Dr. Jan Henrik Ziegeldorf

Dr. Jan Henrik Ziegeldorf

WARNING: This information is likely out-of-date and will not be updated!

Last updated on 2018-10-02

Short CV

I received a Diploma (with honors) in Computer Science from RWTH Aachen University in 2011. From 2011 to 2012, I worked as a freelance Data Analyst for Zalando GmbH in Berlin focussing on data mining and machine learning. I started my PhD in 2012, working at Philips Research, Eindhoven, Netherlands for one and half years. In October 2013, I returned full time to RWTH Aachen University. I earned my PhD in March 2018 and have been working at the the Institute for Energy Efficient Buildings and Indoor Climate at the EON Energy Research Center at RWTH Aachen University first part-time then full-time since August 2017 and June 2018, respectively.

My research at COMSYS and dissertation focuses on the design of digital services with strong guarantees of data security and privacy based on cryptographic techniques such as secure multi-party computation, anonymization technologies (e.g., Differential Privacy) and other advanced (non-)cryptographic primitives.

I have served/am serving on the Technical Program Committee of

  • IEEE Blockchain 2019
  • IEEE International Conference on Blockchain and Cryptocurrency 2019
  • IEEE Blockchain 2018

I have served as a reviewer for

  • Journal of Applied Computing and Informatics (Elsevier, 2019)
  • Journal of Data and Information Quality (ACM, 2019)
  • Privacy Enhancing Technologies (PETs) Symposium (DeGruyter Open, 2019)
  • Journal of Network and Computer Applications (Elsevier, 2018)
  • Transactions on Sensor Networks (ACM, 2018)
  • Privacy Enhancing Technologies (PETs) Symposium (DeGruyter Open, 2018)
  • IET Information Security Journal (IET, 2018)
  • Internet of Things Journal (IEEE, 2017)
  • Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley, 2016)
  • International Journal of Information Security (Springer, 2015)

See also Google Scholar and DBLP.

Publications

Complying with Data Handling Requirements in Cloud Storage Systems. IEEE Transactions on Cloud Computing, vol. 10, no. 3. September 2022.
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. Proceedings of the 34rd Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA. December 2018.
Thwarting Unwanted Blockchain Content Insertion. Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), Apr 17 - Apr 20, 2018, Orlando, Florida, USA. April 2018.
Secure and anonymous decentralized Bitcoin mixing. Future Generation Computer Systems, vol. 80. March 2018.
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao. February 2018.
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ‘17), Nov 7 - Nov 10, 2017, Melbourne, VIC, Australia. November 2017.
Network Security and Privacy for Cyber-Physical Systems. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. November 2017.
Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Melbourne, Australia. November 2017.
BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics, vol. 10, no. Suppl 2, Nov 11 - Nov 11, 2016, Chicago, IL, USA. July 2017.
Resource and Execution Control for Mobile Offloadee Devices. 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), Jun 12 - Jun 14, 2017, San Diego, CA, United States. June 2017.
Practical Data Compliance for Cloud Storage. Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Apr 4 - Apr 7, 2017, Vancouver, BC. April 2017.
Privacy-Preserving HMM Forward Computation. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, United States. March 2017.
TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party. Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Feb 21 - Feb 24, 2017, Jackson, WY, USA. February 2017.
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data. INFORMATIK 2017, Chemnitz, Germany. January 2017.
CPPL: Compact Privacy Policy Language. Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), Vienna, Austria. October 2016.
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria. October 2016.
Bandwidth-optimized Secure Two-Party Computation of Minima. 14th International Conference on Cryptology and Network Security (CANS 2015), vol. 9476. December 2015.
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper). The 10th DPM International Workshop on Data Privacy Management, vol. 9481. September 2015.
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany. The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), vol. 3, USA. July 2015.
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks. 2015 International Workshop on Privacy Engineering (IWPE'15), May 21 - May 22, 2015, San Jose, CA. May 2015.
CoinParty: Secure Multi-Party Mixing of Bitcoins. The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA. March 2015.
Tailoring End-to-End IP Security Protocols to the Internet of Things. In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Oct 7 - Oct 10, 2013, Göttingen, Germany. October 2013.
Privacy in the Internet of Things: Threats and Challenges. Security and Communication Networks - Special Issue on ‘Security in a Completely Interconnected World’. June 2013.
Securing the IP-based Internet of Things with HIP and DTLS. Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘13), Budapest, Hungary. April 2013.
Towards Viable Certificate-based Authentication for the Web of Things. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec ‘13), Budapest, Hungary. April 2013.
HIP security architecture for the IP-based Internet of Things. Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Mar 25 - Mar 28, 2013, Barcelona, Spain. March 2013.
SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), Jun 25 - Jun 27, 2012, Liverpool, United Kingdom. June 2012.

