Klaus Wehrle

Orcid: 0000-0001-7252-4186

Affiliations:
  • RWTH Aachen University, Germany


According to our database1, Klaus Wehrle authored at least 328 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Interdisciplinary Survey on Information Flows in Supply Chains.
ACM Comput. Surv., February, 2024

Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs.
IEEE Access, 2024

2023
Offering Two-way Privacy for Evolved Purchase Inquiries.
ACM Trans. Internet Techn., November, 2023

When and How to Aggregate Message Authentication Codes on Lossy Channels?
IACR Cryptol. ePrint Arch., 2023

Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication.
CoRR, 2023

SoK: Evaluations in Industrial Intrusion Detection Research.
CoRR, 2023

Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation.
CoRR, 2023

Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead.
CoRR, 2023

Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Delay-aware Model Predictive Control for Fast Frequency Control.
Proceedings of the IEEE International Conference on Communications, 2023

FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

ECN with QUIC: Challenges in the Wild.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Does It Spin? On the Adoption and Use of QUIC's Spin Bit.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Accountable Processing of Reported Street Problems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking.
Proceedings of the Advanced Information Systems Engineering, 2023

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Computer Science Perspective on Digital Transformation in Production.
ACM Trans. Internet Things, 2022

Complying With Data Handling Requirements in Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2022

Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

BP-MAC: Fast Authentication for Short Messages.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

On the need for strong sovereignty in data ecosystems.
Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB 2022), 2022

Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance.
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022

Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Evolving the End-to-End Transport Layer in Times of Emerging Computing In The Network (COIN).
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Scalable and Privacy-Focused Company-Centric Supply Chain Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Can Industrial Intrusion Detection Be SIMPLE?
Proceedings of the Computer Security - ESORICS 2022, 2022

A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web.
ACM Trans. Web, 2021

CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively.
IEEE Trans. Netw. Serv. Manag., 2021

Challenges and Opportunities in Securing the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability.
Inf. Process. Manag., 2021

Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation.
ERCIM News, 2021

Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use.
CoRR, 2021

Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing.
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021

Sharding and HTTP/2 connection reuse revisited: why are there still redundant connections?
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Tofino + P4: A Strong Compound for AQM on High-Speed Networks?
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Investigating the Applicability of In-Network Computing to Industrial Scenarios.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

Service-based Forwarding via Programmable Dataplanes.
Proceedings of the 22nd IEEE International Conference on High Performance Switching and Routing, 2021

Data Reliability and Trustworthiness Through Digital Transmission Contracts.
Proceedings of the Semantic Web - 18th International Conference, 2021

Tracking the QUIC spin bit on Tofino.
Proceedings of the EPIQ '21: Proceedings of the 2021 Workshop on Evolution, 2021

Determination of throughput guarantees for processor-based SmartNICs.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

L, Q, R, and T: which spin bit cousin is here to stay?
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
FactDAG: Formalizing Data Interoperability in an Internet of Production.
IEEE Internet Things J., 2020

Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking.
IACR Cryptol. ePrint Arch., 2020

Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Study on weld seam geometry control for connected gas metal arc welding systems<sup>*</sup>.
Proceedings of the 17th International Conference on Ubiquitous Robots, 2020

QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation.
Proceedings of the 2020 IFIP Networking Conference, 2020

How to Securely Prune Bitcoin's Blockchain.
Proceedings of the 2020 IFIP Networking Conference, 2020

Extending MUD to Smartphones.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

A Secure and Practical Decentralized Ecosystem for Shareable Education Material.
Proceedings of the 2020 International Conference on Information Networking, 2020

Private Multi-Hop Accountability for Supply Chains.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Putting Privacy into Perspective - Comparing Technical, Legal, and Users' View of Information Sensitivity.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

Secure End-to-End Sensing in Supply Chains.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Symbolic Partial-Order Execution for Testing Multi-Threaded Programs.
Proceedings of the Computer Aided Verification - 32nd International Conference, 2020

Privacy-Preserving Production Process Parameter Exchange.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Control of Networked Cyber-Physical Systems (Dagstuhl Seminar 19222).
Dagstuhl Reports, 2019

Putting Privacy into Perspective - Comparing Technical, Legal, and Users' View of Data Sensitivity.
CoRR, 2019

