Jan Henrik Ziegeldorf

According to our database1, Jan Henrik Ziegeldorf authored at least 23 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy.
PhD thesis, 2018

Secure and anonymous decentralized Bitcoin mixing.
Future Generation Comp. Syst., 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
TraceMixer: Privacy-preserving crowd-sensing sans trusted third party.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Resource and Execution Control for Mobile Offloadee Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

Privacy-Preserving HMM Forward Computation.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

CoinParty: Secure Multi-Party Mixing of Bitcoins.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Privacy in the Internet of Things: threats and challenges.
Security and Communication Networks, 2014

2013
Securing the IP-based internet of things with HIP and DTLS.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Tailoring end-to-end IP security protocols to the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

HIP Security Architecture for the IP-Based Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2008
Data-Mining-Cup 2007.
Informatik Spektrum, 2008


  Loading...