Hans Löhr

Orcid: 0009-0000-5654-4275

According to our database1, Hans Löhr authored at least 31 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Browser-in-the-Middle - Evaluation of a modern approach to phishing.
Proceedings of the 16th European Workshop on System Security, 2023

2020
Softwarization of Automotive E/E Architectures: A Software-Defined Networking Approach.
Proceedings of the IEEE Vehicular Networking Conference, 2020

P4 In-Network Source Protection for Sensor Failover.
Proceedings of the 2020 IFIP Networking Conference, 2020

2018
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intell. Transp. Syst., 2018

2016
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.
Ad Hoc Networks, 2016

2015
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Decentralized enforcement of k-anonymity for location privacy using secret sharing.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Car-2-X.
Proceedings of the Handbuch Fahrerassistenzsysteme, 2015

2014
A trusted versioning file system for passive mobile storage devices.
J. Netw. Comput. Appl., 2014

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

2012
Privacy-preserving protocols and applications for trusted platforms
PhD thesis, 2012

Flexible patient-controlled security for electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch., 2011

A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011

Securing the Access to Electronic Health Records on Mobile Phones.
Proceedings of the Biomedical Engineering Systems and Technologies, 2011

2010
Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Anonymous Authentication with TLS and DAA.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Securing the e-health cloud.
Proceedings of the ACM International Health Informatics Symposium, 2010

Trusted virtual domains on OpenSolaris: usable secure desktop environments.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

Patterns for Secure Boot and Secure Storage in Computer Systems.
Proceedings of the ARES 2010, 2010

2009
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009

TruWallet: trustworthy and migratable wallet-based web authentication.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

2007
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Enhancing Grid Security Using Trusted Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A protocol for property-based attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006


  Loading...