Frank Kargl

Orcid: 0000-0003-3800-8369

Affiliations:
  • Ulm University, Faculty of Engineering and Computer Science
  • University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science


According to our database1, Frank Kargl authored at least 222 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats.
ACM Trans. Priv. Secur., May, 2024

PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites.
CoRR, 2024

Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

On Subjective Logic Trust Discount for Referral Paths.
Proceedings of the 27th International Conference on Information Fusion, 2024

2023
The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles.
IEEE Internet Things Mag., June, 2023

Survey of Air, Sea, and Road Vehicles Research for Motion Control Security.
IEEE Trans. Intell. Transp. Syst., 2023

Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242).
Dagstuhl Reports, 2023

Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023

Network Message Field Type Classification and Recognition for Unknown Binary Protocols.
CoRR, 2023

Survey of Model-Based Security Testing Approaches in the Automotive Domain.
IEEE Access, 2023

ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture.
IEEE Access, 2023

Securing Cooperative Intersection Management through Subjective Trust Networks.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Privacy of Smart Traffic Lights Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Zero Trust Score-based Network-level Access Control in Enterprise Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Evaluation of Free and Open Source Tools for Automated Software Composition Analysis.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

2022
Risk Prediction of IoT Devices Based on Vulnerability Analysis.
ACM Trans. Priv. Secur., 2022

Zero Trust Service Function Chaining.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042).
Dagstuhl Reports, 2022

Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Secure Service Function Chaining in the Context of Zero Trust Security.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Steering Your Car With Electromagnetic Fields.
Proceedings of the Computer Science in Cars Symposium, 2022

Refining Network Message Segmentation with Principal Component Analysis.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Cryptographic Design of PriCloud, a Privacy-Preserving Decentralized Storage with Remuneration.
IEEE Trans. Dependable Secur. Comput., 2021

SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Proc. Priv. Enhancing Technol., 2021

Online Privacy Literacy and Online Privacy Behavior - The Role of Crystallized Intelligence and Personality.
Int. J. Hum. Comput. Interact., 2021

The Effect Of Sound On The Gyroscopes In Your Car.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

WAIT: protecting the integrity of web applications with binary-equivalent transparency.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

PeQES: a platform for privacy-enhanced quantitative empirical studies.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

D-REQs: Determination of security & safety requirements in workshops based on the use of model-based systems engineering.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

ARIstoteles - Dissecting Apple's Baseband Interface.
Proceedings of the Computer Security - ESORICS 2021, 2021

Model-Based Security Testing of Vehicle Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Confidential Token-Based License Management.
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021

2020
SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Securing CACC: Strategies for Mitigating Data Injection Attacks.
Proceedings of the IEEE Vehicular Networking Conference, 2020

Context-based Access Control and Trust Scores in Zero Trust Campus Networks.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

On The Manipulation of Wheel Speed Sensors and Their Impact in Autonomous Vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2020

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis.
IEEE Commun. Surv. Tutorials, 2019

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
IEEE Commun. Surv. Tutorials, 2019

Ride and Hide: A Study on the Privacy of Ride Hailing Services.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

A Privacy-Aware V-Model for Software Development.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detecting Anomalous Driving Behavior using Neural Networks.
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019

Multi-Modal Deep Learning for Vehicle Sensor Data Abstraction and Attack Detection.
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019

Poster: Network Message Field Type Recognition.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Evaluation of misbehavior detection mechanisms in Maat using VeReMi.
Dataset, December, 2018

Privacy of Connected Vehicles.
Proceedings of the Handbook of Mobile Data Privacy., 2018

An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intell. Transp. Syst., 2018

uMine: a Blockchain based on Human Miners.
IACR Cryptol. ePrint Arch., 2018

Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network.
CoRR, 2018

Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection.
CoRR, 2018

NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Robust Detection of Anomalous Driving Behavior.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2018

VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the Security and Privacy in Communication Networks, 2018

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An SDN-based Approach For Defending Against Reflective DDoS Attacks.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Code Execution: A Generic PUF-Driven System Architecture.
Proceedings of the Information Security - 21st International Conference, 2018

Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Flexible Network Approach to Privacy of Blockchain Transactions.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Graphtides: a framework for evaluating stream-based graph processing platforms.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA), 2018

Multi-Source Fusion Operations in Subjective Logic.
Proceedings of the 21st International Conference on Information Fusion, 2018

Coloured Ring Confidential Transactions.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection Systems.
Proceedings of the 11. DFN-Forum Kommunikationstechnologien, 2018

Retro-λ: An Event-sourced Platform for Serverless Applications with Retroactive Computing Support.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Performance Engineering in Distributed Event-sourced Systems.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Log Pruning in Distributed Event-sourced Systems.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

