Jens Hiller
Jens Hiller
Verified email at - Homepage
Cited by
Cited by
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
International Conference on Financial Cryptography and Data Security, 420-438, 2018
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
Slimfit—A HIP DEX compression layer for the IP-based Internet of things
R Hummen, J Hiller, M Henze, K Wehrle
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
A first look at certification authority authorization (caa)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
Tailoring onion routing to the internet of things: Security and privacy in untrusted environments
J Hiller, J Pennekamp, M Dahlmanns, M Henze, A Panchenko, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-12, 2019
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC Medical Genomics 10 (2), 29-42, 2017
Cppl: Compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Moving privacy-sensitive services from public clouds to decentralized private clouds
M Henze, J Hiller, O Hohlfeld, K Wehrle
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
Secure low latency communication for constrained industrial IoT scenarios
J Hiller, M Henze, M Serror, E Wagner, JN Richter, K Wehrle
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 614-622, 2018
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J Van Der Giet, ...
2017 IEEE international conference on cloud engineering (IC2E), 252-258, 2017
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
R Holz, J Hiller, J Amann, A Razaghpanah, T Jost, N Vallina-Rodriguez, ...
ACM SIGCOMM Computer Communication Review 50 (3), 3-15, 2020
Towards transparent information on individual cloud service usage
M Henze, D Kerpen, J Hiller, M Eggert, D Hellmanns, E Mühmer, O Renuli, ...
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Trafficsliver: Fighting website fingerprinting attacks with traffic splitting
W De la Cadena, A Mitseva, J Hiller, J Pennekamp, S Reuter, J Filter, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Privacy-preserving remote knowledge system
M Dahlmanns, C Dax, R Matzutt, J Pennekamp, J Hiller, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
Complying with data handling requirements in cloud storage systems
M Henze, R Matzutt, J Hiller, M Erik, JH Ziegeldorf, J van der Giet, ...
IEEE Transactions on Cloud Computing, 2020
Design of Inter-Cloud Security Policies, Architecture, and Annotations for Data Storage
F Eberhardt, J Hiller, O Hohlfeld, S Klauck, M Plauth, A Polze, M Uflacker, ...
Technical report. Hasso Plattner Institute, University of Potsdam, 2016
SSICLOPS Deliverable 2. 1: Report on Body of Knowledge in Secure Cloud Data Storage
F Eberhardt, M Plauth, A Polze, S Klauck, M Uflacker, J Hiller, O Hohlfeld, ...
Technical report. June 2015. Bastian et al.: Facilitating Policy Adherence …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20