Roman Schlegel

According to our database1, Roman Schlegel authored at least 24 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Privacy-Preserving Location Sharing Services for Social Networks.
IEEE Trans. Serv. Comput., 2017

A security evaluation of IEC 62351.
J. Inf. Secur. Appl., 2017

2015
User-Defined Privacy Grid System for Continuous Location-Based Services.
IEEE Trans. Mob. Comput., 2015

Private friends on a social networking site operated by an overly curious SNP.
Int. J. Comput. Sci. Eng., 2015

A Framework for Incident Response in Industrial Control Systems.
Proceedings of the SECRYPT 2015, 2015

Structured system threat modeling and mitigation analysis for industrial automation systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Cyber Security Maintenance for SCADA Systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Assessing the Security of IEC 62351.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
ReDS: A Framework for Reputation-Enhanced DHTs.
IEEE Trans. Parallel Distributed Syst., 2014

Automatic attack surface reduction in next-generation industrial control systems.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Reflection or action?: how feedback and control affect location sharing decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptol. ePrint Arch., 2013

Secure design of engineering software tools in Industrial Automation and Control Systems.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

2012
Anonymous overlay network supporting authenticated routing.
Inf. Sci., 2012

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
An efficient routing protocol for anonymous networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing.
IACR Cryptol. ePrint Arch., 2009

Monotonically Increasing Bit Vector for Authenticated Anonymous Routing.
Proceedings of the Communication and Networking, 2009

2008
On Spam over Internet Telephony (SPIT) Prevention.
IEEE Commun. Mag., 2008

2006
SPam over Internet Telephony (SPIT) Prevention Framework.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Enforcing Email Addresses Privacy Using Tokens.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...