Alf Zugenmaier

According to our database1, Alf Zugenmaier authored at least 33 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evaluating the evaluation criteria for account-recovery procedures in passwordless authentication.
Proceedings of the Open Identity Summit 2024, Porto, Portugal, June 20-21, 2024, 2024

2019
Securing the Precision Time Protocol (PTP) Against Fake Timestamps.
IEEE Commun. Lett., 2019

2018
3GPP 5G Security.
J. ICT Stand., 2018

The Impact of Uncle Rewards on Selfish Mining in Ethereum.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2015
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2012
Network virtualization: a hypervisor for the internet?
IEEE Commun. Mag., 2012

2011
Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces.
Proceedings of the Security Protocols XIX, 2011

2010
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing.
Comput. Commun., 2010

2009
Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS).
Secur. Commun. Networks, 2008

Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
Proceedings of the Trust, 2008

2007
Anchor-Less Secure Session Mobility.
Proceedings of the Security Protocols, 2007

Anchor-Less Secure Session Mobility (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Safeguarding Personal Data using Rights Management in Distributed Applications.
Proceedings of the New Approaches for Security, 2007

Security in Pervasive Computing Calling for new Security Principles.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Travelling without Moving: 802.11 Access Points backed by Secure NETLMM.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Countering Automated Exploits with System Security CAPTCHAS.
Proceedings of the Security Protocols, 2005

Countering Automated Exploits with System Security CAPTCHAS.
Proceedings of the Security Protocols, 2005

Look Who's Talking - Authenticating Service Access Points.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Privacy, Control and Internet Mobility.
Proceedings of the Security Protocols, 2004

Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

FLASCHE - A Mechanism Providing Anonymity for Mobile Users.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2003
Anonymität für Benutzer mobiler Geräte durch Ortsadressierung = Anonymity for users of mobile devices through location addressing.
PhD thesis, 2003

The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Personalization through Mask Marketing.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

The Freiburg privacy diamond.
Proceedings of the Global Telecommunications Conference, 2003

2001
Verbindlichkeit durch netzinterne Sicherheitsdienste (Reaching Accountability by Security Services inside Networks).
Informationstechnik Tech. Inform., 2001

Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks.
Proceedings of the Networking, 2001

1999
Architekturen für mehrseitige sichere Telekommunikationsnetze.
Proceedings of the Informatik '99, 1999


  Loading...