BibTeX records: Martin Henze

download as .bib file

@inproceedings{DBLP:conf/acns/0003SWH24,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {When and How to Aggregate Message Authentication Codes on Lossy Channels?},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  pages        = {241--264},
  year         = {2024},
  crossref     = {DBLP:conf/acns/2024-2},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_10},
  doi          = {10.1007/978-3-031-54773-7\_10},
  timestamp    = {Tue, 05 Mar 2024 11:54:50 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/0003SWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-13306,
  author       = {Martin Henze and
                  Maximilian Ortmann and
                  Thomas Vogt and
                  Osman Ugus and
                  Kai Hermann and
                  Svenja Nohr and
                  Zeren Lu and
                  Sotiris Michaelides and
                  Angela Massonet and
                  Robert H. Schmitt},
  title        = {{POSTER:} Towards Secure 5G Infrastructures for Production Systems},
  journal      = {CoRR},
  volume       = {abs/2401.13306},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.13306},
  doi          = {10.48550/ARXIV.2401.13306},
  eprinttype    = {arXiv},
  eprint       = {2401.13306},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-13306.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-14599,
  author       = {{\"{O}}mer Sen and
                  Tarek Hassan and
                  Andreas Ulbig and
                  Martin Henze},
  title        = {Enhancing {SCADA} Security: Developing a Host-Based Intrusion Detection
                  System to Safeguard Against Cyberattacks},
  journal      = {CoRR},
  volume       = {abs/2402.14599},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14599},
  doi          = {10.48550/ARXIV.2402.14599},
  eprinttype    = {arXiv},
  eprint       = {2402.14599},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14599.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/PennekampLVLRSFSHJSWH23,
  author       = {Jan Pennekamp and
                  Johannes Lohm{\"{o}}ller and
                  Eduard Vlad and
                  Joscha Loos and
                  Niklas Rodemann and
                  Patrick Sapel and
                  Ina Berenice Fink and
                  Seth Schmitz and
                  Christian Hopmann and
                  Matthias Jarke and
                  G{\"{u}}nther Schuh and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Designing Secure and Privacy-Preserving Information Systems for Industry
                  Benchmarking},
  booktitle    = {Advanced Information Systems Engineering - 35th International Conference,
                  CAiSE 2023, Zaragoza, Spain, June 12-16, 2023, Proceedings},
  pages        = {489--505},
  year         = {2023},
  crossref     = {DBLP:conf/caise/2023},
  url          = {https://doi.org/10.1007/978-3-031-34560-9\_29},
  doi          = {10.1007/978-3-031-34560-9\_29},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/PennekampLVLRSFSHJSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BaderWHS23,
  author       = {Lennart Bader and
                  Eric Wagner and
                  Martin Henze and
                  Martin Serror},
  title        = {{METRICS:} {A} Methodology for Evaluating and Testing the Resilience
                  of Industrial Control Systems to Cyberattacks},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  pages        = {25--45},
  year         = {2023},
  crossref     = {DBLP:conf/esorics/2023w1},
  url          = {https://doi.org/10.1007/978-3-031-54204-6\_2},
  doi          = {10.1007/978-3-031-54204-6\_2},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BaderWHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WolsingKWPWH23,
  author       = {Konrad Wolsing and
                  Dominik Kus and
                  Eric Wagner and
                  Jan Pennekamp and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {One {IDS} Is Not Enough! Exploring Ensemble Learning for Industrial
                  Intrusion Detection},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  pages        = {102--122},
  year         = {2023},
  crossref     = {DBLP:conf/esorics/2023-2},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_6},
  doi          = {10.1007/978-3-031-51476-0\_6},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WolsingKWPWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BaderSLSVHFPH23,
  author       = {Lennart Bader and
                  Martin Serror and
                  Olav Lamberts and
                  {\"{O}}mer Sen and
                  Dennis van der Velde and
                  Immanuel Hacker and
                  Julian Filter and
                  Elmar Padilla and
                  Martin Henze},
  title        = {Comprehensively Analyzing the Impact of Cyberattacks on Power Grids},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {1065--1081},
  year         = {2023},
  crossref     = {DBLP:conf/eurosp/2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00066},
  doi          = {10.1109/EUROSP57164.2023.00066},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BaderSLSVHFPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgteurope/SenGHU23,
  author       = {{\"{O}}mer Sen and
                  Simon Glomb and
                  Martin Henze and
                  Andreas Ulbig},
  title        = {Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems
                  in the Context of Smart Grids},
  booktitle    = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} {EUROPE}
                  2023, Grenoble, France, October 23-26, 2023},
  pages        = {1--6},
  year         = {2023},
  crossref     = {DBLP:conf/isgteurope/2023},
  url          = {https://doi.org/10.1109/ISGTEUROPE56780.2023.10407262},
  doi          = {10.1109/ISGTEUROPE56780.2023.10407262},
  timestamp    = {Sat, 24 Feb 2024 13:29:08 +0100},
  biburl       = {https://dblp.org/rec/conf/isgteurope/SenGHU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/0003RWBWH23,
  author       = {Eric Wagner and
                  Nils Rothaug and
                  Konrad Wolsing and
                  Lennart Bader and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Retrofitting Integrity Protection into Unused Header Fields of Legacy
                  Industrial Protocols},
  booktitle    = {48th {IEEE} Conference on Local Computer Networks, {LCN} 2023, Daytona
                  Beach, FL, USA, October 1-5, 2023},
  pages        = {1--9},
  year         = {2023},
  crossref     = {DBLP:conf/lcn/2023},
  url          = {https://doi.org/10.1109/LCN58197.2023.10223384},
  doi          = {10.1109/LCN58197.2023.10223384},
  timestamp    = {Tue, 16 Apr 2024 16:33:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/0003RWBWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09390,
  author       = {Lennart Bader and
                  Martin Serror and
                  Olav Lamberts and
                  {\"{O}}mer Sen and
                  Dennis van der Velde and
                  Immanuel Hacker and
                  Julian Filter and
                  Elmar Padilla and
                  Martin Henze},
  title        = {Comprehensively Analyzing the Impact of Cyberattacks on Power Grids},
  journal      = {CoRR},
  volume       = {abs/2305.09390},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09390},
  doi          = {10.48550/ARXIV.2305.09390},
  eprinttype    = {arXiv},
  eprint       = {2305.09390},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-10151,
  author       = {Jan Pennekamp and
                  Anastasiia Belova and
                  Thomas Bergs and
                  Matthias Bodenbenner and
                  Andreas B{\"{u}}hrig{-}Polaczek and
                  Markus Dahlmanns and
                  Ike Kunze and
                  Moritz Kr{\"{o}}ger and
                  Sandra Geisler and
                  Martin Henze and
                  Daniel L{\"{u}}tticke and
                  Benjamin Montavon and
                  Philipp Niemietz and
                  Lucia Ortjohann and
                  Maximilian Rudack and
                  Robert H. Schmitt and
                  Uwe Vroomen and
                  Klaus Wehrle and
                  Michael Zeng},
  title        = {Evolving the Digital Industrial Infrastructure for Production: Steps
                  Taken and the Road Ahead},
  journal      = {CoRR},
  volume       = {abs/2305.10151},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.10151},
  doi          = {10.48550/ARXIV.2305.10151},
  eprinttype    = {arXiv},
  eprint       = {2305.10151},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-10151.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-01338,
  author       = {J{\"{o}}rn Bodenhausen and
                  Christian Sorgatz and
                  Thomas Vogt and
                  Kolja Grafflage and
                  Sebastian R{\"{o}}tzel and
                  Michael Rademacher and
                  Martin Henze},
  title        = {Securing Wireless Communication in Critical Infrastructure: Challenges
                  and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2311.01338},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.01338},
  doi          = {10.48550/ARXIV.2311.01338},
  eprinttype    = {arXiv},
  eprint       = {2311.01338},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-01338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-02929,
  author       = {Olav Lamberts and
                  Konrad Wolsing and
                  Eric Wagner and
                  Jan Pennekamp and
                  Jan Bauer and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {SoK: Evaluations in Industrial Intrusion Detection Research},
  journal      = {CoRR},
  volume       = {abs/2311.02929},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.02929},
  doi          = {10.48550/ARXIV.2311.02929},
  eprinttype    = {arXiv},
  eprint       = {2311.02929},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-02929.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-10197,
  author       = {Rafael Uetz and
                  Marco Herzog and
                  Louis Hackl{\"{a}}nder and
                  Simon Schwarz and
                  Martin Henze},
  title        = {You Cannot Escape Me: Detecting Evasions of {SIEM} Rules in Enterprise
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2311.10197},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.10197},
  doi          = {10.48550/ARXIV.2311.10197},
  eprinttype    = {arXiv},
  eprint       = {2311.10197},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-10197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-09650,
  author       = {Eric Wagner and
                  David Heye and
                  Martin Serror and
                  Ike Kunze and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial
                  Communication},
  journal      = {CoRR},
  volume       = {abs/2312.09650},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.09650},
  doi          = {10.48550/ARXIV.2312.09650},
  eprinttype    = {arXiv},
  eprint       = {2312.09650},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-09650.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-09660,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {When and How to Aggregate Message Authentication Codes on Lossy Channels?},
  journal      = {CoRR},
  volume       = {abs/2312.09660},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.09660},
  doi          = {10.48550/ARXIV.2312.09660},
  eprinttype    = {arXiv},
  eprint       = {2312.09660},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-09660.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13697,
  author       = {{\"{O}}mer Sen and
                  Bozhidar Ivanov and
                  Martin Henze and
                  Andreas Ulbig},
  title        = {Investigation of Multi-stage Attack and Defense Simulation for Data
