Hendrik Graupner

Orcid: 0000-0002-5305-1624

According to our database1, Hendrik Graupner authored at least 19 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Applying Self-recognition Biometrics to Live Deepfake Detection in Video Conferences.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Unconventional Biometrics: Exploring the Feasibility of a Cognitive Trait based on Visual Self-Recognition.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2019
Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Unified Cloud Access Control Model for Cloud Storage Broker.
Proceedings of the 33rd International Conference on Information Networking, 2019

Secure Deduplication on Public Cloud Storage.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Fast Automated Processing and Evaluation of Identity Leaks.
Int. J. Parallel Program., 2018

A threat modeling approach for cloud storage brokerage and file sharing systems.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker.
Proceedings of the 2018 International Conference on Information Networking, 2018

Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Secure self-seeding with power-up SRAM states.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Countering Three Denial-of-Sleep Attacks on ContikiMAC.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

2016
Automated parsing and interpretation of identity leaks.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Secure access control for multi-cloud resources.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

2014
Gathering and Analyzing Identity Leaks for Security Awareness.
Proceedings of the Technology and Practice of Passwords, 2014


  Loading...