Hans-Joachim Hof

Orcid: 0000-0002-6930-9271

Affiliations:
  • Technical University of Ingolstadt, Germany


According to our database1, Hans-Joachim Hof authored at least 36 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security architecture for automotive communication networks with CAN FD.
Comput. Secur., June, 2023

2022
Inclusive Security by Design.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

2021
Überwachung in modernen Fahrzeugen.
Datenschutz und Datensicherheit, 2021

A generalized approach to automotive forensics.
Digit. Investig., 2021

Presentation of the Programme of the 6th GI/ACM Standardization Workshop on Industrial Automation and Control Systems.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

2020
The 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

2019
4th GI/ACMWorkshop on Standardization of I4.0 Automation and Control Systems.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft, INFORMATIK 2019, 2019

2016
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication.
CoRR, 2016

POSTER: Security Design Patterns With Good Usability.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Hybrid solutions for data dissemination in vehicular networks.
Proceedings of the 2016 Wireless Days, 2016

2015
Fighting Spam by Breaking the Econonmy of Advertisment by Unsolicited Emails.
CoRR, 2015

Overview on Security Approaches in Intelligent Transportation Systems.
CoRR, 2015

BREW: A Breakable Web Application for IT-Security Classroom Use.
CoRR, 2015

Apate - A Linux Kernel Module for High Interaction Honeypots.
CoRR, 2015

Secure Scrum: Development of Secure Software with Scrum.
CoRR, 2015

The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications.
CoRR, 2015

User-Centric IT Security - How to Design Usable Security Mechanisms.
CoRR, 2015

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption.
CoRR, 2015

ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments.
CoRR, 2015

Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility.
CoRR, 2015

B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Enabling Digital Transformation Using Secure Decisions as a Service.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2015

2014
Practical limitations of technical privacy protection.
Datenschutz und Datensicherheit, 2014

2010
Security Design for Industrial Sensor Networks (Sicherheit für industrielle Sensornetze).
it Inf. Technol., 2010

Industrial Sensor Network Security Architecture.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2009
Design and evaluation of a security architecture for ad hoc networks.
Int. J. Pervasive Comput. Commun., 2009

Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Sichere Dienste-Suche in Sensornetzen.
PhD thesis, 2008

2007
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

A Generic, Self-organizing, and Distributed Bootstrap Service for Peer-to-Peer Networks.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

Applications of Sensor Networks.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

2005
SCAN: A secure service directory for service-centric wireless sensor networks.
Comput. Commun., 2005

2004
A Cluster-Based Security Architecture for Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A General Architecture for Wireless Sensor Networks: First Steps.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Design of a Secure Distributed Service Directory for Wireless Sensornetworks.
Proceedings of the Wireless Sensor Networks, First European Workshop, 2004

Secure Overlay for Service Centric Wireless Sensor Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004


  Loading...