                  Synthesis},
  journal      = {CoRR},
  volume       = {abs/2312.13697},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13697},
  doi          = {10.48550/ARXIV.2312.13697},
  eprinttype    = {arXiv},
  eprint       = {2312.13697},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13697.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13705,
  author       = {{\"{O}}mer Sen and
                  Simon Glomb and
                  Martin Henze and
                  Andreas Ulbig},
  title        = {Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems
                  in the Context of Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2312.13705},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13705},
  doi          = {10.48550/ARXIV.2312.13705},
  eprinttype    = {arXiv},
  eprint       = {2312.13705},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13705.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13737,
  author       = {{\"{O}}mer Sen and
                  Philipp Malskorn and
                  Simon Glomb and
                  Immanuel Hacker and
                  Martin Henze and
                  Andreas Ulbig},
  title        = {An Approach to Abstract Multi-stage Cyberattack Data Generation for
                  ML-Based {IDS} in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2312.13737},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13737},
  doi          = {10.48550/ARXIV.2312.13737},
  eprinttype    = {arXiv},
  eprint       = {2312.13737},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WagnerSWH23,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {When and How to Aggregate Message Authentication Codes on Lossy Channels?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1919},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1919},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WagnerSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eninf/SenVLSHUAH22,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Maik L{\"{u}}hman and
                  Florian Spr{\"{u}}nken and
                  Immanuel Hacker and
                  Andreas Ulbig and
                  Michael Andres and
                  Martin Henze},
  title        = {On specification-based cyber-attack detection in smart grids},
  journal      = {Energy Inform.},
  volume       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1186/s42162-022-00206-7},
  doi          = {10.1186/S42162-022-00206-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eninf/SenVLSHUAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/HenzeMHMZGW22,
  author       = {Martin Henze and
                  Roman Matzutt and
                  Jens Hiller and
                  Erik M{\"{u}}hmer and
                  Jan Henrik Ziegeldorf and
                  Johannes van der Giet and
                  Klaus Wehrle},
  title        = {Complying With Data Handling Requirements in Cloud Storage Systems},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {3},
  pages        = {1661--1674},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.3000336},
  doi          = {10.1109/TCC.2020.3000336},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/HenzeMHMZGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/DahlmannsLPBWH22,
  author       = {Markus Dahlmanns and
                  Johannes Lohm{\"{o}}ller and
                  Jan Pennekamp and
                  J{\"{o}}rn Bodenhausen and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Missed Opportunities: Measuring the Untapped {TLS} Support in the
                  Industrial Internet of Things},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {252--266},
  year         = {2022},
  crossref     = {DBLP:conf/asiaccs/2022},
  url          = {https://doi.org/10.1145/3488932.3497762},
  doi          = {10.1145/3488932.3497762},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/DahlmannsLPBWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SerrorBHSN22,
  author       = {Martin Serror and
                  Lennart Bader and
                  Martin Henze and
                  Arne Schwarze and
                  Kai N{\"{u}}rnberger},
  title        = {Poster: {INSIDE} - Enhancing Network Intrusion Detection in Power
                  Grids with Automated Facility Monitoring},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3463--3465},
  year         = {2022},
  crossref     = {DBLP:conf/ccs/2022},
  url          = {https://doi.org/10.1145/3548606.3563500},
  doi          = {10.1145/3548606.3563500},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SerrorBHSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/Kus0PWFDWH22,
  author       = {Dominik Kus and
                  Eric Wagner and
                  Jan Pennekamp and
                  Konrad Wolsing and
                  Ina Berenice Fink and
                  Markus Dahlmanns and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {A False Sense of Security?: Revisiting the State of Machine Learning-Based
                  Industrial Intrusion Detection},
  booktitle    = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {73--84},
  year         = {2022},
  crossref     = {DBLP:conf/cpss/2022},
  url          = {https://doi.org/10.1145/3494107.3522773},
  doi          = {10.1145/3494107.3522773},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpss/Kus0PWFDWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WolsingTSWWH22,
  author       = {Konrad Wolsing and
                  Lea Thiemt and
                  Christian van Sloun and
                  Eric Wagner and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Can Industrial Intrusion Detection Be SIMPLE?},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  pages        = {574--594},
  year         = {2022},
  crossref     = {DBLP:conf/esorics/2022-3},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_28},
  doi          = {10.1007/978-3-031-17143-7\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WolsingTSWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/WagnerMPBBWH22,
  author       = {Eric Wagner and
                  Roman Matzutt and
                  Jan Pennekamp and
                  Lennart Bader and
                  Irakli Bajelidze and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Scalable and Privacy-Focused Company-Centric Supply Chain Management},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2022, Shanghai, China, May 2-5, 2022},
  pages        = {1--5},
  year         = {2022},
  crossref     = {DBLP:conf/icbc2/2022},
  url          = {https://doi.org/10.1109/ICBC54727.2022.9805503},
  doi          = {10.1109/ICBC54727.2022.9805503},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbc2/WagnerMPBBWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/WolsingSBWSFSWH22,
  author       = {Konrad Wolsing and
                  Antoine Saillard and
                  Jan Bauer and
                  Eric Wagner and
                  Christian van Sloun and
                  Ina Berenice Fink and
                  Mari Schmidt and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Network Attacks Against Marine Radar Systems: {A} Taxonomy, Simulation
                  Environment, and Dataset},
  booktitle    = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton,
                  AB, Canada, September 26-29, 2022},
  pages        = {114--122},
  year         = {2022},
  crossref     = {DBLP:conf/lcn/2022},
  url          = {https://doi.org/10.1109/LCN53696.2022.9843801},
  doi          = {10.1109/LCN53696.2022.9843801},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/WolsingSBWSFSWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Wolsing0SH22,
  author       = {Konrad Wolsing and
                  Eric Wagner and
                  Antoine Saillard and
                  Martin Henze},
  title        = {{IPAL:} Breaking up Silos of Protocol-dependent and Domain-specific
                  Industrial Intrusion Detection Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {510--525},
  year         = {2022},
  crossref     = {DBLP:conf/raid/2022},
  url          = {https://doi.org/10.1145/3545948.3545968},
  doi          = {10.1145/3545948.3545968},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Wolsing0SH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZemanekHW0HS22,
  author       = {Sven Zemanek and
                  Immanuel Hacker and
                  Konrad Wolsing and
                  Eric Wagner and
                  Martin Henze and
                  Martin Serror},
  title        = {PowerDuck: {A} {GOOSE} Data Set of Cyberattacks in Substations},
  booktitle    = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual
                  Event, 8 August 2022},
  pages        = {49--53},
  year         = {2022},
  crossref     = {DBLP:conf/uss/2022cset},
  url          = {https://doi.org/10.1145/3546096.3546102},
  doi          = {10.1145/3546096.3546102},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZemanekHW0HS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0003SWH22,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {{BP-MAC:} Fast Authentication for Short Messages},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {201--206},
  year         = {2022},
  crossref     = {DBLP:conf/wisec/2022},
  url          = {https://doi.org/10.1145/3507657.3528554},
  doi          = {10.1145/3507657.3528554},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/0003SWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0003BH22,
  author       = {Eric Wagner and
                  Jan Bauer and
                  Martin Henze},
  title        = {Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive
                  Message Authentication Codes},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {207--221},
  year         = {2022},
  crossref     = {DBLP:conf/wisec/2022},
  url          = {https://doi.org/10.1145/3507657.3528539},
  doi          = {10.1145/3507657.3528539},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/0003BH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-09199,
  author       = {Dominik Kus and
                  Eric Wagner and
                  Jan Pennekamp and
                  Konrad Wolsing and
                  Ina Berenice Fink and
                  Markus Dahlmanns and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {A False Sense of Security? Revisiting the State of Machine Learning-Based
                  Industrial Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2205.09199},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.09199},
  doi          = {10.48550/ARXIV.2205.09199},
  eprinttype    = {arXiv},
  eprint       = {2205.09199},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-09199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-09635,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {{BP-MAC:} Fast Authentication for Short Messages},
  journal      = {CoRR},
  volume       = {abs/2205.09635},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.09635},
  doi          = {10.48550/ARXIV.2205.09635},
  eprinttype    = {arXiv},
  eprint       = {2205.09635},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-09635.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-10961,
  author       = {Eric Wagner and
                  Roman Matzutt and
                  Jan Pennekamp and
                  Lennart Bader and
                  Irakli Bajelidze and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Scalable and Privacy-Focused Company-Centric Supply Chain Management},
  journal      = {CoRR},
  volume       = {abs/2205.10961},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.10961},
  doi          = {10.48550/ARXIV.2205.10961},
  eprinttype    = {arXiv},
  eprint       = {2205.10961},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-10961.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-00322,
  author       = {Markus Dahlmanns and
                  Johannes Lohm{\"{o}}ller and
                  Jan Pennekamp and
