Name
Papers
Collaborators
ELKE FRANZ
43
86
Citations 
PageRank 
Referers 
113
54.42
216
Referees 
References 
621
306
Search Limit
100621
Title
Citations
PageRank
Year
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism00.342022
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT00.342020
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation00.342019
Lightweight Authenticated Encryption for Network-on-Chip Communications00.342019
Protecting Communication in Many-Core Systems against Active Attackers.00.342018
Improving Quantization for Channel Reciprocity based Key Generation.10.372018
Secure and energy-efficient interconnects for board-to-board communication10.392017
Security Aspects Of Confidential Network Coding10.362017
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer.00.342016
Resilient and efficient communication in many-core systems using network coding.10.362015
A Metric for Adaptive Routing on Trustworthy Paths.00.342015
Energy Models for Communication of Future Computing Platforms10.352015
Confidential Network Coding: Physical Layer vs. Network Layer10.412015
Analysis of Parallel Applications on a High Performance-Low Energy Computer.10.352014
Adjustable redundancy for secure network coding in a unicast scenario30.502014
A conceptual framework for designing mHealth solutions for developing countries50.612013
Comparison Of Different Secure Network Coding Paradigms Concerning Transmission Efficiency10.352013
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?10.362013
Protection of consumer data in the smart grid compliant with the German smart metering guideline30.472013
Efficiency of secure network coding schemes40.572012
Enhancing privacy in social applications with the notion of group context20.352012
Improved embedding based on a set of cover images.10.682009
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms10.362009
A Comprehensive Approach for Context-dependent Privacy Management10.372008
Privacy-aware user interfaces within collaborative environments20.392006
Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects10.362006
Access Control in a Privacy-Aware eLearning Environment70.672006
Pre-processing for adding noise steganography60.492005
Towards Privacy-Aware eLearning100.992005
Tailored responsibility within component-based systems10.392005
Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen.00.342005
Usable presentation of secure pseudonyms80.602005
Adaptive steganography based on dithering40.782004
Adapting Component Models to Support Responsibility10.392004
COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit10.402003
Geschäftsmodelle für Watermarking.00.341999
Steganography Secure against Cover-Stego-Attacks91.231999
A Payment Scheme for Mixes Providing Anonymity80.671998
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks62.811998
A Mix-Mediated Anonymity Service and Its Payment20.391998
Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas20.611998
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen00.341997
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best1632.661996