Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring | 0 | 0.34 | 2022 |
CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively | 1 | 0.35 | 2021 |
Challenges and Opportunities in Securing the Industrial Internet of Things | 6 | 0.42 | 2021 |
Private Multi-Hop Accountability for Supply Chains | 4 | 0.42 | 2020 |
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments | 0 | 0.34 | 2020 |
How to Securely Prune Bitcoin's Blockchain | 1 | 0.40 | 2020 |
Facilitating Protocol-independent Industrial Intrusion Detection Systems | 0 | 0.34 | 2020 |
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective | 5 | 0.51 | 2019 |
Hi Doppelgänger : Towards Detecting Manipulation in News Comments | 0 | 0.34 | 2019 |
A Case For Integrated Data Processing In Large-Scale Cyber-Physical Systems | 0 | 0.34 | 2019 |
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing | 2 | 0.39 | 2019 |
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads | 0 | 0.34 | 2019 |
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments | 2 | 0.52 | 2019 |
Towards an Infrastructure Enabling the Internet of Production | 4 | 0.43 | 2019 |
Secure and anonymous decentralized Bitcoin mixing. | 11 | 0.69 | 2018 |
Thwarting Unwanted Blockchain Content Insertion | 3 | 0.38 | 2018 |
Complying With Data Handling Requirements in Cloud Storage Systems | 0 | 0.34 | 2018 |
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. | 6 | 0.58 | 2018 |
Secure Low Latency Communication for Constrained Industrial IoT Scenarios. | 4 | 0.48 | 2018 |
Practical Data Compliance for Cloud Storage | 3 | 0.39 | 2017 |
Analysis of Fingerprinting Techniques for Tor Hidden Services. | 0 | 0.34 | 2017 |
A survey on the evolution of privacy enforcement on smartphones and the road ahead. | 0 | 0.34 | 2017 |
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things | 1 | 0.38 | 2017 |
Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape. | 2 | 0.36 | 2017 |
Privacy-Preserving HMM Forward Computation. | 0 | 0.34 | 2017 |
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud. | 0 | 0.34 | 2016 |
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. | 3 | 0.41 | 2016 |
Website Fingerprinting at Internet Scale. | 29 | 1.04 | 2016 |
POSTER: Fingerprinting Tor Hidden Services. | 1 | 0.35 | 2016 |
A comprehensive approach to privacy in the cloud-based Internet of Things | 36 | 1.18 | 2016 |
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds | 7 | 0.47 | 2016 |
CPPL: Compact Privacy Policy Language. | 2 | 0.35 | 2016 |
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks | 4 | 0.45 | 2015 |
Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper). | 2 | 0.36 | 2015 |
CoinParty: Secure Multi-Party Mixing of Bitcoins | 26 | 1.04 | 2015 |
Piccett: Protocol-independent classification of corrupted error-tolerant traffic | 0 | 0.34 | 2014 |
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud. | 2 | 0.37 | 2014 |
User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things | 12 | 0.69 | 2014 |
6LoWPAN fragmentation attacks and mitigation mechanisms | 36 | 2.58 | 2013 |
Towards Data Handling Requirements-Aware Cloud Computing | 16 | 1.15 | 2013 |
The Cloud Needs Cross-Layer Data Handling Annotations | 12 | 0.66 | 2013 |
Maintaining User Control While Storing and Processing Sensor Data in the Cloud. | 10 | 0.67 | 2013 |
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. | 8 | 0.57 | 2013 |
Slimfit - A Hip Dex Compression Layer For The Ip-Based Internet Of Things | 12 | 0.69 | 2013 |
A Cloud design for user-controlled storage and processing of sensor data | 22 | 1.08 | 2012 |