Frank Kargl
Orcid: 0000-0003-3800-8369Affiliations:
- Ulm University, Faculty of Engineering and Computer Science
- University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science
According to our database1,
Frank Kargl
authored at least 222 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., May, 2024
PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites.
CoRR, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 27th International Conference on Information Fusion, 2024
2023
The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles.
IEEE Internet Things Mag., June, 2023
IEEE Trans. Intell. Transp. Syst., 2023
Dagstuhl Reports, 2023
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023
Network Message Field Type Classification and Recognition for Unknown Binary Protocols.
CoRR, 2023
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the IEEE Vehicular Networking Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Evaluation of Free and Open Source Tools for Automated Software Composition Analysis.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023
2022
ACM Trans. Priv. Secur., 2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
Dagstuhl Reports, 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the Computer Science in Cars Symposium, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Cryptographic Design of PriCloud, a Privacy-Preserving Decentralized Storage with Remuneration.
IEEE Trans. Dependable Secur. Comput., 2021
Proc. Priv. Enhancing Technol., 2021
Online Privacy Literacy and Online Privacy Behavior - The Role of Crystallized Intelligence and Personality.
Int. J. Hum. Comput. Interact., 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
WAIT: protecting the integrity of web applications with binary-equivalent transparency.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
D-REQs: Determination of security & safety requirements in workshops based on the use of model-based systems engineering.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021
2020
SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Proceedings of the IEEE Vehicular Networking Conference, 2020
Proceedings of the Sicherheit 2020, Sicherheit, 2020
Proceedings of the IEEE Intelligent Vehicles Symposium, 2020
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis.
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Dataset, December, 2018
Proceedings of the Handbook of Mobile Data Privacy., 2018
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intell. Transp. Syst., 2018
CoRR, 2018
CoRR, 2018
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA), 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection Systems.
Proceedings of the 11. DFN-Forum Kommunikationstechnologien, 2018
Retro-λ: An Event-sourced Platform for Serverless Applications with Retroactive Computing Support.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018
2017
IEEE Secur. Priv., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Blackchain: scalability for resource-constrained accountable vehicle-to-x communication.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 International Conference on Networked Systems, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Chronograph: A Distributed Processing Platform for Online and Batch Computations on Event-sourced Graphs.
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, 2017
Proceedings of the Automotive - Safety & Security 2017, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Dagstuhl Reports, 2016
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.
Ad Hoc Networks, 2016
A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy.
Ad Hoc Networks, 2016
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016
Exploiting propagation effects for authentication and misbehavior detection in VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016
Proceedings of the Eleventh ACM Workshop on Challenged Networks, 2016
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Information Security Practice and Experience, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015
Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
IEEE Secur. Priv., 2014
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014
IEEE Commun. Surv. Tutorials, 2014
A flexible, subjective logic-based framework for misbehavior detection in V2V networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014
PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014
Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014
Proceedings of the Critical Information Infrastructures Security, 2014
2013
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.
IEEE Trans. Veh. Technol., 2013
Pers. Ubiquitous Comput., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013
Short paper: Towards data-similarity-based clustering for inter-vehicle communication.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013
Proceedings of the Critical Information Infrastructures Security, 2013
Proceedings of the CyCAR'13, 2013
Efficient and secure storage of private keys for pseudonymous vehicular communication.
Proceedings of the CyCAR'13, 2013
2012
Nano Commun. Networks, 2012
Dagstuhl Reports, 2012
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012
Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012
Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
2011
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Research challenges in intervehicular communication: lessons of the 2010 Dagstuhl Seminar.
IEEE Commun. Mag., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Secur. Commun. Networks, 2010
IEEE Netw., 2010
Comput. Commun., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the Second IEEE Vehicular Networking Conference, 2010
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010
Proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2010
Proceedings of the Intelligent Information Privacy Management, 2010
Proceedings of the Intelligent Information Privacy Management, 2010
2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
Measuring location privacy in V2X communication systems with accumulated information.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Secur. Commun. Networks, 2008
IEEE Commun. Mag., 2008
Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
The Effects of the Ajax Technology on Web Application Usability.
Proceedings of the WEBIST 2007, 2007
Proceedings of the Ubiquitous Computing Systems, 4th International Symposium, 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
2006
IEEE Wirel. Commun., 2006
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006
Improved security in geographic ad hoc routing through autonomous position verification.
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of the Location- and Context-Awareness, Second International Workshop, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Prax. Inf.verarb. Kommun., 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004
2003
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003
Proceedings of the Ausgezeichnete Informatikdissertationen 2003, 2003
2002
Proceedings of the Mobile Ad-Hoc Netzwerke, 2002
2001
Proceedings of the Tenth International World Wide Web Conference, 2001
Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture.
Proceedings of the Mobile Agents, 5th International Conference, 2001
1999
Dynamic User Interfaces with Java.
Proceedings of WebNet 99, 1999
Evaluation of Java Messaging Middleware as a Platform for Software Agent Communication.
Proceedings of the JIT '99, 1999
CIA - a collaboration and coordination infrastructure for personal agents (short paper).
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999