Dominik Schürmann
Dominik Schürmann
COTECH (previously: TU Braunschweig, IBR)
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Secure communication based on ambient audio
D Schurmann, S Sigg
IEEE Transactions on Mobile Computing 12 (2), 358-370, 2013
An Empirical Study of Textual Key-Fingerprint Representations
S Dechand, D Schürmann, K Busse, Y Acar, S Fahl, M Smith
BANDANA—Body area network device-to-device authentication using natural gAit
D Schürmann, A Brüsch, S Sigg, L Wolf
2017 IEEE International Conference on Pervasive Computing and Communications …, 2017
Trustworthy parking communities: helping your neighbor to find a space
J Timpner, D Schürmann, L Wolf
IEEE Transactions on Dependable and Secure Computing 13 (1), 120-132, 2015
Pintext: A framework for secure communication based on context
S Sigg, D Schuermann, Y Ji
Mobile and Ubiquitous Systems: Computing, Networking, and Services, 314-325, 2012
Security properties of gait for mobile device pairing
A Bruesch, N Nguyen, D Schürmann, S Sigg, L Wolf
IEEE Transactions on Mobile Computing 19 (3), 697-710, 2019
Cooperative charging in residential areas
D Schürmann, J Timpner, L Wolf
IEEE Transactions on Intelligent Transportation Systems 18 (4), 834-846, 2016
Secure smartphone-based registration and key deployment for vehicle-to-cloud communications
J Timpner, D Schürmann, L Wolf
Proceedings of the 2013 ACM workshop on Security, privacy & dependability …, 2013
Deep learning for network anomalies detection
A Dawoud, S Shahristani, C Raun
2018 International Conference on Machine Learning and Data Engineering …, 2018
Forward secure delay-tolerant networking
S Rüsch, D Schürmann, R Kapitza, L Wolf
Proceedings of the 12th Workshop on Challenged Networks, 7-12, 2017
OpenKeychain: an architecture for cryptography with smart cards and NFC rings on Android
D Schürmann, S Dechand, L Wolf
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2017
Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing
D Schürmann, A Brüsch, N Nguyen, S Sigg, L Wolf
Pervasive and Mobile Computing 47, 1-12, 2018
XEP-0373: OpenPGP for XMPP
F Schmaus, D Schürmann, V Breitmoser
Hämtad juli 17, 2016, 2016
Utilizing hardware aes encryption for wsns
F Büsching, A Figur, D Schürmann, L Wolf
Wiretapping end-to-end encrypted VoIP calls: real-world attacks on ZRTP
D Schürmann, F Kabus, G Hildermeier, L Wolf
Proceedings on Privacy Enhancing Technologies 2017 (3), 4-20, 2017
μDTNSec: a security layer for disruption-tolerant networks on microcontrollers
D Schürmann, G von Zengen, M Priedigkeit, L Wolf
2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 1-7, 2017
Authenticated resource management in delay-tolerant networks using proxy signatures
D Schürmann, J Ott, L Wolf
2013 10th Annual Conference on Wireless On-demand Network Systems and …, 2013
Demo of BANDANA-Body Area Network Device-to-device Authentication using Natural gAit
N Nguyen, A BrÜsch, D SchÜrmann, S Sigg, L Wolf
2018 IEEE International Conference on Pervasive Computing and Communications …, 2018
RAIM: redundant array of independent motes
D Schürmann, F Büsching, S Willenborg, L Wolf
2017 International Conference on Networked Systems (NetSys), 1-8, 2017
Poster: Handsfree ZRTP-A Novel Key Agreement for RTP, Protected by Voice Commitments
D Schürmann, S Sigg
Symposium On Usable Privacy and Security (SOUPS), 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20