2017
Security Challenges and Opportunities of Software-Defined Networking.
IEEE Secur. Priv., 2017

Automated PCB Reverse Engineering.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Analyzing attacks on cooperative adaptive cruise control (CACC).
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Blackchain: scalability for resource-constrained accountable vehicle-to-x communication.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Towards an economic analysis of routing in payment channel networks.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

A Testing Framework for High-Speed Network and Security Devices.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Consistent retrospective snapshots in distributed event-sourced systems.
Proceedings of the 2017 International Conference on Networked Systems, 2017

Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Chronograph: A Distributed Processing Platform for Online and Batch Computations on Event-sourced Graphs.
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, 2017

A Testing Framework Architecture for Automotive Intrusion Detection Systems.
Proceedings of the Automotive - Safety & Security 2017, 2017

2016
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns.
Proc. Priv. Enhancing Technol., 2016

Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.
Ad Hoc Networks, 2016

A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy.
Ad Hoc Networks, 2016

Enhanced Position Verification for VANETs Using Subjective Logic.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

POSTER: Anomaly-based misbehaviour detection in connected car backends.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Exploiting propagation effects for authentication and misbehavior detection in VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

Automotive Ethernet: security opportunity or challenge?
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Using conflict-free replicated data types for serverless mobile social applications.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

Mobile triage management in disaster area networks using decentralized replication.
Proceedings of the Eleventh ACM Workshop on Challenged Networks, 2016

Chronograph: A Distributed Platform for Event-Sourced Graph Computing.
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016

Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

A Comparison of TCP Congestion Control Algorithms in 10G Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

KopperCoin - A Distributed File Storage with Financial Incentives.
Proceedings of the Information Security Practice and Experience, 2016

2015
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption.
IACR Cryptol. ePrint Arch., 2015

Pseudonym Schemes in Vehicular Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

A framework for evaluating pseudonym strategies in vehicular ad-hoc networks.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Decentralized enforcement of k-anonymity for location privacy using secret sharing.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Wireless channel-based message authentication.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection IX, 2015

Formal Verification of Privacy Properties in Electric Vehicle Charging.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

A conceptual model for event-sourced graph computing.
Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, 2015

Sequence-aware Intrusion Detection in Industrial Control Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Concurrent programming in web applications.
it Inf. Technol., 2014

Insights on the Security and Dependability of Industrial Control Systems.
IEEE Secur. Priv., 2014

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014

In-Network Aggregation for Vehicular Ad Hoc Networks.
IEEE Commun. Surv. Tutorials, 2014

A flexible, subjective logic-based framework for misbehavior detection in V2V networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Revisiting attacker model for smart vehicles.
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Formal model of certificate omission schemes in VANET.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Combining discrete event simulations and event sourcing.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Privacy implications of presence sharing in mobile messaging applications.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Dynamic packet-filtering in high-speed networks using NetFPGAs.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

A Security Assessment Methodology for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.
IEEE Trans. Veh. Technol., 2013

On credibility improvements for automotive navigation systems.
Pers. Ubiquitous Comput., 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

SeDyA: secure dynamic aggregation in VANETs.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Electronic Decal: A Security Function Based on V2X Communication.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Impact of V2X privacy strategies on Intersection Collision Avoidance systems.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

The impact of security on cooperative awareness in VANET.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

Short paper: Towards data-similarity-based clustering for inter-vehicle communication.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

On the Feasibility of Device Fingerprinting in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2013

POPCORN: privacy-preserving charging for emobility.
Proceedings of the CyCAR'13, 2013

Efficient and secure storage of private keys for pseudonymous vehicular communication.
Proceedings of the CyCAR'13, 2013

2012
Towards security in nano-communication: Challenges and opportunities.
Nano Commun. Networks, 2012

Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502).
Dagstuhl Reports, 2012

On the potential of PUF for pseudonym generation in vehicular networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Evaluation of congestion-based certificate omission in VANETs.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Towards context adaptive privacy decisions in ubiquitous computing.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Congestion-based certificate omission in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Analyzing dissemination redundancy to achieve data consistency in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Security in nano communication: Challenges and open research issues.
Proceedings of IEEE International Conference on Communications, 2012

Privacy context model for dynamic privacy adaptation in ubiquitous computing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
ACM WiSec 2011 poster and demo session.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Research challenges in intervehicular communication: lessons of the 2010 Dagstuhl Seminar.
IEEE Commun. Mag., 2011

Modeling in-network aggregation in VANETs.
IEEE Commun. Mag., 2011

Privacy-by-design in ITS applications.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Spoofed data detection in VANETs using dynamic thresholds.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Advanced carrier sensing to resolve local channel congestion.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