                  J{\"{o}}rn Bodenhausen and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Missed Opportunities: Measuring the Untapped {TLS} Support in the
                  Industrial Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2206.00322},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.00322},
  doi          = {10.48550/ARXIV.2206.00322},
  eprinttype    = {arXiv},
  eprint       = {2206.00322},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-00322.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-04716,
  author       = {Sven Zemanek and
                  Immanuel Hacker and
                  Konrad Wolsing and
                  Eric Wagner and
                  Martin Henze and
                  Martin Serror},
  title        = {PowerDuck: {A} {GOOSE} Data Set of Cyberattacks in Substations},
  journal      = {CoRR},
  volume       = {abs/2207.04716},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.04716},
  doi          = {10.48550/ARXIV.2207.04716},
  eprinttype    = {arXiv},
  eprint       = {2207.04716},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-04716.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04354,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Maik L{\"{u}}hman and
                  Florian Spr{\"{u}}nken and
                  Immanuel Hacker and
                  Andreas Ulbig and
                  Michael Andres and
                  Martin Henze},
  title        = {On Specification-based Cyber-Attack Detection in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2209.04354},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04354},
  doi          = {10.48550/ARXIV.2209.04354},
  eprinttype    = {arXiv},
  eprint       = {2209.04354},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04354.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KrauseEKHH21,
  author       = {Tim Krause and
                  Raphael Ernst and
                  Benedikt Klaer and
                  Immanuel Hacker and
                  Martin Henze},
  title        = {Cybersecurity in Power Grids: Challenges and Opportunities},
  journal      = {Sensors},
  volume       = {21},
  number       = {18},
  pages        = {6225},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21186225},
  doi          = {10.3390/S21186225},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KrauseEKHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SerrorHHSW21,
  author       = {Martin Serror and
                  Sacha Hack and
                  Martin Henze and
                  Marko Schuba and
                  Klaus Wehrle},
  title        = {Challenges and Opportunities in Securing the Industrial Internet of
                  Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {5},
  pages        = {2985--2996},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3023507},
  doi          = {10.1109/TII.2020.3023507},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/SerrorHHSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MatzuttKPDHW21,
  author       = {Roman Matzutt and
                  Benedikt Kalde and
                  Jan Pennekamp and
                  Arthur Drichel and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {3064--3078},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3073270},
  doi          = {10.1109/TNSM.2021.3073270},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/MatzuttKPDHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UetzHHSH21,
  author       = {Rafael Uetz and
                  Christian Hemminghaus and
                  Louis Hackl{\"{a}}nder and
                  Philipp Schlipper and
                  Martin Henze},
  title        = {Reproducible and Adaptable Log Data Generation for Sound Cybersecurity
                  Experiments},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {690--705},
  year         = {2021},
  crossref     = {DBLP:conf/acsac/2021},
  url          = {https://doi.org/10.1145/3485832.3488020},
  doi          = {10.1145/3485832.3488020},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UetzHHSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/DahlmannsPFSWH21,
  author       = {Markus Dahlmanns and
                  Jan Pennekamp and
                  Ina Berenice Fink and
                  Bernd Schoolmann and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Transparent End-to-End Security for Publish/Subscribe Communication
                  in Cyber-Physical Systems},
  booktitle    = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  pages        = {78--87},
  year         = {2021},
  crossref     = {DBLP:conf/codaspy/2021sat-cps},
  url          = {https://doi.org/10.1145/3445969.3450423},
  doi          = {10.1145/3445969.3450423},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/DahlmannsPFSWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgteurope/SenVLHHAU21,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Philipp Linnartz and
                  Immanuel Hacker and
                  Martin Henze and
                  Michael Andres and
                  Andreas Ulbig},
  title        = {Investigating Man-in-the-Middle-based False Data Injection in a Smart
                  Grid Laboratory Environment},
  booktitle    = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} Europe
                  2021, Espoo, Finland, October 18-21, 2021},
  pages        = {1--6},
  year         = {2021},
  crossref     = {DBLP:conf/isgteurope/2021},
  url          = {https://doi.org/10.1109/ISGTEurope52324.2021.9640002},
  doi          = {10.1109/ISGTEUROPE52324.2021.9640002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgteurope/SenVLHHAU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/RademacherLHH21,
  author       = {Michael Rademacher and
                  Hendrik Linka and
                  Thorsten Horstmann and
                  Martin Henze},
  title        = {Path Loss in Urban LoRa Networks: {A} Large-Scale Measurement Study},
  booktitle    = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  pages        = {1--6},
  year         = {2021},
  crossref     = {DBLP:conf/vtc/2021f},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625531},
  doi          = {10.1109/VTC2021-FALL52928.2021.9625531},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/RademacherLHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08560,
  author       = {Eric Wagner and
                  Jan Bauer and
                  Martin Henze},
  title        = {Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive
                  Message Authentication Codes},
  journal      = {CoRR},
  volume       = {abs/2103.08560},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08560},
  eprinttype    = {arXiv},
  eprint       = {2103.08560},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00013,
  author       = {Tim Krause and
                  Raphael Ernst and
                  Benedikt Klaer and
                  Immanuel Hacker and
                  Martin Henze},
  title        = {Cybersecurity in Power Grids: Challenges and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2105.00013},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00013},
  eprinttype    = {arXiv},
  eprint       = {2105.00013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02336,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Katharina A. Wehrmeister and
                  Immanuel Hacker and
                  Martin Henze and
                  Michael Andres},
  title        = {Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks
                  in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2109.02336},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02336},
  eprinttype    = {arXiv},
  eprint       = {2109.02336},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-07768,
  author       = {Michael Rademacher and
                  Hendrik Linka and
                  Thorsten Horstmann and
                  Martin Henze},
  title        = {Path Loss in Urban LoRa Networks: {A} Large-Scale Measurement Study},
  journal      = {CoRR},
  volume       = {abs/2109.07768},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.07768},
  eprinttype    = {arXiv},
  eprint       = {2109.07768},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-07768.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-02040,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Sebastian N. Peters and
                  Martin Henze},
  title        = {An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures
                  in a Smart Grid Co-Simulation Environment},
  journal      = {CoRR},
  volume       = {abs/2110.02040},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.02040},
  eprinttype    = {arXiv},
  eprint       = {2110.02040},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-02040.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-09162,
  author       = {{\"{O}}mer Sen and
                  Dennis van der Velde and
                  Philipp Linnartz and
                  Immanuel Hacker and
                  Martin Henze and
                  Michael Andres and
                  Andreas Ulbig},
  title        = {Investigating Man-in-the-Middle-based False Data Injection in a Smart
                  Grid Laboratory Environment},
  journal      = {CoRR},
  volume       = {abs/2110.09162},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.09162},
  eprinttype    = {arXiv},
  eprint       = {2110.09162},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-09162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03438,
  author       = {Konrad Wolsing and
                  Eric Wagner and
                  Antoine Saillard and
                  Martin Henze},
  title        = {{IPAL:} Breaking up Silos of Protocol-dependent and Domain-specific
                  Industrial Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2111.03438},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03438},
  eprinttype    = {arXiv},
  eprint       = {2111.03438},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03438.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-07847,
  author       = {Rafael Uetz and
                  Christian Hemminghaus and
                  Louis Hackl{\"{a}}nder and
                  Philipp Schlipper and
                  Martin Henze},
  title        = {Reproducible and Adaptable Log Data Generation for Sound Cybersecurity
                  Experiments},
  journal      = {CoRR},
  volume       = {abs/2111.07847},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.07847},
  eprinttype    = {arXiv},
  eprint       = {2111.07847},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-07847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11714,
  author       = {Martin Serror and
                  Sacha Hack and
                  Martin Henze and
                  Marko Schuba and
                  Klaus Wehrle},
  title        = {Challenges and Opportunities in Securing the Industrial Internet of
                  Things},
  journal      = {CoRR},
  volume       = {abs/2111.11714},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11714},
  eprinttype    = {arXiv},
  eprint       = {2111.11714},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-13525,
  author       = {Roman Matzutt and
                  Benedikt Kalde and
                  Jan Pennekamp and
                  Arthur Drichel and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively},
  journal      = {CoRR},
  volume       = {abs/2111.13525},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.13525},
  eprinttype    = {arXiv},
  eprint       = {2111.13525},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-13525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-11417,
  author       = {Jan Pennekamp and
                  Erik Buchholz and
                  Markus Dahlmanns and
                  Ike Kunze and
                  Stefan Braun and
                  Eric Wagner and
                  Matthias Brockmann and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Collaboration is not Evil: {A} Systematic Look at Security Research
