Dirk Westhoff

According to our database1, Dirk Westhoff authored at least 75 papers between 1999 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Short Paper: Debating Ethics with Cybersecurity Students.
Proceedings of the Sicherheit, 2022

2020
Approach for GDPR Compliant Detection of COVID-19 Infection Chains.
CoRR, 2020

Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Private Set Relations with Bloom Filters for Outsourced SLA Validation.
IACR Cryptol. ePrint Arch., 2019

Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets.
Proceedings of the Third Central European Cybersecurity Conference, 2019

2018
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility.
Int. J. Cyber Warf. Terror., 2018

Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Survey on covert channels in virtual machines and cloud computing.
Trans. Emerg. Telecommun. Technol., 2017

Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's Credit Scheduler.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices.
Proceedings of the Innovations for Community Services - 16th International Conference, 2016

Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for Prosumer Markets.
Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015

Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes.
Proceedings of the 15th International Conference on Innovations for Community Services, 2015

A privacy-friendly smart metering architecture with few-instance storage.
Proceedings of the 15th International Conference on Innovations for Community Services, 2015

2014
Portrait: Arbeitsgruppe IT-Sicherheit, Hochschule Furtwangen (HFU).
Prax. Inf.verarb. Kommun., 2014

Curtailing privilege escalation attacks over asynchronous channels on Android.
Proceedings of the 14th International Conference on Innovations for Community Services, 2014

Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption.
Proceedings of the 14th International Conference on Innovations for Community Services, 2014

C<sup>3</sup>-Sched - A cache covert channel robust cloud computing scheduler.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

Malleability resilient (premium) Concealed Data Aggregation.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

QuantDroid: Quantitative approach towards mitigating privilege escalation on Android.
Proceedings of IEEE International Conference on Communications, 2013

2012
Data obfuscation with network coding.
Comput. Commun., 2012

Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture.
Proceedings of the SECRYPT 2012, 2012

Simulation study on code attestation with compressed instruction code.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A leaky bucket called smartphone.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A Smartphone Security Architecture for App Verification and Process Authentication.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Dependable Over-the-Air Programming.
Ad Hoc Sens. Wirel. Networks, 2011

Resilient data aggregation for unattended WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Code Attestation with Compressed Instruction Code.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011

An MTM based Watchdog for Malware Famishment in Smartphones.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011

2010
A Survey on the Encryption of Convergecast Traffic with In-Network Processing.
IEEE Trans. Dependable Secur. Comput., 2010

Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen).
it Inf. Technol., 2010

When Eco-IT meets security: Concealed network coding for multicast traffic.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper).
IACR Cryptol. ePrint Arch., 2009

Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
CoRR, 2009

Initial observations on economics, pricing, and penetration of the internet of things market.
Comput. Commun. Rev., 2009

A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Security enhanced multi-hop over the air reprogramming with Fountain Codes.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Using Merkle's Puzzle for key agreement with low-end devices.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
eIDs und Identitätsmanagement.
Datenschutz und Datensicherheit, 2008

A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing.
Comput. Commun., 2008

A secure and resilient WSN roadside architecture for intelligent transport systems.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Concrete Security for Entity Recognition: The Jane Doe Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks.
Ad Hoc Networks, 2007

Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

2006
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation.
IEEE Trans. Mob. Comput., 2006

Routing and Self-organization in IP based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen).
it Inf. Technol., 2006

Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
On digital signatures in ad hoc networks.
Eur. Trans. Telecommun., 2005

Estimating the value of co-operation approaches for multi-hop ad hoc networks.
Ad Hoc Networks, 2005

Secure Comparison of Encrypted Data in Wireless Sensor Networks.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Recognition in a Low-Power Environment.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2005

Entity Recognition for Sensor Network Motes.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

2004
QoS-Differentiated Secure Charging in Ad-Hoc Environments.
Proceedings of the Telecommunications and Networking, 2004

Linking Ad Hoc Charging Schemes to AAAC Architectures.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

2003
About the impact of co-operation approaches for Ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

IPonAir - Drahtloses Internet der nächsten Generation.
Prax. Inf.verarb. Kommun., 2003

Anmerkungen zur Nutzung digitaler Signaturen in Ad Hoc Netzwerken.
Prax. Inf.verarb. Kommun., 2003

Charging support for ad hoc stub networks.
Comput. Commun., 2003

Identity certified authentication for ad-hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Zero Common-Knowledge Authentication for Pervasive Networks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

A Low-Cost Packet Originator Verification for Metering at Access-Routers.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

2002
Context aware detection of selfish nodes in DSR based ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code
Int. J. Softw. Eng. Knowl. Eng., 2001

Scalable Anonymous Connections in the Context of MIP and AAA.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Charging related mobile Device Authentication.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
Ein dezentrales Agentensystem unter Berücksichtigung von mehrseitiger Sicherheit.
PhD thesis, 2000

1999
Protecting a Mobile Agent's Route against Collusions.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Methods for Protecting a Mobile Agent's Route.
Proceedings of the Information Security, Second International Workshop, 1999


  Loading...