Blitz-starting QUIC Connections.
CoRR, 2019

Application-Agnostic Offloading of Packet Processing.
CoRR, 2019

The Dagstuhl beginners guide to reproducibility for experimental networking research.
Comput. Commun. Rev., 2019

DeePCCI: Deep Learning-based Passive Congestion Control Identification.
Proceedings of the 2019 Workshop on Network Meets AI & ML, 2019

Optimizing Data Plane Programs for the Network.
Proceedings of the ACM SIGCOMM 2019 Workshop on Networking and Programming Languages, 2019

Demystifying the Performance of XDP BPF.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Remote Knowledge System.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Dispute Resolution for Smart Contract-based Two-Party Protocols.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Enabling Wireless Network Support for Gain Scheduled Control.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019

Perceiving QUIC: do users notice or even care?
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

Online Reprogrammable Multi Tenant Switches.
Proceedings of the 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms, 2019

Towards Executing Computer Vision Functionality on Programmable Network Devices.
Proceedings of the 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms, 2019

Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP/2 vs. QUIC.
Proceedings of the Applied Networking Research Workshop, 2019

2018
Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks.
IEEE Trans. Veh. Technol., 2018

On Automated Memoization in the Field of Simulation Parameter Studies.
ACM Trans. Model. Comput. Simul., 2018

Secure and anonymous decentralized Bitcoin mixing.
Future Gener. Comput. Syst., 2018

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Application-Agnostic Offloading of Datagram Processing.
Proceedings of the 30th International Teletraffic Congress, 2018

Towards In-Network Industrial Feedback Control.
Proceedings of the 2018 Morning Workshop on In-Network Computing, 2018

Circuit Switched VM Networks for Zero-Copy IO.
Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks, 2018

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

PARTI: a multi-interval theory solver for symbolic execution.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Demo abstract: Towards in-network processing for low-latency industrial control.
Proceedings of the IEEE INFOCOM 2018, 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Giving Customers Control Over Their Data: Integrating a Policy Language into the Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Smart Contract-Based Car Insurance Policies.
Proceedings of the IEEE Globecom Workshops, 2018

A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2018

SPLIT: Smart Protocol Loading for the IoT.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

A new solution for the Energy Packet-based Dispatching using power/signal dual modulation.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

Towards Benchmark Optimization by Automated Equivalence Detection.
Proceedings of the Workshop on Benchmarking Cyber-Physical Networks and Systems, 2018

Is the web ready for HTTP/2 server push?
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution.
Proceedings of the Workshop on the Evolution, 2018

Symbolic Liveness Analysis of Real-World Software.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Towards In-Network Security for Smart Homes.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive Mob. Comput., 2017

Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

TraceMixer: Privacy-preserving crowd-sensing sans trusted third party.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SymPerf: Predicting Network Function Performance.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Resource and Execution Control for Mobile Offloadee Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Encrypting data to pervasive contexts.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping.
Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Demo: a realistic use-case for wireless industrial automation and control.
Proceedings of the 2017 International Conference on Networked Systems, 2017

Floating-point symbolic execution: a case study in n-version programming.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

Automated memoization: Automatically identifying memoization units in simulation parameter studies.
Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2017

Privacy-Preserving HMM Forward Computation.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Dynamic algorithm selection for the logic of tasks in IoT stream processing systems.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Parallel Expanded Event Simulation of Tightly Coupled Systems.
ACM Trans. Model. Comput. Simul., 2016

A comprehensive approach to privacy in the cloud-based Internet of Things.
Future Gener. Comput. Syst., 2016

Network Latency Control in Data Centres (Dagstuhl Seminar 16281).
Dagstuhl Reports, 2016

Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks.
CoRR, 2016

The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud.
CoRR, 2016

CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Performance analysis of cooperative ARQ systems for wireless industrial networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Maintaining integrity and reputation in content offloading.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

Automated Memoization for Parameter Studies Implemented in Impure Languages.
Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation, 2016

STEAN: A storage and transformation engine for advanced networking context.
Proceedings of the 2016 IFIP Networking Conference, 2016

Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

ReMP TCP: Low latency multipath TCP.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

EEG-based automatic emotion recognition: Feature extraction, selection and classification methods.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Modular remote reprogramming of sensor nodes.
Int. J. Sens. Networks, 2015

Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Santa: Faster Packet Delivery for Commonly Wished Replies.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Enabling ubiquitous interaction with smart things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Towards Bringing EEG Research and Diagnostics out of the Lab.
Proceedings of the pHealth 2015, 2015

Psychologist in a Pocket: Towards Depression Screening on Mobile Phones.
Proceedings of the pHealth 2015, 2015

Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation.
Proceedings of the 3rd ACM Conference on SIGSIM-Principles of Advanced Discrete Simulation, London, United Kingdom, June 10, 2015

Data Dependency based Parallel Simulation of Wireless Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Collaborative On-demand Wi-Fi sharing.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Protocol virtualization through dynamic network stacks.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Channel Coding versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

If You Can't Take the Heat: Temperature Effects on Low-Power Wireless Networks and How to Mitigate Them.
Proceedings of the Wireless Sensor Networks - 12th European Conference, 2015

Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

CoinParty: Secure Multi-Party Mixing of Bitcoins.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Privacy in the Internet of Things: threats and challenges.
Secur. Commun. Networks, 2014

Probabilistic location-free addressing in wireless networks.
J. Netw. Comput. Appl., 2014

POSTER: Privacy-preserving Indoor Localization.
CoRR, 2014

Enabling Distributed Simulation of OMNeT++ INET Models.
CoRR, 2014

HotBox: Testing Temperature Effects in Sensor Networks.
CoRR, 2014

Harnessing cross-layer-design.
Ad Hoc Networks, 2014

CA-Fi: Ubiquitous mobile wireless networking without 802.11 overhead and restrictions.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Pervasive content-centric wireless networking.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Large-scale network simulation: leveraging the strengths of modern SMP-based compute clusters.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Delegation-based authentication and authorization for the IP-based Internet of Things.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Facilitating direct and ubiquitous mobile computer vision.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Demo: Ubiquitous interaction with smart objects.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Opportunistic interaction in the challenged internet of things.
Proceedings of the 9th ACM MobiCom workshop on Challenged networks, 2014

A framework for remote automation, configuration, and monitoring of real-world experiments.
Proceedings of the 9th ACM international workshop on Wireless network testbeds, 2014

A wireless application overlay for ubiquitous mobile multimedia sensing and interaction.
Proceedings of the Multimedia Systems Conference 2014, 2014

High-Performance, Energy-Efficient Mobile Wireless Networking in 802.11 Infrastructure Mode.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Piccett: Protocol-independent classification of corrupted error-tolerant traffic.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

SCSlib: Transparently Accessing Protected Sensor Data in the Cloud.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Graph-based redundancy removal approach for multiple cross-layer interactions.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

A Trust Point-based Security Architecture for Sensor Data in the Cloud.
Proceedings of the Trusted Cloud Computing, 2014

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
Proceedings of the Trusted Cloud Computing, 2014

2013
"And Then, the Weekend Started": Story of a WSN Deployment on a Construction Site.
J. Sens. Actuator Networks, 2013

Portable wireless-networking protocol evaluation.
J. Netw. Comput. Appl., 2013

Accurate map-based indoor navigation on the mobile.
J. Locat. Based Serv., 2013

Maintaining User Control While Storing and Processing Sensor Data in the Cloud.
Int. J. Grid High Perform. Comput., 2013

Support for Error Tolerance in the Real-Time Transport Protocol.
CoRR, 2013

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
CoRR, 2013

Cooperative security in distributed networks.
Comput. Commun., 2013

A blueprint for switching between secure routing protocols in wireless multihop networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Fuzzy logical coordinates and location services for scalable addressing in wireless networks.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

A heuristic header error recovery scheme for RTP.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

The Cloud Needs Cross-Layer Data Handling Annotations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Opening the loops - Towards semantic, information-centric networking in the Internet of Things.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Interest-based cloud-facilitated opportunistic networking.
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks, 2013

Bit error distribution and mutation patterns of corrupted packets in low-power wireless networks.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Fingerprinting channel dynamics in indoor low-power wireless networks.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

4th international workshop on software engineering for sensor network applications (SESENA 2013).
Proceedings of the 35th International Conference on Software Engineering, 2013