                  for Industrial Use},
  journal      = {CoRR},
  volume       = {abs/2112.11417},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.11417},
  eprinttype    = {arXiv},
  eprint       = {2112.11417},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-11417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/PennekampHW21,
  author       = {Jan Pennekamp and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Unlocking Secure Industrial Collaborations through Privacy-Preserving
                  Computation},
  journal      = {{ERCIM} News},
  volume       = {2021},
  number       = {126},
  year         = {2021},
  url          = {https://ercim-news.ercim.eu/en126/special/unlocking-secure-industrial-collaborations-through-privacy-preserving-computation},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/PennekampHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HenzeBFLOV20,
  author       = {Martin Henze and
                  Lennart Bader and
                  Julian Filter and
                  Olav Lamberts and
                  Simon Ofner and
                  Dennis van der Velde},
  title        = {Cybersecurity Research and Training for Power Distribution Grids -
                  {A} Blueprint},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2097--2099},
  year         = {2020},
  crossref     = {DBLP:conf/ccs/2020},
  url          = {https://doi.org/10.1145/3372297.3420016},
  doi          = {10.1145/3372297.3420016},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HenzeBFLOV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WolsingWH20,
  author       = {Konrad Wolsing and
                  Eric Wagner and
                  Martin Henze},
  title        = {Facilitating Protocol-independent Industrial Intrusion Detection Systems},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2105--2107},
  year         = {2020},
  crossref     = {DBLP:conf/ccs/2020},
  url          = {https://doi.org/10.1145/3372297.3420019},
  doi          = {10.1145/3372297.3420019},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WolsingWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Henze20,
  author       = {Martin Henze},
  title        = {The Quest for Secure and Privacy-preserving Cloud-based Industrial
                  Cooperation},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--5},
  year         = {2020},
  crossref     = {DBLP:conf/cns/2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162199},
  doi          = {10.1109/CNS48642.2020.9162199},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Henze20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PennekampBMNTHB20,
  author       = {Jan Pennekamp and
                  Lennart Bader and
                  Roman Matzutt and
                  Philipp Niemietz and
                  Daniel Trauth and
                  Martin Henze and
                  Thomas Bergs and
                  Klaus Wehrle},
  title        = {Private Multi-Hop Accountability for Supply Chains},
  booktitle    = {2020 {IEEE} International Conference on Communications Workshops,
                  {ICC} Workshops 2020, Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  year         = {2020},
  crossref     = {DBLP:conf/icc/2020w},
  url          = {https://doi.org/10.1109/ICCWorkshops49005.2020.9145100},
  doi          = {10.1109/ICCWORKSHOPS49005.2020.9145100},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PennekampBMNTHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DahlmannsLFPWH20,
  author       = {Markus Dahlmanns and
                  Johannes Lohm{\"{o}}ller and
                  Ina Berenice Fink and
                  Jan Pennekamp and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Easing the Conscience with {OPC} {UA:} An Internet-Wide Study on Insecure
                  Deployments},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {101--110},
  year         = {2020},
  crossref     = {DBLP:conf/imc/2020},
  url          = {https://doi.org/10.1145/3419394.3423666},
  doi          = {10.1145/3419394.3423666},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/DahlmannsLFPWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MatzuttKPDHW20,
  author       = {Roman Matzutt and
                  Benedikt Kalde and
                  Jan Pennekamp and
                  Arthur Drichel and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {How to Securely Prune Bitcoin's Blockchain},
  booktitle    = {2020 {IFIP} Networking Conference, Networking 2020, Paris, France,
                  June 22-26, 2020},
  pages        = {298--306},
  year         = {2020},
  crossref     = {DBLP:conf/networking/2020},
  url          = {https://ieeexplore.ieee.org/document/9142720},
  timestamp    = {Thu, 23 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MatzuttKPDHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06185,
  author       = {Dennis van der Velde and
                  Martin Henze and
                  Philipp Kathmann and
                  Erik Wassermann and
                  Michael Andres and
                  Detert Bracht and
                  Raphael Ernst and
                  George Hallak and
                  Benedikt Klaer and
                  Philipp Linnartz and
                  Benjamin Meyer and
                  Simon Ofner and
                  Tobias Pletzer and
                  Richard Sethmann},
  title        = {Methods for Actors in the Electric Power System to Prevent, Detect
                  and React to {ICT} Attacks and Failures},
  journal      = {CoRR},
  volume       = {abs/2003.06185},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06185},
  eprinttype    = {arXiv},
  eprint       = {2003.06185},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06185.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-12341,
  author       = {Linus Roepert and
                  Markus Dahlmanns and
                  Ina Berenice Fink and
                  Jan Pennekamp and
                  Martin Henze},
  title        = {Assessing the Security of {OPC} {UA} Deployments},
  journal      = {CoRR},
  volume       = {abs/2003.12341},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.12341},
  eprinttype    = {arXiv},
  eprint       = {2003.12341},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06911,
  author       = {Roman Matzutt and
                  Benedikt Kalde and
                  Jan Pennekamp and
                  Arthur Drichel and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {How to Securely Prune Bitcoin's Blockchain},
  journal      = {CoRR},
  volume       = {abs/2004.06911},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.06911},
  eprinttype    = {arXiv},
  eprint       = {2004.06911},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-06911.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-00273,
  author       = {Benedikt Klaer and
                  {\"{O}}mer Sen and
                  Dennis van der Velde and
                  Immanuel Hacker and
                  Michael Andres and
                  Martin Henze},
  title        = {Graph-based Model of Smart Grid Architectures},
  journal      = {CoRR},
  volume       = {abs/2009.00273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.00273},
  eprinttype    = {arXiv},
  eprint       = {2009.00273},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-00273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13539,
  author       = {Markus Dahlmanns and
                  Johannes Lohm{\"{o}}ller and
                  Ina Berenice Fink and
                  Jan Pennekamp and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Easing the Conscience with {OPC} {UA:} An Internet-Wide Study on Insecure
                  Deployments},
  journal      = {CoRR},
  volume       = {abs/2010.13539},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13539},
  eprinttype    = {arXiv},
  eprint       = {2010.13539},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PennekampSFWRHW20,
  author       = {Jan Pennekamp and
                  Patrick Sapel and
                  Ina Berenice Fink and
                  Simon Wagner and
                  Sebastian Reuter and
                  Christian Hopmann and
                  Klaus Wehrle and
                  Martin Henze},
  title        = {Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1512},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1512},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PennekampSFWRHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PennekampHSNFTB19,
  author       = {Jan Pennekamp and
                  Martin Henze and
                  Simo Schmidt and
                  Philipp Niemietz and
                  Marcel Fey and
                  Daniel Trauth and
                  Thomas Bergs and
                  Christian Brecher and
                  Klaus Wehrle},
  title        = {Dataflow Challenges in an Internet of Production: {A} Security {\&}
                  Privacy Perspective},
  booktitle    = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  pages        = {27--38},
  year         = {2019},
  crossref     = {DBLP:conf/ccs/2019cpsspc},
  url          = {https://doi.org/10.1145/3338499.3357357},
  doi          = {10.1145/3338499.3357357},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PennekampHSNFTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GlebkeHWNTMB19,
  author       = {Ren{\'{e}} Glebke and
                  Martin Henze and
                  Klaus Wehrle and
                  Philipp Niemietz and
                  Daniel Trauth and
                  Patrick Mattfeld and
                  Thomas Bergs},
  title        = {A Case for Integrated Data Processing in Large-Scale Cyber-Physical
                  Systems},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  year         = {2019},
  crossref     = {DBLP:conf/hicss/2019},
  url          = {https://hdl.handle.net/10125/60162},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GlebkeHWNTMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/HillerPDH0W19,
  author       = {Jens Hiller and
                  Jan Pennekamp and
                  Markus Dahlmanns and
                  Martin Henze and
                  Andriy Panchenko and
                  Klaus Wehrle},
  title        = {Tailoring Onion Routing to the Internet of Things: Security and Privacy
                  in Untrusted Environments},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--12},
  year         = {2019},
  crossref     = {DBLP:conf/icnp/2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888033},
  doi          = {10.1109/ICNP.2019.8888033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/HillerPDH0W19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/PennekampHRCMH019,
  author       = {Jan Pennekamp and
                  Jens Hiller and
                  Sebastian Reuter and
                  Wladimir De la Cadena and
                  Asya Mitseva and
                  Martin Henze and
                  Thomas Engel and
                  Klaus Wehrle and
                  Andriy Panchenko},
  title        = {Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--2},
  year         = {2019},
  crossref     = {DBLP:conf/icnp/2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888029},
  doi          = {10.1109/ICNP.2019.8888029},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/PennekampHRCMH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphys/PennekampGHMQHG19,
  author       = {Jan Pennekamp and
                  Ren{\'{e}} Glebke and
                  Martin Henze and
                  Tobias Meisen and
                  Christoph Quix and
                  Rihan Hai and
                  Lars Christoph Gleim and
                  Philipp Niemietz and
                  Maximilian Rudack and
                  Simon Knape and
                  Alexander Epple and
                  Daniel Trauth and
                  Uwe Vroomen and
                  Thomas Bergs and
                  Christian Brecher and
