Jens Hiller
Jens Hiller
Verified email at - Homepage
Cited by
Cited by
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
International Conference on Financial Cryptography and Data Security, 420-438, 2018
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
Slimfit—A HIP DEX compression layer for the IP-based Internet of Things
R Hummen, J Hiller, M Henze, K Wehrle
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
A first look at certification authority authorization (caa)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
Cppl: Compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Moving privacy-sensitive services from public clouds to decentralized private clouds
M Henze, J Hiller, O Hohlfeld, K Wehrle
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC Medical Genomics 10 (2), 44, 2017
Tailoring onion routing to the Internet of Things: Security and privacy in untrusted environments
J Hiller, J Pennekamp, M Dahlmanns, M Henze, A Panchenko, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-12, 2019
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J van der Giet, ...
2017 IEEE International Conference on Cloud Engineering (IC2E), 252-258, 2017
Secure low latency communication for constrained industrial iot scenarios
J Hiller, M Henze, M Serror, E Wagner, JN Richter, K Wehrle
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 614-622, 2018
Towards transparent information on individual cloud service usage
M Henze, D Kerpen, J Hiller, M Eggert, D Hellmanns, E Mühmer, O Renuli, ...
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Privacy-preserving remote knowledge system
M Dahlmanns, C Dax, R Matzutt, J Pennekamp, J Hiller, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
Bandwidth-optimized secure two-party computation of minima
JH Ziegeldorf, J Hiller, M Henze, H Wirtz, K Wehrle
International Conference on Cryptology and Network Security, 197-213, 2015
SSICLOPS Deliverable 2. 1: Report on Body of Knowledge in Secure Cloud Data Storage
F Eberhardt, M Plauth, A Polze, S Klauck, M Uflacker, J Hiller, O Hohlfeld, ...
Technical report. June 2015. Bastian et al.: Facilitating Policy Adherence …, 2015
SPLIT: Smart Protocol Loading for the IoT.
T Zimmermann, J Hiller, H Reelfs, P Hein, K Wehrle
EWSN, 49-54, 2018
Design of Inter-Cloud Security Policies, Architecture, and Annotations for Data Storage
F Eberhardt, J Hiller, O Hohlfeld, S Klauck, M Plauth, A Polze, M Uflacker, ...
Technical report. Hasso Plattner Institute, University of Potsdam, 2016
Measuring Adoption of Security Additions to the HTTPS Ecosystem
Q Scheitle, T Chung, J Amann, O Gasser, L Brent, G Carle, R Holz, J Hiller, ...
Proceedings of the Applied Networking Research Workshop, 1-2, 2018
The system can't perform the operation now. Try again later.
Articles 1–20