Stebėti
Klaus Wehrle
Klaus Wehrle
Patvirtintas el. paštas comsys.rwth-aachen.de - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Privacy in the Internet of Things: threats and challenges
JH Ziegeldorf, OG Morchon, K Wehrle
Security and Communication Networks 7 (12), 2728-2742, 2014
7482014
Peer-to-peer systems and applications
R Steinmetz, K Wehrle
Springer, 2005
7432005
A performance comparison of recent network simulators
E Weingartner, H Vom Lehn, K Wehrle
IEEE International Conference on Communications, 2009. ICC'09, 2009
6932009
Website Fingerprinting at Internet Scale.
A Panchenko, F Lanze, J Pennekamp, T Engel, A Zinnen, M Henze, ...
NDSS, 2016
5352016
Security Challenges in the IP-based Internet of Things
T Heer, O Garcia-Morchon, R Hummen, SL Keoh, SS Kumar, K Wehrle
Wireless Personal Communications 61, 527-542, 2011
5292011
Modeling and tools for network simulation
K Wehrle, M Gunes, J Gross
Springer, 2010
4652010
Accurate prediction of power consumption in sensor networks
O Landsiedel, K Wehrle, S Gotz
The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II., 37-44, 2005
3732005
A comprehensive approach to privacy in the cloud-based Internet of Things
M Henze, L Hermerschmidt, D Kerpen, R Häußling, B Rumpe, K Wehrle
Future generation computer systems 56, 701-718, 2016
2572016
Footpath: Accurate map-based indoor navigation using smartphones
JAB Link, P Smith, N Viol, K Wehrle
International Conference on Indoor Positioning and Indoor Navigation (IPIN …, 2011
2572011
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
2342018
Linux Network Architecture
K Wehrle, F Pahlke, H Ritter, D Muller, M Bechler
Prentice-Hall, Inc., 2004
2292004
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2182013
Challenges and opportunities in securing the industrial internet of things
M Serror, S Hack, M Henze, M Schuba, K Wehrle
IEEE Transactions on Industrial Informatics 17 (5), 2985-2996, 2020
2102020
Coinparty: Secure multi-party mixing of bitcoins
JH Ziegeldorf, F Grossmann, M Henze, N Inden, K Wehrle
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
2102015
Delegation-based authentication and authorization for the IP-based Internet of Things
R Hummen, H Shafagh, S Raza, T Voig, K Wehrle
2014 eleventh annual IEEE international conference on Sensing, Communication …, 2014
2012014
Towards viable certificate-based authentication for the internet of things
R Hummen, JH Ziegeldorf, H Shafagh, S Raza, K Wehrle
Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013
1882013
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment
R Sasnauskas, O Landsiedel, MH Alizai, C Weise, S Kowalewski, ...
Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010
1652010
EEG-based automatic emotion recognition: Feature extraction, selection and classification methods
P Ackermann, C Kohlschein, JA Bitsch, K Wehrle, S Jeschke
2016 IEEE 18th international conference on e-health networking, applications …, 2016
1542016
Bursty traffic over bursty links
MH Alizai, O Landsiedel, JÁB Link, S Götz, K Wehrle
Proceedings of ACM SenSys'07 -- 7th ACM Conference on Embedded Networked …, 2009
1482009
Secure and anonymous decentralized Bitcoin mixing
JH Ziegeldorf, R Matzutt, M Henze, F Grossmann, K Wehrle
Future Generation Computer Systems 80, 448-466, 2018
1422018
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20