                  Andreas B{\"{u}}hrig{-}Polaczek and
                  Matthias Jarke and
                  Klaus Wehrle},
  title        = {Towards an Infrastructure Enabling the Internet of Production},
  booktitle    = {{IEEE} International Conference on Industrial Cyber Physical Systems,
                  {ICPS} 2019, Taipei, Taiwan, May 6-9, 2019},
  pages        = {31--37},
  year         = {2019},
  crossref     = {DBLP:conf/icphys/2019},
  url          = {https://doi.org/10.1109/ICPHYS.2019.8780276},
  doi          = {10.1109/ICPHYS.2019.8780276},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icphys/PennekampGHMQHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/HillerHZHW19,
  author       = {Jens Hiller and
                  Martin Henze and
                  Torsten Zimmermann and
                  Oliver Hohlfeld and
                  Klaus Wehrle},
  title        = {The Case for Session Sharing: Relieving Clients from {TLS} Handshake
                  Overheads},
  booktitle    = {2019 {IEEE} 44th {LCN} Symposium on Emerging Topics in Networking
                  {(LCN} Symposium), Osnabr{\"{u}}ck, Germany, October 14-17, 2019},
  pages        = {83--91},
  year         = {2019},
  crossref     = {DBLP:conf/lcn/2019s},
  url          = {https://doi.org/10.1109/LCNSymposium47956.2019.9000667},
  doi          = {10.1109/LCNSYMPOSIUM47956.2019.9000667},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/HillerHZHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PennekampHH019,
  author       = {Jan Pennekamp and
                  Martin Henze and
                  Oliver Hohlfeld and
                  Andriy Panchenko},
  title        = {Hi Doppelg{\"{a}}nger : Towards Detecting Manipulation in News
                  Comments},
  booktitle    = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco,
                  CA, USA, May 13-17, 2019},
  pages        = {197--205},
  year         = {2019},
  crossref     = {DBLP:conf/www/2019c},
  url          = {https://doi.org/10.1145/3308560.3316496},
  doi          = {10.1145/3308560.3316496},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/PennekampHH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Henze18,
  author       = {Martin Henze},
  title        = {Accounting for Privacy in the Cloud Computing Landscape},
  school       = {{RWTH} Aachen University, Germany},
  year         = {2018},
  url          = {https://d-nb.info/1172362564},
  isbn         = {978-3-8440-6389-9},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Henze18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZiegeldorfMHGW18,
  author       = {Jan Henrik Ziegeldorf and
                  Roman Matzutt and
                  Martin Henze and
                  Fred Grossmann and
                  Klaus Wehrle},
  title        = {Secure and anonymous decentralized Bitcoin mixing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {448--466},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.05.018},
  doi          = {10.1016/J.FUTURE.2016.05.018},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZiegeldorfMHGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SerrorHHSW18,
  author       = {Martin Serror and
                  Martin Henze and
                  Sacha Hack and
                  Marko Schuba and
                  Klaus Wehrle},
  title        = {Towards In-Network Security for Smart Homes},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {18:1--18:8},
  year         = {2018},
  crossref     = {DBLP:conf/IEEEares/2018},
  url          = {https://doi.org/10.1145/3230833.3232802},
  doi          = {10.1145/3230833.3232802},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SerrorHHSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MatzuttHHZMHW18,
  author       = {Roman Matzutt and
                  Jens Hiller and
                  Martin Henze and
                  Jan Henrik Ziegeldorf and
                  Dirk M{\"{u}}llmann and
                  Oliver Hohlfeld and
                  Klaus Wehrle},
  title        = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content
                  on Bitcoin},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  pages        = {420--438},
  year         = {2018},
  crossref     = {DBLP:conf/fc/2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_23},
  doi          = {10.1007/978-3-662-58387-6\_23},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MatzuttHHZMHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/MatzuttHZHW18,
  author       = {Roman Matzutt and
                  Martin Henze and
                  Jan Henrik Ziegeldorf and
                  Jens Hiller and
                  Klaus Wehrle},
  title        = {Thwarting Unwanted Blockchain Content Insertion},
  booktitle    = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2018, Orlando, FL, USA, April 17-20, 2018},
  pages        = {364--370},
  year         = {2018},
  crossref     = {DBLP:conf/ic2e/2018},
  url          = {https://doi.org/10.1109/IC2E.2018.00070},
  doi          = {10.1109/IC2E.2018.00070},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/MatzuttHZHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/HillerHSWRW18,
  author       = {Jens Hiller and
                  Martin Henze and
                  Martin Serror and
                  Eric Wagner and
                  Jan Niklas Richter and
                  Klaus Wehrle},
  title        = {Secure Low Latency Communication for Constrained Industrial IoT Scenarios},
  booktitle    = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
                  IL, USA, October 1-4, 2018},
  pages        = {614--622},
  year         = {2018},
  crossref     = {DBLP:conf/lcn/2018},
  url          = {https://doi.org/10.1109/LCN.2018.8638027},
  doi          = {10.1109/LCN.2018.8638027},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/HillerHSWRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-11448,
  author       = {Martin Henze and
                  Roman Matzutt and
                  Jens Hiller and
                  Erik M{\"{u}}hmer and
                  Jan Henrik Ziegeldorf and
                  Johannes van der Giet and
                  Klaus Wehrle},
  title        = {Complying with Data Handling Requirements in Cloud Storage Systems},
  journal      = {CoRR},
  volume       = {abs/1806.11448},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.11448},
  eprinttype    = {arXiv},
  eprint       = {1806.11448},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-11448.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/PennekampHW17,
  author       = {Jan Pennekamp and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {A survey on the evolution of privacy enforcement on smartphones and
                  the road ahead},
  journal      = {Pervasive Mob. Comput.},
  volume       = {42},
  pages        = {58--76},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.09.005},
  doi          = {10.1016/J.PMCJ.2017.09.005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/PennekampHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZiegeldorfMRHW17,
  author       = {Jan Henrik Ziegeldorf and
                  Jan Metzke and
                  Jan R{\"{u}}th and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Privacy-Preserving {HMM} Forward Computation},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {83--94},
  year         = {2017},
  crossref     = {DBLP:conf/codaspy/2017},
  url          = {https://doi.org/10.1145/3029806.3029816},
  doi          = {10.1145/3029806.3029816},
  timestamp    = {Wed, 16 Sep 2020 11:48:10 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZiegeldorfMRHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/HenzeMHMZGW17,
  author       = {Martin Henze and
                  Roman Matzutt and
                  Jens Hiller and
                  Erik M{\"{u}}hmer and
                  Jan Henrik Ziegeldorf and
                  Johannes van der Giet and
                  Klaus Wehrle},
  title        = {Practical Data Compliance for Cloud Storage},
  booktitle    = {2017 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2017, Vancouver, BC, Canada, April 4-7, 2017},
  pages        = {252--258},
  year         = {2017},
  crossref     = {DBLP:conf/ic2e/2017},
  url          = {https://doi.org/10.1109/IC2E.2017.32},
  doi          = {10.1109/IC2E.2017.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/HenzeMHMZGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/HenzePHMZDW17,
  author       = {Martin Henze and
                  Jan Pennekamp and
                  David Hellmanns and
                  Erik M{\"{u}}hmer and
                  Jan Henrik Ziegeldorf and
                  Arthur Drichel and
                  Klaus Wehrle},
  title        = {CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps},
  booktitle    = {Proceedings of the 14th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, Melbourne,
                  Australia, November 7-10, 2017},
  pages        = {262--271},
  year         = {2017},
  crossref     = {DBLP:conf/mobiquitous/2017},
  url          = {https://doi.org/10.1145/3144457.3144471},
  doi          = {10.1145/3144457.3144471},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/HenzePHMZDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/HenzeIFZ17,
  author       = {Martin Henze and
                  Ritsuma Inaba and
                  Ina Berenice Fink and
                  Jan Henrik Ziegeldorf},
  title        = {Privacy-preserving Comparison of Cloud Exposure Induced by Mobile
                  Apps},
  booktitle    = {Proceedings of the 14th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, Melbourne,
                  Australia, November 7-10, 2017},
  pages        = {543--544},
  year         = {2017},
  crossref     = {DBLP:conf/mobiquitous/2017},
  url          = {https://doi.org/10.1145/3144457.3144511},
  doi          = {10.1145/3144457.3144511},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/HenzeIFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/HenzeSH17,
  author       = {Martin Henze and
                  Mary Peyton Sanford and
                  Oliver Hohlfeld},
  title        = {Veiled in clouds? Assessing the prevalence of cloud computing in the
                  email landscape},
  booktitle    = {Network Traffic Measurement and Analysis Conference, {TMA} 2017, Dublin,
                  Ireland, June 21-23, 2017},
  pages        = {1--9},
  year         = {2017},
  crossref     = {DBLP:conf/tma/2017},
  url          = {https://doi.org/10.23919/TMA.2017.8002910},
  doi          = {10.23919/TMA.2017.8002910},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/HenzeSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HenzeWMZW17,
  author       = {Martin Henze and
                  Benedikt Wolters and
                  Roman Matzutt and
                  Torsten Zimmermann and
                  Klaus Wehrle},
  title        = {Distributed Configuration, Authorization and Management in the Cloud-Based
                  Internet of Things},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {185--192},
  year         = {2017},
  crossref     = {DBLP:conf/trustcom/2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HenzeWMZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wons/ZiegeldorfHBW17,
  author       = {Jan Henrik Ziegeldorf and
                  Martin Henze and
                  Jens Bavendiek and
                  Klaus Wehrle},
  title        = {TraceMixer: Privacy-preserving crowd-sensing sans trusted third party},
  booktitle    = {13th Annual Conference on Wireless On-demand Network Systems and Services,
                  {WONS} 2017, Jackson, WY, USA, February 21-24, 2017},
  pages        = {17--24},
  year         = {2017},
  crossref     = {DBLP:conf/wons/2017},
  url          = {https://doi.org/10.1109/WONS.2017.7888771},
  doi          = {10.1109/WONS.2017.7888771},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wons/ZiegeldorfHBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/PanchenkoMHLWE17,
