
Publisher: Springer, Cham,
March
2018
ISBN: 978-3-319-76481-8
|
165. |
In Proceedings of the Passive and Active Measurement Conference (PAM '18), page 114-128.
Publisher: Springer, Cham,
March
2018
ISBN: 978-3-319-76480-1
|
164. |
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
163. |
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
162. |
Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain
Publisher: ACM,
February
2018
ISBN: 978-0-9949886-2-1
|
161. |
A new solution for the Energy Packet-based Dispatching using power/signal dual modulation
Proceedings of the Ninth International Conference on Future Energy Systems (ACM e-Energy '18)
2018
|
2017 | |
160. |
Pervasive and Mobile Computing,
42:58-76
December
2017
ISSN: 1574-1192
|
159. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
158. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
157. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
156. |
In Proceedings of the Internet Measurement Conference (IMC '17)
Publisher: ACM,
November
2017
|
155. |
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
Publisher: ACM,
October
2017
ISBN: 978-1-4503-5175-1
|
154. |
BrainLab - Ein Framework für mobile neurologische Untersuchungen
62. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).
Publisher: German Medical Science GMS Publishing House (2017),
August
2017
DOI: 10.3205/17gmds137
|
153. |
ACM SIGCOMM 2017 Poster
Los Angeles, USA, 21.8.2017 - 25.8.2017
Publisher: ACM,
August
2017
ISBN: 978-1-4503-5057-0/17/08
|
152. |
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA
Publisher: ACM,
August
2017
ISBN: 978-1-4503-5056-3
|
151. |
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9
|
150. |
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
149. |
Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland
Publisher: IEEE / IFIP,
June
2017
ISBN: 978-3-901882-95-1
|
148. |
Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Publisher: IEEE,
June
2017
ISBN: 978-3-901882-94-4
|
147. |
Funktechnologien für Industrie 4.0
VDE Positionspapier,
June
2017
|
146. |
Proc. of 23rd European Wireless Conference (EW17), Dresden, Germany
Publisher: IEEE,
May
2017
|
145. |
Informatics for Health 2017, Manchester UK
, page 2.
April
2017
|
144. |
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
143. |
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
142. |
International Conference on Networked Systems (NetSys 2017)
Göttingen, Germany
Publisher: IEEE,
March
2017
|
141. |
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
140. |
Elsevier Computer Networks,
2017
Accepted
|
139. |
INFORMATIK 2017, page 1073-1084.
Publisher: Gesellschaft für Informatik, Bonn,
2017
DOI: 10.18420/in2017_109
ISBN: 978-3-88579-669-5
|
2016 | |
138. |
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.
Publisher: IEEE,
December
2016
ISBN: 978-1-5090-1445-3
|
137. |
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
136. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1766-1768.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
135. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
134. |
Performance Evaluation for New Web Caching Strategies Combining RU with Score Based Object Selection
ITC 28
September
2016
|
133. |
IEEE QCMan
September
2016
|
132. |
Technical Report
Document number: AIB-2016-06
Report Number: arXiv:1607.03239 [cs.NI]
Department of Computer Science, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
July
2016
|
131. |
ACM SIGCOMM CCR,
July
2016
|
130. |
Performance Analysis of Cooperative ARQ Systems for Wireless Industrial
Networks
17th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal
Publisher: IEEE,
June
2016
|
129. |
STEAN: A Storage and Transformation Engine for Advanced Networking Context
Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Publisher: IEEE,
May
2016
ISBN: 978-3-9018-8283-8
|
128. |
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.