Advised Theses

Performance Evaluation of Low-Overhead Messaging Protocols an Time Series Databases via a common Middlerware
Master's Thesis, RWTH Aachen University, September 2017
Advisors: Jan Henrik Ziegeldorf, Florian Stinner (EBC, EONERC)
Examiners: Klaus Wehrle, Dirk Müller (EBC, EONERC)
Privacy-Preserving Data Analysis on Distributed Datasets
Master's Thesis, RWTH Aachen University, April 2017
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Efficient and Secure Classification in the Two Party Setting
Master's Thesis, RWTH Aachen University, March 2017
Examiners: Klaus Wehrle, Walter Unger (i1)
A User-controlled Data Market for Privacy-preserving Data Analyses
Bachelor's Thesis, RWTH Aachen University, February 2017
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Queries on Hidden Markov Models in the Secure Two-Party Setting
Master's Thesis, RWTH Aachen University, January 2017
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Behavioural Nudging through Privacy-Preserving Comparisons
Master's Thesis, RWTH Aachen University, December 2016
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Post-Quantum Authentication For the TLS Protocol Using HIMMO-Based Signatures
Master's Thesis, RWTH Aachen University, June 2016
Advisors: Óscar García-Morchón (Philips Research), Jan Henrik Ziegeldorf
Examiners: Klaus Wehrle, Walter Unger (i1)
Test Software for Powerline-based Communication in Smart Grid
Master's Thesis, RWTH Aachen University, May 2016
Advisors: Tobias Markus Pletzer (IHT), Martin Serror, Jan Henrik Ziegeldorf
Examiners: Klaus Wehrle, Horst Lichter (SWC)
Design, Implementation and Evaluation of Secure Location Privacy Mechanisms
Master's Thesis, RWTH Aachen University, March 2016
Examiners: Klaus Wehrle, Walter Unger (i1)
SHIELD: Secure Hidden-Markov-Model Evaluation for Localisation and Diagnostics
Bachelor's Thesis, RWTH Aachen University, January 2016
Examiners: Klaus Wehrle, Walter Unger (i1)
Design and Implementation Secure Decentralized Bitcoin Mixing
Master's Thesis, RWTH Aachen University, June 2015
Examiners: Klaus Wehrle, Walter Unger (i1)
Univention Graduate Award (3rd place) for the best thesis in 2016 & FOLKS Award for the best Master's thesis in 2015
Modular Integration Framework for PREserv Virtual Sensors
Master's Thesis, RWTH Aachen University, February 2015
Advisors: Jan Henrik Ziegeldorf, Jó Ágila Bitsch
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Distributed Differential Privacy via General Secure Multiparty Computation Mechanisms
Master's Thesis, RWTH Aachen University, February 2015
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Performance Analysis of Secure Two-Party Computation Protocols and Implementations
Bachelor's Thesis, RWTH Aachen University, December 2014
Examiners: Klaus Wehrle, Walter Unger (i1)
A User-centered Analysis of the Effects of Proximity and Locality on Privacy in Personal Communications
Bachelor's Thesis, RWTH Aachen University, October 2014
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Crowd-Sourced Privacy-Preserving Creation of Elevation Profiles using Barometers
Master's Thesis, RWTH Aachen University, September 2014
Advisors: Jó Ágila Bitsch, Jan Henrik Ziegeldorf
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Preserving Location Privacy Indoors through Spatial and Temporal Cloaking
Bachelor's Thesis, RWTH Aachen University, September 2014
Examiners: Klaus Wehrle, Thomas Seidl (i9)
Private Wifi-based Indoor Localization using Secure Multiparty Computation
Bachelor's Thesis, RWTH Aachen University, September 2014
Examiners: Klaus Wehrle, Walter Unger (i1)