On the security and privacy of Internet of Things architectures and systems E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras 2015 International Workshop on Secure Internet of Things (SIoT), 49-57, 2015 | 116 | 2015 |
A view on privacy & trust in IoT J Daubert, A Wiesmaier, P Kikiras 2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015 | 63 | 2015 |
Big data storage M Strohbach, J Daubert, H Ravkin, M Lischka New horizons for a data-driven economy, 119-141, 2016 | 45 | 2016 |
Beyond the hype: On using blockchains in trust management for authentication N Alexopoulos, J Daubert, M Mühlhäuser, SM Habib 2017 IEEE Trustcom/BigDataSE/ICESS, 546-553, 2017 | 38 | 2017 |
AnonPubSub: Anonymous publish-subscribe overlays J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser Computer Communications 76, 42-53, 2016 | 18 | 2016 |
End-2-End privacy architecture for IoT S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser 2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015 | 13 | 2015 |
Distributed and anonymous publish-subscribe J Daubert, M Fischer, S Schiffner, M Mühlhäuser International Conference on Network and System Security, 685-691, 2013 | 10 | 2013 |
Twitterize: Anonymous micro-blogging J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer 2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014 | 9 | 2014 |
Street lamps as a platform M Mühlhäuser, C Meurisch, M Stein, J Daubert, J Von Willich, J Riemann, ... Communications of the ACM 63 (6), 75-83, 2020 | 7 | 2020 |
Challenges and available solutions against organized cyber-crime and terrorist networks A TUNDIS, F HUBER, B JÄGER, J DAUBERT, E VASILOMANOLAKIS, ... WIT Transactions on the Built Environment 174, 429-441, 2018 | 7 | 2018 |
Internal attacks in anonymous publish-subscribe P2P overlays J Daubert, T Grube, M Mühlhäuser, M Fischer 2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015 | 7 | 2015 |
Cover traffic: A trade of anonymity and efficiency T Grube, M Thummerer, J Daubert, M Mühlhäuser International Workshop on Security and Trust Management, 213-223, 2017 | 6 | 2017 |
Beyond the hype: On using blockchains in trust management for authentication. In 2017 IEEE Trustcom/BigDataSE/ICESS N Alexopoulos, J Daubert, M Mühlhäuser, SM Habib Sydney, Australia. IEEE, 546-553, 2017 | 5 | 2017 |
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot J Daubert, D Boopalan, M Mühlhäuser, E Vasilomanolakis NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018 | 4 | 2018 |
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot. T Hasan, P Kikiras, A Leonardi, H Ziekow, J Daubert EAI Endorsed Trans. Cloud Syst. 1 (2), e2, 2015 | 4 | 2015 |
Efficient privacy-preserving recommendations based on social graphs A Wainakh, T Grube, J Daubert, M Mühlhäuser Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019 | 3 | 2019 |
Improving the Usability and UX of the Swiss Internet Voting Interface K Marky, V Zimmermann, M Funk, J Daubert, K Bleck, M Mühlhäuser Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 2 | 2020 |
Ant colonies for efficient and anonymous group communication systems T Grube, S Hauke, J Daubert, M Mühlhäuser 2017 International Conference on Networked Systems (NetSys), 1-8, 2017 | 2 | 2017 |
Ant colony optimisation—A solution to efficient anonymous group communication? T Grube, S Hauke, J Daubert, M Mühlhäuser 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017 | 2 | 2017 |
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks J Daubert, T Grube, M Mühlhäuser, M Fischer 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016 | 2 | 2016 |