  author       = {Andriy Panchenko and
                  Asya Mitseva and
                  Martin Henze and
                  Fabian Lanze and
                  Klaus Wehrle and
                  Thomas Engel},
  title        = {Analysis of Fingerprinting Techniques for Tor Hidden Services},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {165--175},
  year         = {2017},
  crossref     = {DBLP:conf/wpes/2017},
  url          = {https://doi.org/10.1145/3139550.3139564},
  doi          = {10.1145/3139550.3139564},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/PanchenkoMHLWE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HenzeHKHRW16,
  author       = {Martin Henze and
                  Lars Hermerschmidt and
                  Daniel Kerpen and
                  Roger H{\"{a}}u{\ss}ling and
                  Bernhard Rumpe and
                  Klaus Wehrle},
  title        = {A comprehensive approach to privacy in the cloud-based Internet of
                  Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {56},
  pages        = {701--718},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2015.09.016},
  doi          = {10.1016/J.FUTURE.2015.09.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/HenzeHKHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MitsevaPLHWE16,
  author       = {Asya Mitseva and
                  Andriy Panchenko and
                  Fabian Lanze and
                  Martin Henze and
                  Klaus Wehrle and
                  Thomas Engel},
  title        = {{POSTER:} Fingerprinting Tor Hidden Services},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1766--1768},
  year         = {2016},
  crossref     = {DBLP:conf/ccs/2016},
  url          = {https://doi.org/10.1145/2976749.2989054},
  doi          = {10.1145/2976749.2989054},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MitsevaPLHWE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MatzuttHHRZW16,
  author       = {Roman Matzutt and
                  Oliver Hohlfeld and
                  Martin Henze and
                  Robin Rawiel and
                  Jan Henrik Ziegeldorf and
                  Klaus Wehrle},
  title        = {{POSTER:} {I} Don't Want That Content! On the Risks of Exploiting
                  Bitcoin's Blockchain as a Content Store},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1769--1771},
  year         = {2016},
  crossref     = {DBLP:conf/ccs/2016},
  url          = {https://doi.org/10.1145/2976749.2989059},
  doi          = {10.1145/2976749.2989059},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MatzuttHHRZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/HenzeKHEHMRMSHW16,
  author       = {Martin Henze and
                  Daniel Kerpen and
                  Jens Hiller and
                  Michael Eggert and
                  David Hellmanns and
                  Erik M{\"{u}}hmer and
                  Oussama Renuli and
                  Henning Maier and
                  Christian St{\"{u}}ble and
                  Roger H{\"{a}}u{\ss}ling and
                  Klaus Wehrle},
  title        = {Towards Transparent Information on Individual Cloud Service Usage},
  booktitle    = {2016 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2016, Luxembourg, December 12-15, 2016},
  pages        = {366--370},
  year         = {2016},
  crossref     = {DBLP:conf/cloudcom/2016},
  url          = {https://doi.org/10.1109/CloudCom.2016.0064},
  doi          = {10.1109/CLOUDCOM.2016.0064},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/HenzeKHEHMRMSHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/HenzeHHW16,
  author       = {Martin Henze and
                  Jens Hiller and
                  Oliver Hohlfeld and
                  Klaus Wehrle},
  title        = {Moving Privacy-Sensitive Services from Public Clouds to Decentralized
                  Private Clouds},
  booktitle    = {2016 {IEEE} International Conference on Cloud Engineering Workshop,
                  {IC2E} Workshops, Berlin, Germany, April 4-8, 2016},
  pages        = {130--135},
  year         = {2016},
  crossref     = {DBLP:conf/ic2e/2016w},
  url          = {https://doi.org/10.1109/IC2EW.2016.24},
  doi          = {10.1109/IC2EW.2016.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/HenzeHHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PanchenkoLPEZHW16,
  author       = {Andriy Panchenko and
                  Fabian Lanze and
                  Jan Pennekamp and
                  Thomas Engel and
                  Andreas Zinnen and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Website Fingerprinting at Internet Scale},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  year         = {2016},
  crossref     = {DBLP:conf/ndss/2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/website-fingerprinting-internet-scale.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/PanchenkoLPEZHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HenzeHSZW16,
  author       = {Martin Henze and
                  Jens Hiller and
                  Sascha Schmerling and
                  Jan Henrik Ziegeldorf and
                  Klaus Wehrle},
  title        = {{CPPL:} Compact Privacy Policy Language},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {99--110},
  year         = {2016},
  crossref     = {DBLP:conf/wpes/2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994627},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/HenzeHSZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HenzeHMW16,
  author       = {Martin Henze and
                  Ren{\'{e}} Hummen and
                  Roman Matzutt and
                  Klaus Wehrle},
  title        = {The SensorCloud Protocol: Securely Outsourcing Sensor Data to the
                  Cloud},
  journal      = {CoRR},
  volume       = {abs/1607.03239},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.03239},
  eprinttype    = {arXiv},
  eprint       = {1607.03239},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/HenzeHMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZiegeldorfHHWW15,
  author       = {Jan Henrik Ziegeldorf and
                  Jens Hiller and
                  Martin Henze and
                  Hanno Wirtz and
                  Klaus Wehrle},
  title        = {Bandwidth-Optimized Secure Two-Party Computation of Minima},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  pages        = {197--213},
  year         = {2015},
  crossref     = {DBLP:conf/cans/2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_14},
  doi          = {10.1007/978-3-319-26823-1\_14},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ZiegeldorfHHWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZiegeldorfGHIW15,
  author       = {Jan Henrik Ziegeldorf and
                  Fred Grossmann and
                  Martin Henze and
                  Nicolas Inden and
                  Klaus Wehrle},
  title        = {CoinParty: Secure Multi-Party Mixing of Bitcoins},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {75--86},
  year         = {2015},
  crossref     = {DBLP:conf/codaspy/2015},
  url          = {https://doi.org/10.1145/2699026.2699100},
  doi          = {10.1145/2699026.2699100},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZiegeldorfGHIW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZiegeldorfHHW15,
  author       = {Jan Henrik Ziegeldorf and
                  Martin Henze and
                  Ren{\'{e}} Hummen and
                  Klaus Wehrle},
  title        = {Comparison-Based Privacy: Nudging Privacy in Social Media (Position
                  Paper)},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  pages        = {226--234},
  year         = {2015},
  crossref     = {DBLP:conf/esorics/2015dpm},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_15},
  doi          = {10.1007/978-3-319-29883-2\_15},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZiegeldorfHHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZiegeldorfMHW15,
  author       = {Jan Henrik Ziegeldorf and
                  Jan Metzke and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Choose Wisely: {A} Comparison of Secure Two-Party Computation Frameworks},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015,
                  San Jose, CA, USA, May 21-22, 2015},
  pages        = {198--205},
  year         = {2015},
  crossref     = {DBLP:conf/sp/2015w},
  url          = {https://doi.org/10.1109/SPW.2015.9},
  doi          = {10.1109/SPW.2015.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZiegeldorfMHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/AktasHAMW14,
  author       = {Ismet Aktas and
                  Martin Henze and
                  Muhammad Hamad Alizai and
                  Kevin M{\"{o}}llering and
                  Klaus Wehrle},
  title        = {Graph-based redundancy removal approach for multiple cross-layer interactions},
  booktitle    = {Sixth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2014, Bangalore, India, January 6-10, 2014},
  pages        = {1--8},
  year         = {2014},
  crossref     = {DBLP:conf/comsnets/2014},
  url          = {https://doi.org/10.1109/COMSNETS.2014.6734899},
  doi          = {10.1109/COMSNETS.2014.6734899},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/AktasHAMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/HenzeBHW14,
  author       = {Martin Henze and
                  Sebastian Bereda and
                  Ren{\'{e}} Hummen and
                  Klaus Wehrle},
  title        = {SCSlib: Transparently Accessing Protected Sensor Data in the Cloud},
  booktitle    = {The 5th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN-2014)/} The 4th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH} 2014)/ Affiliated Workshops, September 22-25,
                  2014, Halifax, Nova Scotia, Canada},
  pages        = {370--375},
  year         = {2014},
  crossref     = {DBLP:conf/euspn/2014},
  url          = {https://doi.org/10.1016/j.procs.2014.08.055},
  doi          = {10.1016/J.PROCS.2014.08.055},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/euspn/HenzeBHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/HenzeHKHRW14,
  author       = {Martin Henze and
                  Lars Hermerschmidt and
                  Daniel Kerpen and
                  Roger H{\"{a}}u{\ss}ling and
                  Bernhard Rumpe and
                  Klaus Wehrle},
  title        = {User-Driven Privacy Enforcement for Cloud-Based Services in the Internet
                  of Things},
  booktitle    = {2014 International Conference on Future Internet of Things and Cloud,
                  FiCloud 2014, Barcelona, Spain, August 27-29, 2014},
  pages        = {191--196},
  year         = {2014},
  crossref     = {DBLP:conf/ficloud/2014},
  url          = {https://doi.org/10.1109/FiCloud.2014.38},
  doi          = {10.1109/FICLOUD.2014.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/HenzeHKHRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SchmidtHW14,
  author       = {Florian Schmidt and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Piccett: Protocol-independent classification of corrupted error-tolerant
                  traffic},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal,
                  Madeira, Portugal, June 23-26, 2014},
  pages        = {1--7},
  year         = {2014},
  crossref     = {DBLP:conf/iscc/2014},
  url          = {https://doi.org/10.1109/ISCC.2014.6912582},
  doi          = {10.1109/ISCC.2014.6912582},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SchmidtHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/HenzeHMW14,
  author       = {Martin Henze and
                  Ren{\'{e}} Hummen and
                  Roman Matzutt and
                  Klaus Wehrle},
  title        = {A Trust Point-based Security Architecture for Sensor Data in the Cloud},
  booktitle    = {Trusted Cloud Computing},
  pages        = {77--106},
  year         = {2014},
  crossref     = {DBLP:books/daglib/0034875},
  url          = {https://doi.org/10.1007/978-3-319-12718-7\_6},
