Martin Henze

According to our database1, Martin Henze authored at least 40 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Accounting for Privacy in the Cloud Computing Landscape.
PhD thesis, 2018

Secure and anonymous decentralized Bitcoin mixing.
Future Generation Comp. Syst., 2018

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Towards In-Network Security for Smart Homes.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive and Mobile Computing, 2017

Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

TraceMixer: Privacy-preserving crowd-sensing sans trusted third party.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Privacy-Preserving HMM Forward Computation.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
A comprehensive approach to privacy in the cloud-based Internet of Things.
Future Generation Comp. Syst., 2016

CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

CoinParty: Secure Multi-Party Mixing of Bitcoins.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Piccett: Protocol-independent classification of corrupted error-tolerant traffic.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

SCSlib: Transparently Accessing Protected Sensor Data in the Cloud.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Graph-based redundancy removal approach for multiple cross-layer interactions.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

A Trust Point-based Security Architecture for Sensor Data in the Cloud.
Proceedings of the Trusted Cloud Computing, 2014

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
Proceedings of the Trusted Cloud Computing, 2014

2013
Maintaining User Control While Storing and Processing Sensor Data in the Cloud.
IJGHPC, 2013

6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

The Cloud Needs Cross-Layer Data Handling Annotations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Towards Data Handling Requirements-Aware Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A Cloud design for user-controlled storage and processing of sensor data.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012


  Loading...