Elke Franz

Affiliations:
  • TU Dresden, Faculty of Computer Science, Germany


According to our database1, Elke Franz authored at least 56 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Trust-Based Adaptive Routing for NoCs.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023

Enhancing Robustness and Reliability of Networks-on-Chip with Network Coding.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2023

2022
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism.
Proceedings of the 33rd IEEE International Conference on Application-specific Systems, 2022

2020
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Efficient Confidentiality for Network Coded Distributed Storage.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Lightweight Authenticated Encryption for Network-on-Chip Communications.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

2018
Improving Quantization for Channel Reciprocity based Key Generation.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Protecting Communication in Many-Core Systems against Active Attackers.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

2017
Secure and energy-efficient interconnects for board-to-board communication.
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017

Security aspects of confidential network coding.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer.
Proceedings of the 24th High Performance Computing Symposium, 2016

eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Resilient and efficient communication in many-core systems using network coding.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

A Metric for Adaptive Routing on Trustworthy Paths.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Confidential Network Coding: Physical Layer vs. Network Layer.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Energy Models for Communication of Future Computing Platforms.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

2014
Adjustable redundancy for secure network coding in a unicast scenario.
Proceedings of the International Symposium on Network Coding, 2014

Modeling communication delays for network coding and routing for error-prone transmission.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

Analysis of Parallel Applications on a High Performance-Low Energy Computer.
Proceedings of the Euro-Par 2014: Parallel Processing Workshops, 2014

2013
A conceptual framework for designing mHealth solutions for developing countries.
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, 2013

Secure network coding: Dependency of efficiency on network topology.
Proceedings of IEEE International Conference on Communications, 2013

Protection of consumer data in the smart grid compliant with the German smart metering guideline.
Proceedings of the SEGS'13, 2013

Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013

Comparison of different secure network coding paradigms concerning transmission efficiency.
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013

2012
Enhancing privacy in social applications with the notion of group context.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Efficiency of Secure Network Coding Schemes.
Proceedings of the Communications and Multimedia Security, 2012

2011
Collaborative E-Learning.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

2009
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms.
Proceedings of the Trust, 2009

Improved embedding based on a set of cover images.
Proceedings of the Multimedia and Security Workshop, 2009

2008
Embedding considering dependencies between pixels.
Proceedings of the Security, 2008

A Comprehensive Approach for Context-dependent Privacy Management.
Proceedings of the The Third International Conference on Availability, 2008

2007
Forensics for flatbed scanners.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Privacy-aware user interfaces within collaborative environments.
Proceedings of the 2006 AVI Workshop on Context in advanced interfaces, 2006

Access Control in a Privacy-Aware eLearning Environment.
Proceedings of the The First International Conference on Availability, 2006

Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects.
Proceedings of the The First International Conference on Availability, 2006

2005
Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen.
Inform. Spektrum, 2005

Towards Privacy-Aware eLearning.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Pre-processing for Adding Noise Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Usable presentation of secure pseudonyms.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

Tailored Responsibility Within Component-Based Systems.
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005

2004
Adaptive steganography based on dithering.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Adapting Component Models to Support Responsibility.
Proceedings of the International Symposium on Leveraging Applications of Formal Methods, 2004

2003
COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit.
Inform. Forsch. Entwickl., 2003

2002
Steganographie durch Nachbildung plausibler Änderungen.
PhD thesis, 2002

Steganography Preserving Statistical Properties.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Steganographie unter Erhalt statistischer Merkmale.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

1999
Geschäftsmodelle für Watermarking.
Datenschutz und Datensicherheit, 1999

Steganography Secure against Cover-Stego-Attacks.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas.
Inform. Spektrum, 1998

A Payment Scheme for Mixes Providing Anonymity.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

A Mix-Mediated Anonymity Service and Its Payment.
Proceedings of the Computer Security, 1998

Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

Systematisierung und Modellierung von Mixen.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1996
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996


  Loading...