  doi          = {10.1007/978-3-319-12718-7\_6},
  timestamp    = {Sun, 02 Oct 2022 15:53:01 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/HenzeHMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/EggertHHHHKPRTW14,
  author       = {Michael Eggert and
                  Roger H{\"{a}}u{\ss}ling and
                  Martin Henze and
                  Lars Hermerschmidt and
                  Ren{\'{e}} Hummen and
                  Daniel Kerpen and
                  Antonio Navarro P{\'{e}}rez and
                  Bernhard Rumpe and
                  Dirk Thi{\ss}en and
                  Klaus Wehrle},
  title        = {SensorCloud: Towards the Interdisciplinary Development of a Trustworthy
                  Platform for Globally Interconnected Sensors and Actuators},
  booktitle    = {Trusted Cloud Computing},
  pages        = {203--218},
  year         = {2014},
  crossref     = {DBLP:books/daglib/0034875},
  url          = {https://doi.org/10.1007/978-3-319-12718-7\_13},
  doi          = {10.1007/978-3-319-12718-7\_13},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/EggertHHHHKPRTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZiegeldorfVHW14,
  author       = {Jan Henrik Ziegeldorf and
                  Nicolai Viol and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {{POSTER:} Privacy-preserving Indoor Localization},
  journal      = {CoRR},
  volume       = {abs/1410.3270},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.3270},
  eprinttype    = {arXiv},
  eprint       = {1410.3270},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ZiegeldorfVHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HenzeHKHRW14,
  author       = {Martin Henze and
                  Lars Hermerschmidt and
                  Daniel Kerpen and
                  Roger H{\"{a}}u{\ss}ling and
                  Bernhard Rumpe and
                  Klaus Wehrle},
  title        = {User-driven Privacy Enforcement for Cloud-based Services in the Internet
                  of Things},
  journal      = {CoRR},
  volume       = {abs/1412.3325},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.3325},
  eprinttype    = {arXiv},
  eprint       = {1412.3325},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/HenzeHKHRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijghpc/HenzeHMCW13,
  author       = {Martin Henze and
                  Ren{\'{e}} Hummen and
                  Roman Matzutt and
                  Daniel Catrein and
                  Klaus Wehrle},
  title        = {Maintaining User Control While Storing and Processing Sensor Data
                  in the Cloud},
  journal      = {Int. J. Grid High Perform. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {97--112},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijghpc.2013100107},
  doi          = {10.4018/IJGHPC.2013100107},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijghpc/HenzeHMCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/HenzeGKW13,
  author       = {Martin Henze and
                  Marcel Grossfengels and
                  Maik Koprowski and
                  Klaus Wehrle},
  title        = {Towards Data Handling Requirements-Aware Cloud Computing},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 2},
  pages        = {266--269},
  year         = {2013},
  crossref     = {DBLP:conf/cloudcom/2013-2},
  url          = {https://doi.org/10.1109/CloudCom.2013.145},
  doi          = {10.1109/CLOUDCOM.2013.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/HenzeGKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HenzeHW13,
  author       = {Martin Henze and
                  Ren{\'{e}} Hummen and
                  Klaus Wehrle},
  title        = {The Cloud Needs Cross-Layer Data Handling Annotations},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {18--22},
  year         = {2013},
  crossref     = {DBLP:conf/sp/2013w},
  url          = {https://doi.org/10.1109/SPW.2013.31},
  doi          = {10.1109/SPW.2013.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HenzeHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/HummenHHW13,
  author       = {Ren{\'{e}} Hummen and
                  Jens Hiller and
                  Martin Henze and
                  Klaus Wehrle},
  title        = {Slimfit - {A} {HIP} {DEX} compression layer for the IP-based Internet
                  of Things},
  booktitle    = {9th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2013, Lyon, France, October 7-9,
                  2013},
  pages        = {259--266},
  year         = {2013},
  crossref     = {DBLP:conf/wimob/2013},
  url          = {https://doi.org/10.1109/WiMOB.2013.6673370},
  doi          = {10.1109/WIMOB.2013.6673370},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/HummenHHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HummenHWHSW13,
  author       = {Ren{\'{e}} Hummen and
                  Jens Hiller and
                  Hanno Wirtz and
                  Martin Henze and
                  Hossein Shafagh and
                  Klaus Wehrle},
  title        = {6LoWPAN fragmentation attacks and mitigation mechanisms},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {55--66},
  year         = {2013},
  crossref     = {DBLP:conf/wisec/2013},
  url          = {https://doi.org/10.1145/2462096.2462107},
  doi          = {10.1145/2462096.2462107},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HummenHWHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EggertHHHHKPRTW13,
  author       = {Michael Eggert and
                  Roger H{\"{a}}u{\ss}ling and
                  Martin Henze and
                  Lars Hermerschmidt and
                  Ren{\'{e}} Hummen and
                  Daniel Kerpen and
                  Antonio Navarro P{\'{e}}rez and
                  Bernhard Rumpe and
                  Dirk Thi{\ss}en and
                  Klaus Wehrle},
  title        = {SensorCloud: Towards the Interdisciplinary Development of a Trustworthy
                  Platform for Globally Interconnected Sensors and Actuators},
  journal      = {CoRR},
  volume       = {abs/1310.6542},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.6542},
  eprinttype    = {arXiv},
  eprint       = {1310.6542},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EggertHHHHKPRTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/HummenHCW12,
  author       = {Ren{\'{e}} Hummen and
                  Martin Henze and
                  Daniel Catrein and
                  Klaus Wehrle},
  title        = {A Cloud design for user-controlled storage and processing of sensor
                  data},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {232--240},
  year         = {2012},
  crossref     = {DBLP:conf/cloudcom/2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427523},
  doi          = {10.1109/CLOUDCOM.2012.6427523},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/HummenHCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-2,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7},
  doi          = {10.1007/978-3-031-54773-7},
  isbn         = {978-3-031-54772-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/caise/2023,
  editor       = {Marta Indulska and
                  Iris Reinhartz{-}Berger and
                  Carlos Cetina and
                  Oscar Pastor},
  title        = {Advanced Information Systems Engineering - 35th International Conference,
                  CAiSE 2023, Zaragoza, Spain, June 12-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13901},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34560-9},
  doi          = {10.1007/978-3-031-34560-9},
  isbn         = {978-3-031-34559-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2023w1,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54204-6},
  doi          = {10.1007/978-3-031-54204-6},
  isbn         = {978-3-031-54203-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2023w1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2023-2,
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-51476-0},
  doi          = {10.1007/978-3-031-51476-0},
  isbn         = {978-3-031-51475-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2023,
  title        = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023},
  doi          = {10.1109/EUROSP57164.2023},
  isbn         = {978-1-6654-6512-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isgteurope/2023,
  title        = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} {EUROPE}
                  2023, Grenoble, France, October 23-26, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISGTEUROPE56780.2023},
  doi          = {10.1109/ISGTEUROPE56780.2023},
  isbn         = {979-8-3503-9678-2},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/isgteurope/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2023,
  editor       = {Sharief Oteafy and
                  Eyuphan Bulut and
                  Florian Tschorsch and
                  Kanchana Thilakarathna},
  title        = {48th {IEEE} Conference on Local Computer Networks, {LCN} 2023, Daytona
                  Beach, FL, USA, October 1-5, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCN58197.2023},
  doi          = {10.1109/LCN58197.2023},
  isbn         = {979-8-3503-0074-1},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiaccs/2022,
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932?},
  doi          = {10.1145/3488932?},
  isbn         = {978-1-4503-9140-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022,
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606},
  doi          = {10.1145/3548606},
  isbn         = {978-1-4503-9450-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cpss/2022,
  editor       = {Alvaro A. C{\'{a}}rdenas and
                  Daisuke Mashima and
                  Ertem Esiner},
  title        = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494107},
  doi          = {10.1145/3494107},
  isbn         = {978-1-4503-9176-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-3,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7},
  doi          = {10.1007/978-3-031-17143-7},
  isbn         = {978-3-031-17142-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbc2/2022,
  title        = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2022, Shanghai, China, May 2-5, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICBC54727.2022},
  doi          = {10.1109/ICBC54727.2022},
  isbn         = {978-1-6654-9538-7},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2022,
  editor       = {Sharief Oteafy and
                  Eyuphan Bulut and
                  Florian Tschorsch},
  title        = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton,
                  AB, Canada, September 26-29, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCN53696.2022},
  doi          = {10.1109/LCN53696.2022},
  isbn         = {978-1-6654-8001-7},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2022,
  title        = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948},
  doi          = {10.1145/3545948},
  isbn         = {978-1-4503-9704-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2022cset,
  title        = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual
                  Event, 8 August 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3546096},
  doi          = {10.1145/3546096},
  isbn         = {978-1-4503-9684-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2022cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2022,
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657},
  doi          = {10.1145/3507657},
  isbn         = {978-1-4503-9216-7},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2021,
  title        = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832},
  doi          = {10.1145/3485832},
  isbn         = {978-1-4503-8579-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2021sat-cps,
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969},
  doi          = {10.1145/3445969},
