Jan Henrik Ziegeldorf
Jan Henrik Ziegeldorf
Communication and Distributed Systems, RWTH Aachen
Verified email at comsys.rwth-aachen.de - Homepage
TitleCited byYear
Privacy in the Internet of Things: threats and challenges
JH Ziegeldorf, OG Morchon, K Wehrle
Security and Communication Networks 7 (12), 2728-2742, 2014
2752014
Towards viable certificate-based authentication for the internet of things
R Hummen, JH Ziegeldorf, H Shafagh, S Raza, K Wehrle
Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013
1032013
Securing the IP-based internet of things with HIP and DTLS
O Garcia-Morchon, SL Keoh, S Kumar, P Moreno-Sanchez, F Vidal-Meca, ...
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
822013
Coinparty: Secure multi-party mixing of bitcoins
JH Ziegeldorf, F Grossmann, M Henze, N Inden, K Wehrle
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
752015
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
622013
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
Proceedings of the 22nd International Conference on Financial Cryptography …, 2018
492018
HIP security architecture for the IP-based internet of things
FV Meca, JH Ziegeldorf, PM Sanchez, OG Morchon, SS Kumar, SL Keoh
2013 27th International Conference on Advanced Information Networking and …, 2013
362013
Secure and anonymous decentralized Bitcoin mixing
JH Ziegeldorf, R Matzutt, M Henze, F Grossmann, K Wehrle
Future Generation Computer Systems 80, 448-466, 2018
332018
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC medical genomics 10 (2), 44, 2017
132017
Like us on Facebook!–Analyzing user preferences regarding privacy settings in Germany
S Kowalewski, M Ziefle, H Ziegeldorf, K Wehrle
Procedia Manufacturing 3, 815-822, 2015
132015
Choose wisely: a comparison of secure two-party computation frameworks
JH Ziegeldorf, J Metzke, M Henze, K Wehrle
2015 IEEE Security and Privacy Workshops, 198-205, 2015
122015
CPPL: compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
112016
Comparison-based privacy: nudging privacy in social media (position paper)
JH Ziegeldorf, M Henze, R Hummen, K Wehrle
Data Privacy Management, and Security Assurance, 226-234, 2015
112015
Poster: Privacy-preserving indoor localization
JH Ziegeldorf, N Viol, M Henze, K Wehrle
arXiv preprint arXiv:1410.3270, 2014
112014
Poster: I don't want that content! on the risks of exploiting Bitcoin's blockchain as a content store
R Matzutt, O Hohlfeld, M Henze, R Rawiel, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
92016
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
82017
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
72018
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J van der Giet, ...
2017 IEEE International Conference on Cloud Engineering (IC2E), 252-258, 2017
72017
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps
M Henze, J Pennekamp, D Hellmanns, E Mühmer, JH Ziegeldorf, ...
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
52017
Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
M Henze, R Inaba, IB Fink, JH Ziegeldorf
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20