Diethelm Ostry

According to our database1, Diethelm Ostry authored at least 39 papers between 2006 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2019
Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Exploiting multiple side channels for secret key agreement in Wireless Networks.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

2017
An experimental study of secret key generation for passive Wi-Fi wearable devices.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Greening Router Line-Cards via Dynamic Management of Packet Memory.
IEEE J. Sel. Areas Commun., 2016

2014
Radio diversity for reliable communication in sensor networks.
ACM Trans. Sens. Networks, 2014

Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices.
IEEE Trans. Mob. Comput., 2014

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014

Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring.
Future Gener. Comput. Syst., 2014

2013
Acoustical ranging techniques in embedded wireless sensor networked devices.
ACM Trans. Sens. Networks, 2013

Nano-scale reservoir computing.
Nano Commun. Networks, 2013

A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks.
Comput. Secur., 2013

Securing data provenance in body area networks using lightweight wireless link fingerprints.
Proceedings of the TrustED'13, 2013

2012
Zero reconciliation secret key generation for body-worn health monitoring devices.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Authentication of lossy data in body-sensor networks for healthcare monitoring.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Decorrelating secret bit extraction via channel hopping in body area networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

2011
Secure Multihop Network Programming with Multiple One-Way Key Chains.
IEEE Trans. Mob. Comput., 2011

Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Improving the coverage range of ultrasound-based localization systems.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

TWEET: an envelope detection based broadband ultrasonic ranging system.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

Radio diversity for reliable communication in WSNs.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Characterization of Asymmetry in Low-Power Wireless Links: An Empirical Study.
Proceedings of the Distributed Computing and Networking - 12th International Conference, 2011

Improving secret key generation performance for on-body devices.
Proceedings of the 6th International Conference on Body Area Networks, 2011

2010
Safety assurance and rescue communication systems in high-stress environments: A mining case study.
IEEE Commun. Mag., 2010

Secure key loss recovery for network broadcast in single-hop wireless sensor networks.
Ad Hoc Networks, 2010

Long-range detection in acoustic sensor networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Packet pacing in small buffer optical packet switched networks.
IEEE/ACM Trans. Netw., 2009

Characterizing impulsive network traffic using truncated α-stable processes.
IEEE Commun. Lett., 2009

Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Characterization of link asymmetry in wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

2008
Secure multi-hop network programming with multiple one-way key chains.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A key loss recovery scheme for secure broadcasts in wireless sensor networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

2007
Confidential and Secure Broadcast in Wireless Sensor Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2006
Synthesis of accurate fractional Gaussian noise by filtering.
IEEE Trans. Inf. Theory, 2006

Packet Pacing in Short Buffer Optical Packet Switched Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006


  Loading...