Volker Fusenig

According to our database1, Volker Fusenig authored at least 19 papers between 2006 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Using Trusted Platform Modules for Location Assurance in Cloud Networking.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Security architecture for cloud networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

N-ary tree based key distribution in a network as a service provisioning model.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Cloud networking: An infrastructure service architecture for the wide area.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

2011
Verification of Data Location in Cloud Networking.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

2010
Challenges for Cloud Networking Security.
Proceedings of the Mobile Networks and Management - Second International ICST Conference, 2010

2009
Anonymity and Unlinkability in Electronic Communications.
PhD thesis, 2009

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Threat-model-driven runtime adaptation and evaluation of intrusion detection system.
Proceedings of the 6th International Conference on Autonomic Computing, 2009

Slotted Packet Counting Attacks on Anonymity Protocols.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Anonymous Communication in Multi Hop Wireless Networks.
J. Res. Pract. Inf. Technol., 2008

Unlinkable Communication.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Trust-Aided Acquisition Of Unverifiable Information.
Proceedings of the ECAI 2008, 2008

Towards Trust-Based Acquisition of Unverifiable Information.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

Acimn: A protocol for Anonymous Communication In Multi hop wireless networks.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Mobility diversifies Trust: Introducing TrustRings.
Proceedings of the Wireless Telecommunications Symposium, 2007

Acimn protocol: A protocol for anonymous communication in multi hop wireless networks.
Proceedings of the Wireless Telecommunications Symposium, 2007

2006
Trust-decisions on the base of maximal information of recommended direct-trust.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

How Certain is Recommended Trust-Information.
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006


  Loading...