Tailoring end-to-end IP security protocols to the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Standards-based end-to-end IP security for the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Towards Data Handling Requirements-Aware Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Gossipmule: Improving association decisions via opportunistic recommendations.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Demo: Improving associations in IEEE 802.11 WLANs.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
On-demand content-centric wireless networking.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

Exploiting the Burstiness of Intermediate-Quality Wireless Links.
Int. J. Distributed Sens. Networks, 2012

CRAWLER: An experimentation platform for system monitoring and cross-layer-coordination.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Building a modular BitTorrent model for ns-3.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

Know thy simulation model: analyzing event interactions for probabilistic synchronization in parallel simulations.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

FANTASY: fully automatic network emulation architecture with cross-layer support.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Multi-level Parallelism for Time- and Cost-Efficient Parallel Discrete Event Simulation on GPUs.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

An Adaptive Codec Switching Scheme for SIP-Based VoIP.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

Gossipmule: scanning and disseminating information between stations in cooperative WLANs.
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks, 2012

DHT-based localized service discovery in wireless mesh networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Hidden Markov model-based 3D path-matching using raytracing-generated Wi-Fi models.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

Indoor navigation on wheels (and on foot) using smartphones.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

Symbolic System Time in Distributed Systems Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Integration testing of protocol implementations using symbolic distributed execution.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2012

A Cloud design for user-controlled storage and processing of sensor data.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Security Challenges in the IP-based Internet of Things.
Wirel. Pers. Commun., 2011

WiSec 2011 demo: PISA-SA - security and mobility in a collaborative muni-fi.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Sensor network security for pervasive e-health.
Secur. Commun. Networks, 2011

Device driver-enabled wireless network emulation.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Runtime efficient event scheduling in multi-threaded network simulation.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

SliceTime: A Platform for Scalable and Accurate Network Emulation.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Establishing mobile ad-hoc networks in 802.11 infrastructure mode.
Proceedings of the 6th ACM workshop on Challenged networks, 2011

Establishing mobile ad-hoc networks in 802.11 infrastructure mode.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

TinyWiFi: making network protocol evaluation portable across multiple phy-link layers.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations.
Proceedings of the MASCOTS 2011, 2011

Cooperative Wi-Fi-sharing: Encouraging fair play.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

Efficient online estimation of bursty wireless links.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Probabilistic addressing: Stable addresses in unstable wireless networks.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

FootPath: Accurate map-based indoor navigation using smartphones.
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation, 2011

Scalable Symbolic Execution of Distributed Systems.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

GeoDTN: Geographic Routing in Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

Perfect difference sets for neighbor discovery: energy efficient and fair.
Proceedings of the 3rd Extreme Conference on Communication - The Amazon Expedition, 2011

Refector: heuristic header error recovery for error-tolerant transmissions.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Integrating symbolic execution with sensornet simulation for efficient bug finding.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

TinyOS meets wireless mesh networks.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Modular context-aware access control for medical sensor networks.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Brief announcement: distributed trust management and revocation.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Efficient and context-aware access control for pervasive medical sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

BurrowView - seeing the world through the eyes of rats.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Collaborative municipal Wi-Fi networks - challenges and opportunities.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Expanding the Event Horizon in Parallelized Network Simulations.
Proceedings of the MASCOTS 2010, 2010

KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

RatMote: a sensor platform for animal habitat monitoring.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Statistical vector based point-to-point routing in wireless networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Towards Network Centric Development of Embedded Systems.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Promoting Power to a First Class Metric in Network Simulations.
Proceedings of the ARCS '10, 2010

2009
Time accurate integration of software prototypes with event-based network simulations.
SIGMETRICS Perform. Evaluation Rev., 2009

Modeling Execution Time and Energy Consumption in Sensor Node Simulation.
Prax. Inf.verarb. Kommun., 2009

ProMoX: A protocol stack monitoring framework.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

A virtual platform for network experimentation.
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009

Bursty traffic over bursty links.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Security for pervasive healthcare.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Security for pervasive medical sensor networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

SimBetAge: Utilizing temporal changes in social networks for delay/disconnection tolerant networking.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Horizon - Exploiting timing information for parallel network simulation.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

A Performance Comparison of Recent Network Simulators.
Proceedings of IEEE International Conference on Communications, 2009

End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace.
Proceedings of IEEE International Conference on Communications, 2009

