Ronald Marx

According to our database1, Ronald Marx authored at least 17 papers between 2000 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Security Analysis of Software Defined Networking Applications for Monitoring and Measurement: sFlow and BigTap.
Proceedings of the 10th International Conference on Future Internet, 2015

2014
Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA).
J. ICT Stand., 2014

OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A mutual key agreement protocol to mitigate replaying attack in eXpressive Internet Architecture (XIA).
Proceedings of the 2014 ITU Kaleidoscope Academic Conference: Living in a converged world, 2014

Security of Selected Future Internet Architectures: A Survey.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Security Analysis of Security Applications for Software Defined Networks.
Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, Chiang Mai, Thailand, November 26, 2014

Security Analysis of Software Defined Networking Architectures: PCE, 4D and SANE.
Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, Chiang Mai, Thailand, November 26, 2014

2013
Bringing VoIP Signatures to Mobile Devices.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

2012
Threat Model Based Security Evaluation of Open Connectivity Services.
Proceedings of the Mobile Networks and Management - 4th International Conference, 2012

Trusted service access with dynamic security infrastructure configuration.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2010
A Service-Oriented Approach on Securing User Plane Traffic between NGN Security Domains.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Increasing Security and Privacy in User-centric Identity Management: The IdM Card Approach.
Proceedings of the 3PGCIC 2010, 2010

2008
Security Concept for Distributed Service Execution Environments.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2001
Log on education: Handheld devices are ready-at-hand.
Commun. ACM, 2001

2000
The three Ts of elementary education.
Commun. ACM, 2000

K-12 and the Internet.
Commun. ACM, 2000


  Loading...