Jens Hiller

Orcid: 0000-0001-9067-8410

According to our database1, Jens Hiller authored at least 29 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Improving functionality, efficiency, and trustworthiness of secure communication on an Internet diversified by mobile devices and the Internet of Things.
PhD thesis, 2023

2022
Complying With Data Handling Requirements in Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2022

Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

2020
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
Comput. Commun. Rev., 2020

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Application-Agnostic Offloading of Packet Processing.
CoRR, 2019

The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Remote Knowledge System.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

Application-Agnostic Offloading of Datagram Processing.
Proceedings of the 30th International Teletraffic Congress, 2018

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Giving Customers Control Over Their Data: Integrating a Policy Language into the Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2018

SPLIT: Smart Protocol Loading for the IoT.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

2016
CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2013
End-to-End Security for Internet-Connected Smart Objects.
Prax. Inf.verarb. Kommun., 2013

6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Tailoring end-to-end IP security protocols to the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013


  Loading...