Publisher: IEEE,
April
2016
ISBN: 978-1-5090-3684-4
|
127. |
Future Generation Computer Systems,
56:701-718
March
2016
ISSN: 0167-739X
|
126. |
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 978-1-891562-41-9
|
125. |
Wiley Journal of Network Management,
26(1)
2016
|
124. |
ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
IEEE QoMEX
2016
|
2015 | |
123. |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
122. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
121. |
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September
2015
Accepted
|
120. |
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
Publisher: ACM,
August
2015
|
119. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-04
Internet Engineering Task Force,
July
2015
|
118. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June
2015
ISBN: 978-3-8440-3755-5
|
117. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-03
Internet Engineering Task Force,
June
2015
|
116. |
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
115. |
Protocol Virtualization through Dynamic Network Stacks
SDNFlex Workshop (NetSys 2015)
Cottbus, March 2015, 9-12
Publisher: IEEE,
March
2015
|
114. |
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
113. |
Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal
Publisher: Springer,
February
2015
ISBN: 978-3-319-15581-4
|
112. |
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015
|
2014 | |
111. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-02
Internet Engineering Task Force,
December
2014
|
110. |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
109. |
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
108. |
Technical Report
Document number: AIB-2014-14
Report Number: arXiv:1412.2257 [cs.NI]
Department of Computer Science, RWTH Aachen, Ahornstr. 55, 52074 Aachen, Germany
December
2014
|
107. |
A QoE Perspective on Sizing Network Buffers
ACM Internet Measurement Conference
November
2014
Accepted
|
106. |
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
1st KuVS Workshop on Anticipatory Networks
Stuttgart, September 29-30, 2014
September
2014
|
105. |
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
104. |
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain, page 191-196.
Publisher: IEEE,
August
2014
ISBN: 978-1-4799-4357-9
|
103. |
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
102. |
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), page 284-292.
Publisher: IEEE,
June
2014
|
101. |
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
Publisher: IEEE,
June
2014
|
100. |
9th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM,
June
2014
|
99. |
On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values
IEEE LANMAN
Publisher: IEEE,
May
2014
|
98. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-01
Internet Engineering Task Force,
March
2014
|
97. |
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, page 1-8.
Publisher: IEEE,
January
2014
ISBN: 978-1-4799-3635-9
|
96. |
ACM SIGCOMM Computer Communication Review,
44(3)
2014
|
2013 | |
95. |
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, page 266-269.
Publisher: IEEE,
December
2013
ISBN: 978-0-7695-5095-4
|
94. |
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
93. |
Internet-Draft
Document number: draft-hummen-dtls-extended-session-resumption-01
Internet Engineering Task Force,
October
2013
|
92. |
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany, page 1-3.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
91. |
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
90. |
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
89. |
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal,
13(10):3711-3720
October
2013
ISSN: 1530-437X
|
88. |
Internet-Draft
Document number: draft-garcia-core-security-06
Internet Engineering Task Force,
September
2013
|
87. |
Internet-Draft
Document number: draft-hummen-dtls-extended-session-resumption-00
Internet Engineering Task Force,
July
2013
|
86. |
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks
Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN 2013)
June
2013
Accepted
|
85. |
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
84. |
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0
|
83. |
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
82. |
“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site
Journal of Sensor and Actuator Networks,
2(1):156--171
March
2013
ISSN: 2224-2708
DOI: 10.3390/jsan2010156
|
81. |
Internet-Draft
Document number: draft-garcia-core-security-05
Internet Engineering Task Force,
March
2013
|
80. |
Internet-Draft
Document number: draft-hummen-hip-middle-puzzle-01
Internet Engineering Task Force,
January
2013
|
79. |
End-to-End Security for Internet-Connected Smart Objects
Praxis der Informationsverarbeitung und Kommunikation,
36(1):23-29
2013
ISSN: 1865-8342
|
78. |
Benchmarking Peer-to-Peer Systems
Understanding Quality of Service in Large-Scale Distributed Systems
Volume 7847
of Lecture Notes in Computer Science
Chapter Content Delivery Overlays,
page 69-79.
Publisher: Springer,
2013
ISBN: 978-3-642-38672-5
|
2012 | |
77. |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
76. |
Proceedings of The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), October 8-11 2012, Las Vegas, NV, USA, page 10 S..