  isbn         = {978-1-4503-8319-6},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2021sat-cps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isgteurope/2021,
  title        = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} Europe
                  2021, Espoo, Finland, October 18-21, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISGTEurope52324.2021},
  doi          = {10.1109/ISGTEUROPE52324.2021},
  isbn         = {978-1-6654-4875-8},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/isgteurope/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vtc/2021f,
  title        = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021},
  doi          = {10.1109/VTC2021-FALL52928.2021},
  isbn         = {978-1-6654-1368-8},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/2021f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020,
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297},
  doi          = {10.1145/3372297},
  isbn         = {978-1-4503-7089-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2020,
  title        = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9153729/proceeding},
  isbn         = {978-1-7281-4760-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2020w,
  title        = {2020 {IEEE} International Conference on Communications Workshops,
                  {ICC} Workshops 2020, Dublin, Ireland, June 7-11, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9138348/proceeding},
  isbn         = {978-1-7281-7440-2},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2020,
  title        = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394},
  doi          = {10.1145/3419394},
  isbn         = {978-1-4503-8138-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2020,
  title        = {2020 {IFIP} Networking Conference, Networking 2020, Paris, France,
                  June 22-26, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9139123/proceeding},
  isbn         = {978-3-903176-28-7},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019cpsspc,
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Thorsten Holz},
  title        = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338499},
  doi          = {10.1145/3338499},
  isbn         = {978-1-4503-6831-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2019cpsspc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2019,
  editor       = {Tung Bui},
  title        = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://scholarspace.manoa.hawaii.edu/handle/10125/59440},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icnp/2019,
  title        = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8884214/proceeding},
  isbn         = {978-1-7281-2700-2},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icphys/2019,
  title        = {{IEEE} International Conference on Industrial Cyber Physical Systems,
                  {ICPS} 2019, Taipei, Taiwan, May 6-9, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8767101/proceeding},
  isbn         = {978-1-5386-8500-6},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icphys/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2019s,
  editor       = {Soumaya Cherkaoui and
                  Lyes Khoukhi},
  title        = {2019 {IEEE} 44th {LCN} Symposium on Emerging Topics in Networking
                  {(LCN} Symposium), Osnabr{\"{u}}ck, Germany, October 14-17, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8982112/proceeding},
  isbn         = {978-1-7281-2561-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/2019s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2019c,
  editor       = {Sihem Amer{-}Yahia and
                  Mohammad Mahdian and
                  Ashish Goel and
                  Geert{-}Jan Houben and
                  Kristina Lerman and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco,
                  CA, USA, May 13-17, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308560},
  doi          = {10.1145/3308560},
  isbn         = {978-1-4503-6675-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/www/2019c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2018,
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3230833},
  isbn         = {978-1-4503-6448-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2018,
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6},
  doi          = {10.1007/978-3-662-58387-6},
  isbn         = {978-3-662-58386-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ic2e/2018,
  editor       = {Abhishek Chandra and
                  Jie Li and
                  Ying Cai and
                  Tian Guo},
  title        = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2018, Orlando, FL, USA, April 17-20, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8359996/proceeding},
  isbn         = {978-1-5386-5008-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2018,
  title        = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
                  IL, USA, October 1-4, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8635823/proceeding},
  isbn         = {978-1-5386-4413-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn         = {978-1-4503-4523-1},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ic2e/2017,
  title        = {2017 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2017, Vancouver, BC, Canada, April 4-7, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7922463/proceeding},
  isbn         = {978-1-5090-5817-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiquitous/2017,
  editor       = {Tao Gu and
                  Ramamohanarao Kotagiri and
                  Huai Liu},
  title        = {Proceedings of the 14th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, Melbourne,
                  Australia, November 7-10, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3144457},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tma/2017,
  title        = {Network Traffic Measurement and Analysis Conference, {TMA} 2017, Dublin,
                  Ireland, June 21-23, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7999197/proceeding},
  isbn         = {978-3-901882-95-1},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2017,
  title        = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8027145/proceeding},
  isbn         = {978-1-5090-4906-6},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wons/2017,
  title        = {13th Annual Conference on Wireless On-demand Network Systems and Services,
                  {WONS} 2017, Jackson, WY, USA, February 21-24, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7886469/proceeding},
  isbn         = {978-3-901882-88-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wons/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2017,
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3139550},
  isbn         = {978-1-4503-5175-1},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn         = {978-1-4503-4139-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcom/2016,
  title        = {2016 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2016, Luxembourg, December 12-15, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7823365/proceeding},
  isbn         = {978-1-5090-1445-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ic2e/2016w,
  title        = {2016 {IEEE} International Conference on Cloud Engineering Workshop,
                  {IC2E} Workshops, Berlin, Germany, April 4-8, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7517739/proceeding},
  isbn         = {978-1-5090-3684-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2016,
  title        = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {https://www.ndss-symposium.org/ndss2016/},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2016,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994620},
  doi          = {10.1145/2994620},
  isbn         = {978-1-4503-4569-9},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2015,
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1},
  doi          = {10.1007/978-3-319-26823-1},
  isbn         = {978-3-319-26822-4},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2015,
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2699026},
  isbn         = {978-1-4503-3191-3},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015dpm,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29883-2},
  doi          = {10.1007/978-3-319-29883-2},
  isbn         = {978-3-319-29882-5},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2015dpm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2015w,
  title        = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015,
                  San Jose, CA, USA, May 21-22, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7160794/proceeding},
  isbn         = {978-1-4799-9933-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2015w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/comsnets/2014,
  title        = {Sixth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2014, Bangalore, India, January 6-10, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6720258/proceeding},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euspn/2014,
  title        = {The 5th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN-2014)/} The 4th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH} 2014)/ Affiliated Workshops, September 22-25,
                  2014, Halifax, Nova Scotia, Canada},
  series       = {Procedia Computer Science},
  volume       = {37},
  publisher    = {Elsevier},
  year         = {2014},
  url          = {https://www.sciencedirect.com/science/journal/18770509/37},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/euspn/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ficloud/2014,
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Antonio Pescap{\`{e}}},
  title        = {2014 International Conference on Future Internet of Things and Cloud,
                  FiCloud 2014, Barcelona, Spain, August 27-29, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6982600/proceeding},
  isbn         = {978-1-4799-4358-6},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ficloud/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscc/2014,
  title        = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal,
                  Madeira, Portugal, June 23-26, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6892194/proceeding},
  isbn         = {978-1-4799-4277-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0034875,
  editor       = {Helmut Krcmar and
                  Ralf H. Reussner and
                  Bernhard Rumpe},
  title        = {Trusted Cloud Computing},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12718-7},
  doi          = {10.1007/978-3-319-12718-7},
  isbn         = {978-3-319-12717-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0034875.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcom/2013-2,
  title        = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 2},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6734838/proceeding},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/2013-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2013w,
  title        = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6564486/proceeding},
  isbn         = {978-1-4799-0458-7},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2013w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wimob/2013,
  title        = {9th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2013, Lyon, France, October 7-9,
                  2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6661476/proceeding},
  isbn         = {978-1-4799-0428-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2013,
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2462096},
  isbn         = {978-1-4503-1998-0},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcom/2012,
  title        = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6415464/proceeding},
  isbn         = {978-1-4673-4511-8},
  timestamp    = {Wed, 24 Apr 2024 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics