Dieter Hogrefe

Orcid: 0000-0002-1033-9863

Affiliations:
  • University Göttingen


According to our database1, Dieter Hogrefe authored at least 127 papers between 1985 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
LbSP: Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization.
IEEE Internet Things J., 2022

2021
FedRD: Privacy-preserving adaptive <i>Fed</i>erated learning framework for intelligent hazardous <i>R</i>oad <i>D</i>amage detection and warning.
Future Gener. Comput. Syst., 2021

An AI-Based Transmission Power-Control Certificate Omission in Vehicular Ad-Hoc Networks.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021

2020
Transmission Power-Control Certificate Omission in Vehicular Ad Hoc Networks.
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020

2019
Topology Control for Energy-Efficient Localization in Mobile Underwater Sensor Networks Using Stackelberg Game.
IEEE Trans. Veh. Technol., 2019

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019

2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018

Multi-Device Fusion for Enhanced Contextual Awareness of Localization in Indoor Environments.
IEEE Access, 2018

Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks.
IEEE Access, 2018

A Security Aware Fuzzy Enhanced Ant Colony Optimization Routing in Mobile Ad hoc Networks.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018

Hardware based Two-Factor User Authentication for the Internet of Things.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Security Aware Fuzzy Enhanced Reliable Ant Colony Optimization Routing in Vehicular Ad hoc Networks.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

2017
A Survey of Ant Colony Optimization Based Routing Protocols for Mobile Ad Hoc Networks.
IEEE Access, 2017

Two Layers Multi-class Detection method for network Intrusion Detection System.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Poster abstract: Streamlined anomaly detection in web requests using recurrent neural networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

A Framework for Integrating Pedagogy and Technology in Context-Aware Learning Environment.
Proceedings of the Advances in Web-Based Learning - ICWL 2017, 2017

A Security Aware Fuzzy Embedded ACO Based Routing Protocol (SAFACO) in VANETs.
Proceedings of the Information Science and Applications 2017, 2017

Influence of social personalization on performance in group learning.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

2016
Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks.
EAI Endorsed Trans. Security Safety, 2016

Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks.
Mob. Networks Appl., 2016

Monte Carlo Localization for path-based mobility in mobile wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A Novel Semi-Supervised Adaboost Technique for Network Anomaly Detection.
Proceedings of the 19th ACM International Conference on Modeling, 2016

Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation.
Proceedings of the IEEE International Smart Cities Conference, 2016

Minimizing intra-flow interference in multi-channel mesh networks: An optimization approach.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Self-managed and blockchain-based vehicular ad-hoc networks.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Calculating the Speed of Vehicles Using Wireless Sensor Networks.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

Applied Sensor-Assisted Monte Carlo Localization for Mobile Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Demo: Dead Reckoning for Monte Carlo Localization in Low Seed Density Scenarios.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Secure Neighbor Discovery in Mobile Ad Hoc Networks through Local Topology Visualization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Secure and Authenticated Data Communication in Wireless Sensor Networks.
Sensors, 2015

A survey on secret key generation mechanisms on the physical layer in wireless networks.
Secur. Commun. Networks, 2015

Anonymous group-based routing in MANETs.
J. Inf. Secur. Appl., 2015

A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2.
Proceedings of the IEEE International Conference on RFID Technology and Applications, 2015

Knowledge-assisted location-adaptive technique for indoor-outdoor detection in e-learning.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Received signal strength indication for movement detection.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

PECALE: An Environment for Enhancing Personalization and Learner Engagement in an Online Learning Platform.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015

Malware-Defense Secure Routing in Intelligent Device-to-Device Communications.
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, 2015

2014
Trust integrated node potential aware routing for WSNs.
Int. J. Trust. Manag. Comput. Commun., 2014

Multi-objective ant colony optimisation-based routing in WSNs.
Int. J. Bio Inspired Comput., 2014

Smart parking system for vehicles.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

SODCA: A Self-Organized Distributed Channel Access scheme for IEEE 802.11 networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Social Insect-based Sybil Attack Detection in Mobile Ad-hoc Networks.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

Securing Mobile Ad-Hoc Networks Using an Artificial Immune System.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

2013
Investigation of a bio-inspired security mechanism in Mobile Ad hoc Networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Anonymity and privacy in multicast mobile ad hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Empirical performance analysis of anonymizing VoIP over The Onion Router (TOR) network.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Random backoff control to thwart malicious behavior in WLANs.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013

Robust and scalable secure neighbor discovery for wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Towards robust key extraction from multipath wireless channels.
J. Commun. Networks, 2012

RDIS: destination location privacy in MANETs.
Int. J. Inf. Priv. Secur. Integr., 2012

Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Fuzzy Logic Election of Node for Routing in WSNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Novel Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

On improving the robustness of physical-layer key extraction mechanisms against delay and mobility.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

An optimal sensor deployment scheme to ensure multi level coverage and connectivity in wireless sensor networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
Intelligent mechanisms for key generation from multipath wireless channels.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

TAGER: Trust-Aware Georouting Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Security Verification of Trust-Based Authentication Handover in IP Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Trust integrated link state routing protocol for Wireless Sensor Networks (TILSRP).
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
A Cross-Layer Approach for Improving TCP Performance in Mobile Environments.
Wirel. Pers. Commun., 2010

D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure.
Comput. Commun., 2010

Achieving Receiver Location Privacy in Mobile Ad Hoc Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Wireless Mesh Networks for Infrastructure Deficient Areas.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Bio-inspired Self-organized Public Key Authentication Mechanism for Mobile Ad-hoc Networks.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Overhead and performance study of the general internet signaling transport (GIST) protocol.
IEEE/ACM Trans. Netw., 2009

Preface.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

SIPFIX: A scheme for distributed SIP monitoring.
Proceedings of the Integrated Network Management, 2009

2008
Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Fast Re-Authentication for Inter-Domain Handover using Context Transfer.
Proceedings of the 2008 International Conference on Information Networking, 2008

Performance Study of PANA Pre-authentication for Interdomain Handover.
Proceedings of the Fourth International Conference on Networking and Services, 2008

2007
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN.
Comput. Secur., 2007

An NSIS-based approach for firewall traversal in mobile IPv6 networks.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

E²T: End-to-End Tunneling Extension to Mobile IPv6.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

DMMP: A New Dynamic Mesh-based Overlay Multicast Protocol Framework.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
A review of mobility support paradigms for the internet.
IEEE Commun. Surv. Tutorials, 2006

Beyond QoS signaling: A new generic IP signaling framework.
Comput. Networks, 2006

A UML Profile for Communicating Systems.
Proceedings of the System Analysis and Modeling: Language Profiles, 2006

Wirtschaftliche Erfolgspotenziale von WiMAX - Geschäftsmodelle in Deutschland.
Proceedings of the Mobile Informationssysteme, 2006

An Evaluation of Multi-Role Access Routers Specification and Validation of an IDKE aware Access Router.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Optimising Wimax Business Models using Incentive Engineering.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Case study on the use of SDL for specifying an IETF micro mobility protocol.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Technische Möglichkeiten und Akzeptanz mobiler Anwendungen - Eine interdisziplinäre Betrachtung.
Wirtschaftsinf., 2005

Telecommunications and UML languages.
Comput. Networks, 2005

NSIS: a new extensible IP signaling protocol suite.
IEEE Commun. Mag., 2005

Voice over wireless LAN: a fine-scalable channel-adaptive speech coding scheme.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

Modeling Route Change in Soft-State Signaling Protocols Using SDL: A Case of RSVP.
Proceedings of the SDL 2005: Model Driven, 2005

Modeling Soft State Protocols with SDL.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
A method for authentication and key exchange for seamless inter-domain handovers.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Implementation and Evaluation of the Cross-Application Signaling Protocol(CASP).
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

2003
Main issues in protocol testing.
Int. J. Softw. Tools Technol. Transf., 2003

An introduction to the testing and test control notation (TTCN-3).
Comput. Networks, 2003

Teleteaching an der Universität Göttingen: Systemarchitektur und Problematiken.
Proceedings of the DeLFI 2003, 2003

2002
SDL- and MSC-Based Specification and Automated Test Case Generation for INAP.
Telecommun. Syst., 2002

2001
Some Implications of MSC, SDL and TTCN Time Extensions for Computer-Aided Test Generation.
Proceedings of the SDL 2001: Meeting UML, 2001

2000
On the Design of the New Testing Language TTCN-3.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000

1999
SDL and MSC based test generation for distributed test architectures.
Proceedings of the SDL '99 The Next Millennium, 1999

Towards the Third Edition of TTCN.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

1998
Autolink: A Tool for Automatic Test Generation from SDL Specifications.
Proceedings of the 2nd Workshop on Industrial-Strength Formal Specification Techniques (WIFT '98), 1998

Autolink - Putting SDL-Based Test Generation Into Practice.
Proceedings of the Testing of Communicating Systems, IFIP TC6 11th International Workshop on Testing Communicating Systems (IWTCS), August 31, 1998

Enhancing the Reliability of Internet Based Teleteaching Applications through the Combined Use of ISDN and Internet.
Proceedings of the Teleteaching '98 - Distance Learning, 1998

Revised Comparison of an Automatically Generated and a Manually Specified Abstract Test Suite for the B-ISDN Protocol SSCOP.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1998

1997
Towards the industrial use of validation techniques and automatic test generation methods for SDL specifications.
Proceedings of the SDL '97 Time for Testing, 1997

-Autolink- A Tool for the Automatic and Semi-Automatic Test Generation.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1997

1996
Validation of SDL Systems.
Comput. Networks ISDN Syst., 1996

1994
Die SAMSTAG Methode und ihre Rolle im Konformitätstesten.
Prax. Inf.verarb. Kommun., 1994

1993
Entwurf von virtuell privaten Netzen.
Proceedings of the Kommunikation in Verteilten Systemen, 1993

1992
Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN).
Prax. Inf.verarb. Kommun., 1992

Formal Methods in Conformance Testing: Status and Expectations.
Proceedings of the Protocol Specification, 1992

1991
Hierarchical Performance Evaluation Based on Formally Specified Communication Protocols.
IEEE Trans. Computers, 1991

Session on Conformance Requirements and Test Purposes in the Context of Formal Methods.
Proceedings of the Protocol Test Systems, IV, 1991

On the Development of a Standard for Conformance Testing Based on Formal Specifictations.
Proceedings of the Protocol Test Systems, IV, 1991

The 5 ODP Viewpoints on the Schindler Group.
Proceedings of the Open Distributed Processing: Proceedings of the IFIP TC6/WG6.4 International Workshop on Open Distributed Processing, 1991

Konformitätstesten basierend auf formalen Spezifikationen.
Proceedings of the Kommunikation in Verteilten Systemen, 1991

SDL - with applications from protocol specification.
BCS practitioner series, Prentice Hall, ISBN: 978-0-13-785890-3, 1991

1990
Conformance Testing Based on Formal Methods.
Proceedings of the Formal Description Techniques, 1990

1989
The CCITT-Specification and Description Language SDL.
Comput. Networks, 1989

Konstruktive Qualitätssicherungsmaßnahmen für Dienst- und Protokollspezifikationen.
Proceedings of the Kommunikation in Verteilten Systemen, 1989

1988
OSI service specification with CCITT-SDL.
Comput. Commun. Rev., 1988

Non-Determinism and SDL.
Proceedings of the Formal Description Techniques, 1988

Modelling OSI in SDL.
Proceedings of the Formal Description Techniques, 1988

1985
Über hierarchisch konstruierte Modelle und deren Simulation: systemtheoret. Aspekte.
PhD thesis, 1985


  Loading...