Publisher: IEEE Computer Society, Washington, DC, USA
October
2012
ISBN: 978-1-4673-2433-5
|
75. |
Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sydney, Australia, page 1--7.
Publisher: IEEE,
September
2012
ISBN: 978-1-4673-2566-0
|
74. |
Internet-Draft
Document number: draft-hummen-hip-middle-puzzle-00
Internet Engineering Task Force,
July
2012
|
73. |
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3
|
72. |
Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, page 653-658.
Publisher: IEEE,
June
2012
ISBN: 978-1-4577-2051-2
|
71. |
Internet-Draft
Document number: draft-garcia-core-security-04
Internet Engineering Task Force,
March
2012
|
70. |
Proceedings of the 5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12), Desenzano del Garda, Italy, page 57-64.
Publisher: ICST, Brussels, Belgium
March
2012
ISBN: 978-1-4503-1510-4
|
69. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
February
2012
ISBN: 978-3-8440-0710-7
|
2011 | |
68. |
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
ITU
December
2011
ISBN: 978-92-61-13651-2
|
67. |
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award
Publisher: IEEE, Piscataway, NJ, USA
December
2011
ISBN: 978-1-4244-9268-8
Accepted
|
66. |
Internet-Draft
Document number: draft-garcia-core-security-03
Internet Engineering Task Force,
October
2011
|
65. |
Springer Wireless Personal Communications Journal,
61(3):527-542
October
2011
ISSN: 0929-6212
|
64. |
Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA
Publisher: ACM, New York, NY, USA
September
2011
ISBN: 978-1-4503-0870-0
|
63. |
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA, page 89-90.
Publisher: ACM, New York, NY, USA
September
2011
ISBN: 978-1-4503-0867-0
|
62. |
Internet-Draft
Document number: draft-garcia-core-security-02
Internet Engineering Task Force,
July
2011
|
61. |
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Volume 15, page 35--36.
Publisher: ACM, New York, NY, USA
June
2011
|
60. |
Request For Commments (Experimental Standard)
Document number: rfc6253
Internet Engineering Task Force,
May
2011
|
59. |
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA
Publisher: USENIX, Berkeley, CA, USA
March
2011
|
58. |
Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA
Publisher: IEEE, Piscataway, NJ, USA
March
2011
ISBN: 978-1-4244-9529-0
|
57. |
Internet-Draft
Document number: draft-garcia-core-security-01
Internet Engineering Task Force,
March
2011
|
56. |
Internet-Draft
Document number: draft-garcia-core-security-00
Internet Engineering Task Force,
March
2011
|
55. |
IP address assignment in wireless mesh networks
Wireless Communications and Mobile Computing,
11(3):321-337
March
2011
DOI: 10.1002/wcm.982
|
54. |
Document number: draft-ietf-hip-rfc5201-bis-04.txt
Internet Engineering Task Force,
January
2011
|
53. |
Document number: draft-ietf-hip-cert-08.txt
Internet Engineering Task Force,
January
2011
|
52. |
Document number: draft-ietf-hip-cert-07.txt
Internet Engineering Task Force,
January
2011
|
51. |
Document number: draft-ietf-hip-cert-09.txt
Internet Engineering Task Force,
January
2011
|
50. |
Internet-Draft
Document number: draft-heer-hip-middle-auth-04
Internet Engineering Task Force,
2011
|
2010 | |
49. |
Document number: draft-ietf-hip-cert-06.txt
Internet Engineering Task Force,
November
2010
|
48. |
Document number: draft-ietf-hip-cert-05.txt
Internet Engineering Task Force,
November
2010
|
47. |
A Generic Service Overlay for Wireless Mesh Networks
3rd GI/ITG KuVS Fachgespräch on NG SDPs
Berlin, Germany, October 14, 2010
Publisher: Gesellschaft für Informatik KuVS, Berlin, Germany
October
2010
RWTH Aachen University - ComSys
|
46. |
Document number: draft-ietf-hip-rfc5201-bis-03.txt
Internet Engineering Task Force,
October
2010
|
45. |
Document number: draft-ietf-hip-cert-04.txt
Internet Engineering Task Force,
September
2010
|
44. |
Document number: draft-ietf-hip-rfc5201-bis-01.txt
Internet Engineering Task Force,
September
2010
|
43. |
International Conference on Computer Communication Networks, ICCCN 2010, Zurich Volume 1, page 588-593.
