Jens Hiller
Jens Hiller
Bestätigte E-Mail-Adresse bei - Startseite
TitelZitiert vonJahr
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
Proceedings of the 22nd International Conference on Financial Cryptography …, 2018
Slimfit—A HIP DEX compression layer for the IP-based Internet of things
R Hummen, J Hiller, M Henze, K Wehrle
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
Moving privacy-sensitive services from public clouds to decentralized private clouds
M Henze, J Hiller, O Hohlfeld, K Wehrle
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
A first look at certification authority authorization (CAA)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC medical genomics 10 (2), 44, 2017
CPPL: compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
Towards transparent information on individual cloud service usage
M Henze, D Kerpen, J Hiller, M Eggert, D Hellmanns, E Mühmer, O Renuli, ...
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J van der Giet, ...
2017 IEEE International Conference on Cloud Engineering (IC2E), 252-258, 2017
Secure Low Latency Communication for Constrained Industrial IoT Scenarios
J Hiller, M Henze, M Serror, E Wagner, JN Richter, K Wehrle
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 614-622, 2018
Bandwidth-optimized secure two-party computation of minima
JH Ziegeldorf, J Hiller, M Henze, H Wirtz, K Wehrle
International Conference on Cryptology and Network Security, 197-213, 2015
SSICLOPS Deliverable 2. 1: Report on Body of Knowledge in Secure Cloud Data Storage
F Eberhardt, M Plauth, A Polze, S Klauck, M Uflacker, J Hiller, O Hohlfeld, ...
Technical report. June 2015. Bastian et al.: Facilitating Policy Adherence …, 2015
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
J Hiller, M Kimmerlin, M Plauth, S Heikkila, S Klauck, V Lindfors, ...
2018 IEEE International Conference on Cloud Engineering (IC2E), 241-249, 2018
SPLIT: Smart Protocol Loading for the IoT.
T Zimmermann, J Hiller, H Reelfs, P Hein, K Wehrle
EWSN, 49-54, 2018
HIP Middlebox Puzzle Offloading and End-host Notification
R Hummen, M Henze, J Hiller
HIP, 2013
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
J Hiller, J Pennekamp, M Dahlmanns, M Henze, A Panchenko, K Wehrle
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
J Pennekamp, J Hiller, S Reuter, AW de La Cadena Ramos, A Mitseva, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20