Michael Roßberg

Orcid: 0009-0002-0749-5336

Affiliations:
  • TU Ilmenau, Institute of Computer Science


According to our database1, Michael Roßberg authored at least 46 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Virtual Private Networks in the Quantum Era: A Security in Depth Approach.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Increasing Resilience of SD-WAN by Distributing the Control Plane.
Proceedings of the 14th International Conference on Network of the Future, 2023

Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice Calls.
SN Comput. Sci., 2022

2021
Towards a Realistic Maximum Flow Model in Hybrid Multi-Channel Wireless Mesh Networks.
Proceedings of the 2021 Wireless Days, 2021

Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Demo: Leveraging SDN in Critical Infrastructures.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Robustness and Scalability Improvements for Distance Vector Routing in Large WMNs.
Proceedings of the 16th International Conference on Wireless and Mobile Computing, 2020

Improving Network-Assisted Roaming for Controller-Less Wi-Fi.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations.
Proceedings of the 2020 IFIP Networking Conference, 2020

Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks.
Proceedings of the 2020 IFIP Networking Conference, 2020

Vector packet encapsulation: the case for a scalable IPsec encryption protocol.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Robust and Scalable Routing in Wireless Mesh Networks Using Interference-Disjoint Backup Paths.
Proceedings of the 12th IFIP Wireless and Mobile Networking Conference, 2019

Towards a Security Architecture for Hybrid WMNs.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Strong Tenant Separation in Cloud Computing Platforms.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Towards a Flexible User-Space Architecture for High-Performance IEEE 802.11 Processing.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

A Comprehensive Framework to Evaluate Wireless Networks in Simulation and Real Systems.
Proceedings of the 22nd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2018

2017
Reducing call blocking rates for anonymous voice over IP communications.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks.
Proceedings of the IEEE International Conference on Communications, 2017

Secure Enrollment of Certificates Using Short PINs.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Automatic source code decomposition for privilege separation.
Proceedings of the 24th International Conference on Software, 2016

2015
On the resistance of overlay networks against bandwidth exhaustion attacks.
Telecommun. Syst., 2015

Dominating an s-t-Cut in a Network.
Proceedings of the SOFSEM 2015: Theory and Practice of Computer Science, 2015

Program partitioning based on static call graph analysis for privilege separation.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Towards a model for global-scale backbone networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Towards distributed geolocation by employing a delay-based optimization scheme.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
Automatic VPN-Configuration with SOLID.
Prax. Inf.verarb. Kommun., 2013

Towards trustworthy mobile social networking services for disaster response.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Scalable Multipath Exploration in Ad-Hoc Networks.
Proceedings of the 2013 Conference on Networked Systems, 2013

Bounds for the Security of the Vivaldi Network Coordinate System.
Proceedings of the 2013 Conference on Networked Systems, 2013

Distributed monitoring of self-configuring Virtual Private Networks.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks.
Proceedings of IEEE International Conference on Communications, 2013

On distributed geolocation by employing spring-mass systems.
Proceedings of the Global Information Infrastructure Symposium, 2013

Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes.
Proceedings of the CCSW'13, 2013

2012
Automatic creation of VPN backup paths for improved resilience against BGP-attackers.
Proceedings of the ACM Symposium on Applied Computing, 2012

Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Attack-Resistant Distributed Time Synchronization for Virtual Private Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Skalierbare Autokonfiguration sabotageresistenter virtueller privater Netze.
PhD thesis, 2011

A survey on automatic configuration of virtual private networks.
Comput. Networks, 2011

2010
Distributed Automatic Configuration of Complex IPsec-Infrastructures.
J. Netw. Syst. Manag., 2010

Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management.
Proceedings of the ISSE 2010, 2010

2009
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays.
Proceedings of IEEE International Conference on Communications, 2009

2008
Credential Management for Automatic Identification Solutions in Supply Chain Management.
IEEE Trans. Ind. Informatics, 2008

2007
Using recurring costs for reputation management in peer-to-peer streaming systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007


  Loading...