Dirk Westhoff
According to our database1,
Dirk Westhoff
authored at least 75 papers
between 1999 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2022
Proceedings of the Sicherheit, 2022
2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
2018
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility.
Int. J. Cyber Warf. Terror., 2018
Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
Trans. Emerg. Telecommun. Technol., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices.
Proceedings of the Innovations for Community Services - 16th International Conference, 2016
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes.
Proceedings of the 15th International Conference on Innovations for Community Services, 2015
Proceedings of the 15th International Conference on Innovations for Community Services, 2015
2014
Prax. Inf.verarb. Kommun., 2014
Proceedings of the 14th International Conference on Innovations for Community Services, 2014
Proceedings of the 14th International Conference on Innovations for Community Services, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
QuantDroid: Quantitative approach towards mitigating privilege escalation on Android.
Proceedings of IEEE International Conference on Communications, 2013
2012
Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
2011
WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen).
it Inf. Technol., 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
CoRR, 2009
Initial observations on economics, pricing, and penetration of the internet of things market.
Comput. Commun. Rev., 2009
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
2008
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing.
Comput. Commun., 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the Progress in Cryptology, 2008
2007
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks.
Ad Hoc Networks, 2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
2006
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation.
IEEE Trans. Mob. Comput., 2006
Routing and Self-organization in IP based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen).
it Inf. Technol., 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Ad Hoc Networks, 2005
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
2004
Proceedings of the Telecommunications and Networking, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004
2003
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003
Prax. Inf.verarb. Kommun., 2003
Prax. Inf.verarb. Kommun., 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003
2002
Proceedings of the Global Telecommunications Conference, 2002
2001
Int. J. Softw. Eng. Knowl. Eng., 2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Charging related mobile Device Authentication.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001
2000
PhD thesis, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999