Elke Franz
Affiliations:- TU Dresden, Faculty of Computer Science, Germany
According to our database1,
Elke Franz
authored at least 57 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
1
1
1
1
1
1
1
2
1
2
2
2
2
2
4
3
5
2
2
2
1
3
4
2
1
1
1
3
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
On csauthors.net:
Bibliography
2024
Improving Reliability in Network-on-Chip with Trust-based Adaptive Routing Approaches.
Proceedings of the 2024 IEEE Nordic Circuits and Systems Conference (NorCAS), 2024
2023
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2023
2022
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism.
Proceedings of the 33rd IEEE International Conference on Application-specific Systems, 2022
2020
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018
2017
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer.
Proceedings of the 24th High Performance Computing Symposium, 2016
eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015
2014
Proceedings of the International Symposium on Network Coding, 2014
Modeling communication delays for network coding and routing for error-prone transmission.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014
Proceedings of the Euro-Par 2014: Parallel Processing Workshops, 2014
2013
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, 2013
Proceedings of IEEE International Conference on Communications, 2013
Protection of consumer data in the smart grid compliant with the German smart metering guideline.
Proceedings of the SEGS'13, 2013
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013
Comparison of different secure network coding paradigms concerning transmission efficiency.
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013
2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
2009
Proceedings of the Trust, 2009
Proceedings of the Multimedia and Security Workshop, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
2006
Proceedings of the 2006 AVI Workshop on Context in advanced interfaces, 2006
Proceedings of the The First International Conference on Availability, 2006
Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects.
Proceedings of the The First International Conference on Availability, 2006
2005
Inform. Spektrum, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005
2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Adapting Component Models to Support Responsibility.
Proceedings of the International Symposium on Leveraging Applications of Formal Methods, 2004
2003
COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit.
Inform. Forsch. Entwickl., 2003
2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
1999
Geschäftsmodelle für Watermarking.
Datenschutz und Datensicherheit, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
1998
Inform. Spektrum, 1998
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998
Proceedings of the Computer Security, 1998
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen.
Proceedings of the Kommunikation in Verteilten Systemen, 1997
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997
1996
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996