Marcel Waldvogel

Orcid: 0000-0003-1665-0166

Affiliations:
  • University of Konstanz, Germany


According to our database1, Marcel Waldvogel authored at least 63 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
HomeCA: Scalable Secure IoT Network Integration.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2018
Requirements for Legally Compliant Software Based on the GDPR.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

2017
X.509 User Certificate-based Two-Factor Authentication for Web Applications.
Proceedings of the 10. DFN-Forum, 2017

MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
User-Friendly, Versatile, and Efficient Multi-link DNS Service Discovery.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

2015
Realistic, Extensible DNS and mDNS Models for INET/OMNeT++.
CoRR, 2015

2014
Adding Privacy to Multicast DNS Service Discovery.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Efficient Privacy Preserving Multicast DNS Service Discovery.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

SIEGE: Service-independent enterprise-grade protection against password scans.
Proceedings of the 7. DFN-Forum, 2014

2012
Versatile Key Management for Secure Cloud Storage.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

BitTorrent traffic obfuscation: A chase towards semantic traffic identification.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

bwIDM: Föderieren auch nicht-webbasierter Dienste auf Basis von SAML.
Proceedings of the 5. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 2012

A Legal and Technical Perspective on Secure Cloud Storage.
Proceedings of the 5. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 2012

2011
Rolling boles, optimal XML structure integrity for updating operations.
Proceedings of the 20th International Conference on World Wide Web, 2011

Prediction quality of contact history in opportunistic networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Hecate, managing authorization with RESTful XML.
Proceedings of the Second International Workshop on RESTful Design, 2011

NAT hole punching revisited.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Polybius: Secure Web Single-Sign-On for Legacy Applications.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

2010
Integrity Assurance for RESTful XML.
Proceedings of the Advances in Conceptual Modeling - Applications and Challenges, 2010

2009
PathForge: faithful anonymization of movement data.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks.
Proceedings of the 2. DFN-Forum Kommunikationstechnologien Verteilte Systeme im Wissenschaftsbereich, 27.05., 2009

2008
I seek for knowledge: Exploiting social properties in Mobile Ad Hoc Networks.
Proceedings of the 1st IFIP Wireless Days, 2008

Large-Scale Network Monitoring for Visual Analysis of Attacks.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

Reality-Check for DTN Routing Algorithms.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Distributing XML with Focus on Parallel Evaluation.
Proceedings of the Databases, 2008

2007
Light-weight End-to-End QoS as DoS Prevention.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Bloom Filters: One Size Fits All?
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Replica Placement and Location using Distributed Hash Tables.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
Pushing XPath Accelerator to its Limits.
Proceedings of the First International Workshop on Performance and Evaluation of Data Management Systems, 2006

2004
Routing bandwidth-guaranteed paths with restoration in label-switched networks .
Comput. Networks, 2004

Bringing Efficient Advanced Queries to Distributed Hash Tables.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

2003
Creating advanced functions on network processors: experience and perspectives.
IEEE Netw., 2003

IBM PowerNP network processor: Hardware, software, and applications.
IBM J. Res. Dev., 2003

Profile-based routing and traffic engineering.
Comput. Commun., 2003

Efficient topology-aware overlay network.
Comput. Commun. Rev., 2003

Indra: A peer-to-peer approach to network intrusion detection and prevention.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Establishing Trust in Distributed Storage Providers.
Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 2003

PURPLE: Predictive Active Queue Management Utilizing Congestion Information.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

The Role of Network Processors in Active Networks.
Proceedings of the Active Networks, IFIP TC6 5th International Workshop, 2003

Closed-loop congestion control for mixed responsive and non-responsive traffic.
Proceedings of the Global Telecommunications Conference, 2003

2002
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware.
IEEE Micro, 2002

Special issue: issues and trends in terabit switching.
Comput. Commun., 2002

Fuzzycast: Efficient Video-on-demand over Multicast.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

GOSSIB vs. IP Traceback Rumors.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Scalable high-speed prefix matching.
ACM Trans. Comput. Syst., 2001

EKA: Efficient Keyserver using ALMI.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

ALMI: An Application Level Multicast Infrastructure.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Proceedings of the Quality of Future Internet Services, 2001

Dimensioning server access bandwidth and multicast routing in overlay networks.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

Layered protocol wrappers for Internet packet processing in reconfigurable hardware.
Proceedings of the Ninth Symposium on High Performance Interconnects, 2001

Efficient media-on-demand over multiple multicast groups.
Proceedings of the Global Telecommunications Conference, 2001

Reconfigurable Router Modules Using Network Protocol Wrappers.
Proceedings of the Field-Programmable Logic and Applications, 2001

2000
Fast longest prefix matching: algorithms, analysis, and applications.
PhD thesis, 2000

Multi-Dimensional Prefix Matching Using Line Search.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

A Rate-Based End-to-End Multicast Congestion Control Protocol.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1999
The VersaKey framework: versatile group key management.
IEEE J. Sel. Areas Commun., 1999

A flexible middleware for multimedia communication: design, implementation, and experience.
IEEE J. Sel. Areas Commun., 1999

Space Decomposition Techniques for Fast Layer-4 Switching.
Proceedings of the Protocols for High Speed Networks VI, 1999

1998
Efficient Security for Large and Dynamic Multicast Groups.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Fast and Scalable Layer Four Switching.
Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31, 1998

Scalable Best Matching Prefix Lookups.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
Scalable High Speed IP Routing Lookups.
Proceedings of the ACM SIGCOMM 1997 Conference on Applications, 1997


  Loading...