Publisher: IEEE Press, Washington, DC, USA
August
2010
ISBN: 978-1-4244-7114-0
|
42. |
Document number: draft-moskowitz-hip-rfc5201-bis-02.txt
Internet Engineering Task Force,
July
2010
|
41. |
Document number: draft-ietf-hip-rfc5201-bis-02.txt
Internet Engineering Task Force,
July
2010
|
40. |
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany. Volume 1, page 588 - 593.
Publisher: IEEE Press, Washington, DC, USA
April
2010
ISBN: 978-1-4244-6605-4
|
39. |
Document number: draft-ietf-hip-cert-03.txt
Internet Engineering Task Force,
April
2010
|
38. |
Document number: draft-moskowitz-hip-rfc5201-bis-01.txt
Internet Engineering Task Force,
March
2010
|
37. |
International Journal of Technology Enhanced Learning (IJTEL),
2(1/2):21-40
2010
ISSN: 1753-5255
|
36. |
Chapter 3,
page 53-109.
Publisher: Cambridge University Press, Cambridge, UK
2010
ISBN: 9780521199711
|
2009 | |
35. |
Document number: draft-ietf-hip-cert-02.txt
Internet Engineering Task Force,
October
2009
|
34. |
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto Volume 1
ICST/IEEE
Publisher: IEEE Press, Washington, DC, USA
July
2009
ISBN: 978-963-9799-59-2
|
33. |
Document number: draft-ietf-hip-cert-01.txt
Internet Engineering Task Force,
June
2009
|
32. |
Leichtgewichtge Sicherheitsmechanismen für das Host Identity Protocol
PIK Journal,
32(1/09):48-52
January
2009
ISSN: 0930-5157
|
31. |
Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009),
37(2):49-50
2009
ISSN: 0163-5999
|
30. |
Evaluating the Performance of an IMS/NGN Deployment
Informatik 2009 - Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)of Lecture Notes in Informatics 154, page 2561-2573.
Publisher: Gesellschaft für Informatik,
2009
ISBN: 978-3-88579-248-2
|
29. |
Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), page 43-50.
ACM Sigcomm/Sigmobile
Publisher: ACM, New York, NY, USA
2009
|
28. |
Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks
Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary Volume 1, page 326-327.
Publisher: ACM, New York, NY, USA
2009
ISBN: 978-963-9799-59-2
|
27. |
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany Volume 1, page 791-796.
IEEE
Publisher: Piscataway, NJ, USA, Dresden, Germany
2009
ISBN: 978-1-4244-3435-0
|
26. |
End-Host Authentication for HIP Middleboxes (Version 2)
Internet-Draft
Document number: draft-heer-hip-midauth-02
Internet Engineering Task Force,
2009
|
25. |
Service Identifiers for HIP
Internet-Draft
Document number: draft-heer-hip-service-00
Internet Engineering Task Force,
2009
|
2008 | |
24. |
Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria Volume 5343/2008of Lecture Notes in Computer Science, page 287-292.
Publisher: Springer-Verlag, Tiergartenstraße 17, 69121 Heidelberg, Germany
December
2008
ISBN: 978-3-540-92156-1
|
23. |
Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain Volume 1of CoNEXT '08, page 23:1--23:12.