SimBetAge: utilizing temporal changes in social networks for pocket switched networks.
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, 2009

2008
Synchronized network emulation: matching prototypes with complex simulations.
SIGMETRICS Perform. Evaluation Rev., 2008

Clustering players for load balancing in virtual worlds.
Int. J. Adv. Media Commun., 2008

KleeNet: automatic bug hunting in sensor network applications.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Range queries and load balancing in a hierarchically structured P2P system.
Proceedings of the LCN 2008, 2008

ADAPT: A Semantics-Oriented Protocol Architecture.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

When Timing Matters: Enabling Time Accurate and Scalable Simulation of Sensor Network Applications.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

Secure Wi-Fi sharing at global scales.
Proceedings of the 2008 International Conference on Telecommunications, 2008

ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Peer-to-Peer Systems (Peer-to-Peer-Systeme).
it Inf. Technol., 2007

MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table).
it Inf. Technol., 2007

PISA: P2P Wi-Fi Internet Sharing Architecture.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
Proceedings of the Global Communications Conference, 2007

Cooperative security in distributed sensor networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Peer-to-Peer-Based Infrastructure Support for Massively Multiplayer Online Games.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards Scalable Mobility in Distributed Hash Tables.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

OCALA: An Architecture for Supporting Legacy Applications over Overlays.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

A churn and mobility resistant approach for DHTs.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System.
Proceedings of the LCN 2006, 2006

06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

06131 Executive Summary -- Peer-to-Peer-Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

2005
Enabling Detailed Modeling and Analysis of Sensor Networks.
Prax. Inf.verarb. Kommun., 2005

Introduction.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Distributed Hash Tables.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

What Is This <i>"Peer-to-Peer"</i> About?
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Reliability and Load Balancing in Distributed Hash Tables.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

T-DHT: Topology-based Distributed Hash Tables.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Peer-to-Peer in Mobile Environments.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Selected DHT Algorithms.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Framework for evaluation of networked mobile games.
Proceedings of the 4th Workshop on Network and System Support for Games, 2005

Transparent end-host-based service composition through network virtualization.
Proceedings of the First ACM International Workshop on Multimedia Service Composition, 2005

Überbrückung von Heterogenitäten im Internet aud der Basis von Indirektion.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Peer-to-Peer-Systeme und -Anwendungen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Dienstgüte in strukturierten hierarchischen Overlay Netzwerken.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

On the Distribution of Nodes in Distributed Hash Tables.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Spontaneous Windows File Sharing via Virtual Groups.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Bridging today's Internet Heterogeneity with a Content-oriented Approach.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

IP-QoS: Scalable and Flexible Quality-of-Service with Differentiated Services.
Proceedings of the Industrial Information Technology Handbook, 2005

2004
IP Multicast in Differentiated Services (DS) Networks.
RFC, April, 2004

Peer-to-Peer-Networking & -Computing - Aktuelles Schlagwort.
Inform. Spektrum, 2004

Support for service composition in <i>i3</i>.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

A Thermal-Dissipation-Based Approach for Balancing Data Load in Distributed Hash Tables.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Reliability of data in structured peer-to-peer systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

2003
A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services.
RFC, December, 2003

Ansätze für eine Web-basierte Initiierung qualitätsbasierter Kommunikationsdienste.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Alternative traffic conditioning mechanisms for the virtual wire per-domain behavior.
Proceedings of IEEE International Conference on Communications, 2003

2002
Flexible und skalierbare Dienstgütemechanismen für das Internet der nächsten Generation.
PhD thesis, 2002

DiffServ-basierte Dienstgüte im Internet der nächsten Generation.
Prax. Inf.verarb. Kommun., 2002

2001
Towards Better Support of Transaction Oriented Communication in Differentiated Services Networks.
Proceedings of the Quality of Future Internet Services, 2001

Improving the Performance of TCP on Guaranteed Bandwidth Connections.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers.
Proceedings of the Networking, 2001

Group Communication in Differentiated Services Networks.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Elements of an Open Framework for Pricing in the Future Internet.
Proceedings of the Quality of Future Internet Services, 2000

DiffServ in the Web: Different Approaches for Enabling Better Services in the Worl Wide Web.
Proceedings of the NETWORKING 2000, 2000


  Loading...