Roman Matzutt
Roman Matzutt
Communication and Distributed Systems, RWTH Aachen University, Germany
Bestätigte E-Mail-Adresse bei comsys.rwth-aachen.de
Titel
Zitiert von
Zitiert von
Jahr
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
International Conference on Financial Cryptography and Data Security, 420-438, 2018
1102018
Secure and anonymous decentralized Bitcoin mixing
JH Ziegeldorf, R Matzutt, M Henze, F Grossmann, K Wehrle
Future Generation Computer Systems 80, 448-466, 2018
732018
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
322018
A trust point-based security architecture for sensor data in the cloud
M Henze, R Hummen, R Matzutt, K Wehrle
Trusted Cloud Computing, 77-106, 2014
262014
Maintaining user control while storing and processing sensor data in the cloud
M Henze, R Hummen, R Matzutt, D Catrein, K Wehrle
International Journal of Grid and High Performance Computing (IJGHPC) 5 (4 …, 2013
262013
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC Medical Genomics 10 (2), 29-42, 2017
222017
Distributed configuration, authorization and management in the cloud-based internet of things
M Henze, B Wolters, R Matzutt, T Zimmermann, K Wehrle
2017 IEEE Trustcom/BigDataSE/ICESS, 185-192, 2017
202017
Poster: I don't want that content! on the risks of exploiting bitcoin's blockchain as a content store
R Matzutt, O Hohlfeld, M Henze, R Rawiel, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
162016
Smart contract-based car insurance policies
L Bader, JC Bürger, R Matzutt, K Wehrle
2018 IEEE Globecom Workshops (GC Wkshps), 1-7, 2018
152018
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
142017
Dispute resolution for smart contract-based two-party protocols
E Wagner, A Völker, F Fuhrmann, R Matzutt, K Wehrle
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
132019
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J Van Der Giet, ...
2017 IEEE International Conference on Cloud Engineering (IC2E), 252-258, 2017
122017
myneData: Towards a trusted and user-controlled ecosystem for sharing personal data
R Matzutt, D Müllmann, EM Zeissig, C Horst, K Kasugai, S Lidynia, ...
INFORMATIK 2017, 2017
92017
Privacy-preserving remote knowledge system
M Dahlmanns, C Dax, R Matzutt, J Pennekamp, J Hiller, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
82019
How to Securely Prune Bitcoin’s Blockchain
R Matzutt, B Kalde, J Pennekamp, A Drichel, M Henze, K Wehrle
2020 IFIP Networking Conference (Networking), 298-306, 2020
62020
Private Multi-Hop Accountability for Supply Chains
J Pennekamp, L Bader, R Matzutt, P Niemietz, D Trauth, M Henze, ...
2020 IEEE International Conference on Communications Workshops (ICC …, 2020
62020
Secure End-to-End Sensing in Supply Chains
J Pennekamp, F Alder, R Matzutt, JT Mühlberg, F Piessens, K Wehrle
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
32020
Complying with data handling requirements in cloud storage systems
M Henze, R Matzutt, J Hiller, M Erik, JH Ziegeldorf, J van der Giet, ...
IEEE Transactions on Cloud Computing, 2020
32020
The sensorcloud protocol: securely outsourcing sensor data to the cloud
M Henze, R Hummen, R Matzutt, K Wehrle
arXiv preprint arXiv:1607.03239, 2016
32016
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
R Matzutt, J Pennekamp, E Buchholz, K Wehrle
Proceedings of the 15th ACM ASIA Conference on Computer and Communications …, 2020
12020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20