Ralf C. Staudemeyer

Orcid: 0000-0001-6581-2542

Affiliations:
  • University of Passau, Institute of IT-Security and Security Law (ISL), Germany


According to our database1, Ralf C. Staudemeyer authored at least 14 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks.
IEEE Access, 2023

2022
Erstellung einer kollaborativen Arbeitsumgebung für die pandemiebedingte Online-Lehre - ein Praxisbericht.
Inform. Spektrum, 2022

Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2020
Extracting Speech from Motion-Sensitive Sensors.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net.
J. Reliab. Intell. Environ., 2019

Understanding LSTM - a tutorial into Long Short-Term Memory Recurrent Neural Networks.
CoRR, 2019

2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
From Dining Cryptographers to dining things: Unobservable communication in the IoT.
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017

2016
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

ECDSA on Things: IoT Integrity Protection in Practise.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Burning money with firewalls.
South Afr. Comput. J., 2015

Applying long short-term memory recurrent neural networks to intrusion detection.
South Afr. Comput. J., 2015

2014
Extracting salient features for network intrusion detection using machine learning methods.
South Afr. Comput. J., 2014

2013
Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013


  Loading...