Publisher: ACM, New York, NY, USA
December
2008
ISBN: 978-1-60558-210-8
|
22. |
Document number: draft-ietf-hip-cert-00.txt
Internet Engineering Task Force,
October
2008
|
21. |
Proceedings of the First International Workshop on Story-Telling and Educational Games (STEG'08) Volume 386of CEUR Workshop Proceedings
September
2008
|
20. |
Document number: draft-varjonen-hip-cert-01.txt
Internet Engineering Task Force,
July
2008
|
19. |
Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation Volume 1
, page 1-7.
Publisher: IEEE, Washington, DC, USA
June
2008
ISBN: 978-1-4244-2035-3
|
18. |
Document number: draft-varjonen-hip-cert-01.txt
Internet Engineering Task Force,
February
2008
|
17. |
Synchronized network emulation: matching prototypes with complex simulations
SIGMETRICS Performance Evaluation Review,
36(2):58-63
2008
ISSN: 0163-5999
|
16. |
Multimedia and VR Support for Direct Communication of Designers
of Lecture Notes in Computer Science 4970
page 268-299.
Publisher: Springer,
2008
ISBN: 978-3-540-70551-2
|
15. |
Synergy by Integrating New Functionality
of Lecture Notes in Computer Science 4970
page 519-526.
Publisher: Springer,
2008
ISBN: 978-3-540-70551-2
|
14. |
Volume 1
Chapter 8,
page 121-163.
Publisher: Wiley and Sons, West Sussex, England, UK
2008
ISBN: 978-0-470-99790-1
|
13. |
Volume 1
Chapter 2,
page 13-42.
Publisher: Wiley and Sons, West Sussex, England, UK
2008
ISBN: 978-0-470-99790-1
|
12. |
HIP Certificates (Version 0)
Internet-Draft
Internet Engineering Task Force,
2008
|
11. |
End-Host Authentication for HIP Middleboxes (Version 1)
Internet-Draft
Document number: draft-heer-hip-midauth-01
Internet Engineering Task Force,
2008
|
10. |
HIP Certificates (Version 1)
Internet-Draft
Internet Engineering Task Force,
2008
|
2007 | |
9. |
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007, Galway, Ireland. Volume 1, page 251-252.
Publisher: IEEE, Washington, DC, USA
September
2007
DOI: 10.1109/P2P.2007.12
ISBN: 978-0-7695-2986-8
|
8. |
MHT: A Mobility-Aware Distributed Hash Table
Special Issue on Peer-to-Peer of the it - Information Technology Journal,
49(5):298-303
2007
ISSN: 1611-2776
|
7. |
Cooperative Security in Distributed Sensor Networks
Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007 Volume 1of 1
IEEE
Publisher: IEEE, Washington, DC, USA
2007
ISBN: 978-1-4244-1318-8
|
6. |
LHIP Lightweight Authentication Extension for HIP
Internet-Draft
Internet Engineering Task Force,
2007
|
5. |
End-Host Authentication for HIP Middleboxes
Internet-Draft
Document number: draft-heer-hip-midauth-00
Internet Engineering Task Force,
2007
|
2006 | |
4. |
In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy. Volume 1, page 1-6.
Publisher: IEEE, Washington, DC, USA
March
2006
ISBN: 0-7695-2520-2
|
2005 | |
3. |
Einsatz Verteilter Hash-Tabellen in mobilen Netzen
Proceedings of GI-Informatiktage 2005 Volume 1, page 73-76.
Publisher: GI, Gesellschaft für Informatik, Bonn, Germany
2005
ISBN: 3-88579-436-5
|
2. |
Eine strategieorientierte, modulare Simulationsumgebung für mobile Ad-Hoc-Szenarien
Proceedings of GI-Informatiktage 2005
Schloss Birlinghoven
2005
|
2004 | |
1. |
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004, Bonn, Germany Volume 51of LNI, page 239-244.
Publisher: GI. LNI, Bonn, Germany
September
2004
ISBN: 3-88579-380-6
|