Follow
Jens Hiller
Jens Hiller
Verified email at comsys.rwth-aachen.de - Homepage
Title
Cited by
Cited by
Year
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
2572018
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2242013
Trafficsliver: Fighting website fingerprinting attacks with traffic splitting
W De la Cadena, A Mitseva, J Hiller, J Pennekamp, S Reuter, J Filter, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1212020
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
952013
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
R Holz, J Hiller, J Amann, A Razaghpanah, T Jost, N Vallina-Rodriguez, ...
ACM SIGCOMM Computer Communication Review 50 (3), 3-15, 2020
722020
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
712018
Secure low latency communication for constrained industrial IoT scenarios
J Hiller, M Henze, M Serror, E Wagner, JN Richter, K Wehrle
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 614-622, 2018
582018
Tailoring onion routing to the internet of things: Security and privacy in untrusted environments
J Hiller, J Pennekamp, M Dahlmanns, M Henze, A Panchenko, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-12, 2019
552019
A first look at certification authority authorization (CAA)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
552018
Slimfit—A HIP DEX compression layer for the IP-based Internet of things
R Hummen, J Hiller, M Henze, K Wehrle
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
492013
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC Medical Genomics 10, 29-42, 2017
362017
Cppl: Compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
362016
Network Security and Privacy for Cyber‐Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017
262017
Moving privacy-sensitive services from public clouds to decentralized private clouds
M Henze, J Hiller, O Hohlfeld, K Wehrle
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
262016
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J Van Der Giet, ...
2017 IEEE international conference on cloud engineering (IC2E), 252-258, 2017
202017
Complying with data handling requirements in cloud storage systems
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J van der Giet, ...
IEEE Transactions on Cloud Computing 10 (3), 1661-1674, 2020
182020
The road to accountable and dependable manufacturing
J Pennekamp, R Matzutt, SS Kanhere, J Hiller, K Wehrle
Automation 2 (3), 202-219, 2021
152021
The boon and bane of cross-signing: Shedding light on a common practice in public key infrastructures
J Hiller, J Amann, O Hohlfeld
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
142020
Privacy-preserving remote knowledge system
M Dahlmanns, C Dax, R Matzutt, J Pennekamp, J Hiller, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
142019
Multipathing traffic to reduce entry node exposure in onion routing
J Pennekamp, J Hiller, S Reuter, W De la Cadena, A Mitseva, M Henze, ...
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
132019
The system can't perform the operation now. Try again later.
Articles 1–20