Name
Affiliation
Papers
MARTIN HENZE
Rhein Westfal TH Aachen, Aachen, Germany
45
Collaborators
Citations 
PageRank 
83
295
24.86
Referers 
Referees 
References 
668
1236
600
Search Limit
1001000
Title
Citations
PageRank
Year
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring00.342022
CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively10.352021
Challenges and Opportunities in Securing the Industrial Internet of Things60.422021
Private Multi-Hop Accountability for Supply Chains40.422020
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments00.342020
How to Securely Prune Bitcoin's Blockchain10.402020
Facilitating Protocol-independent Industrial Intrusion Detection Systems00.342020
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective50.512019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments00.342019
A Case For Integrated Data Processing In Large-Scale Cyber-Physical Systems00.342019
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing20.392019
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads00.342019
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments20.522019
Towards an Infrastructure Enabling the Internet of Production40.432019
Secure and anonymous decentralized Bitcoin mixing.110.692018
Thwarting Unwanted Blockchain Content Insertion30.382018
Complying With Data Handling Requirements in Cloud Storage Systems00.342018
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin.60.582018
Secure Low Latency Communication for Constrained Industrial IoT Scenarios.40.482018
Practical Data Compliance for Cloud Storage30.392017
Analysis of Fingerprinting Techniques for Tor Hidden Services.00.342017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.00.342017
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things10.382017
Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape.20.362017
Privacy-Preserving HMM Forward Computation.00.342017
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud.00.342016
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.30.412016
Website Fingerprinting at Internet Scale.291.042016
POSTER: Fingerprinting Tor Hidden Services.10.352016
A comprehensive approach to privacy in the cloud-based Internet of Things361.182016
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds70.472016
CPPL: Compact Privacy Policy Language.20.352016
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks40.452015
Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).20.362015
CoinParty: Secure Multi-Party Mixing of Bitcoins261.042015
Piccett: Protocol-independent classification of corrupted error-tolerant traffic00.342014
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud.20.372014
User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things120.692014
6LoWPAN fragmentation attacks and mitigation mechanisms362.582013
Towards Data Handling Requirements-Aware Cloud Computing161.152013
The Cloud Needs Cross-Layer Data Handling Annotations120.662013
Maintaining User Control While Storing and Processing Sensor Data in the Cloud.100.672013
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.80.572013
Slimfit - A Hip Dex Compression Layer For The Ip-Based Internet Of Things120.692013
A Cloud design for user-controlled storage and processing of sensor data221.082012