Privacy Verification Using Ontologies.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Decentralized position verification in geographic <i>ad hoc</i> routing.
Secur. Commun. Networks, 2010

Exploration of adaptive beaconing for efficient intervehicle safety communication.
IEEE Netw., 2010

Resilient secure aggregation for vehicular networks.
IEEE Netw., 2010

Measuring long-term location privacy in vehicular communication systems.
Comput. Commun., 2010

On the efficiency of secure beaconing in VANETs.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

V-Tokens for Conditional Pseudonymity in VANETs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

On the potential of generic modeling for VANET data aggregation protocols.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Dependable and secure geocast in vehicular networks.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

10402 Report - Working Group on Security and Privacy.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

10402 Abstracts Collection and Executive Summary - Inter-Vehicular Communication.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

Interaction weaknesses of personal navigation devices.
Proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2010

Towards Territorial Privacy in Smart Environments.
Proceedings of the Intelligent Information Privacy Management, 2010

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Editorial on Special Issue "Mobile Ad-hoc Networks".
Prax. Inf.verarb. Kommun., 2009

A VANET-based emergency vehicle warning system.
Proceedings of the IEEE Vehicular Networking Conference, 2009

A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Measuring location privacy in V2X communication systems with accumulated information.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Privacy Requirements in Vehicular Communication Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
On the security of context-adaptive information dissemination.
Secur. Commun. Networks, 2008

Communication patterns in VANETs.
IEEE Commun. Mag., 2008

Secure vehicular communication systems: design and architecture.
IEEE Commun. Mag., 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008

U<sup>2</sup>VAS: A Research Communication Stack for Vehicular Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Optimized Position Based Gossiping in VANETs.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Simulation of ad hoc networks: ns-2 compared to JiST/SWANS.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Evaluation of Position Based Gossiping for VANETs in an Intersection Scenario.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Secure and efficient beaconing for vehicular networks.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

Cyclic Data Synchronization through Reusing SyncML.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Implementing and Validating an Environmental and Health Monitoring System.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

SNMP-Proxy for Wireless Sensor Network.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Advanced Adaptive Gossiping Using 2-Hop Neighborhood Information.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
The Effects of the Ajax Technology on Web Application Usability.
Proceedings of the WEBIST 2007, 2007

The iNAV Indoor Navigation System.
Proceedings of the Ubiquitous Computing Systems, 4th International Symposium, 2007

Adaptive Topology Based Gossiping in VANETs Using Position Information.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

2006
Position Verification Approaches for Vehicular Ad Hoc Networks.
IEEE Wirel. Commun., 2006

Semantic Information Retrieval in the COMPASS Location System.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

BigNurse: A Wireless Ad Hoc Network for Patient Monitoring.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

Improved security in geographic ad hoc routing through autonomous position verification.
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006

Location Tracking Attack in Ad hoc Networks based on Topology Information.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Re-identifying Anonymous Nodes.
Proceedings of the Location- and Context-Awareness, Second International Workshop, 2006

Identification in Ad Hoc Networks.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Impact of Pseudonym Changes on Geographic Routing in VANETs.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Sensors for Detection of Misbehaving Nodes in MANETs.
Prax. Inf.verarb. Kommun., 2005

Short paper: Random IDs for preserving location privacy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

The COMPASS Location System.
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005

Minitrack Chair's Introduction: Wireless Personal Area and Ad-Hoc Networks.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Secure Dynamic Source Routing.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Identitäten in mobilen Ad hoc Netzwerken.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

2004
Wireless Personal Area Networks: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Integrierte Sicherheit für Mobile Ad-hoc Netzwerke.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

Securing Ad hoc Routing Protocols.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

Sensors for Detection of Misbehaving Nodes in MANETs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Sicherheit in Mobilen Ad hoc Netzwerken.
PhD thesis, 2003

Bluetooth-based Ad-Hoc Networks for Voice Transmission.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Sicherheit in Mobilen Ad hoc Netzwerken.
Proceedings of the Ausgezeichnete Informatikdissertationen 2003, 2003

2002
Ein Framework für MANET Routing Protokolle.
Proceedings of the Mobile Ad-Hoc Netzwerke, 2002

2001
Protecting web servers from distributed denial of service attacks.
Proceedings of the Tenth International World Wide Web Conference, 2001

Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture.
Proceedings of the Mobile Agents, 5th International Conference, 2001

1999
Dynamic User Interfaces with Java.
Proceedings of WebNet 99, 1999

Evaluation of Java Messaging Middleware as a Platform for Software Agent Communication.
Proceedings of the JIT '99, 1999

CIA - a collaboration and coordination infrastructure for personal agents (short paper).
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999


  Loading...