default search action
Christian Rohner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Tobias Mages, Elli Anastasiadi, Christian Rohner:
Non-Negative Decomposition of Multivariate Information: From Minimum to Blackwell-Specific Information. Entropy 26(5): 424 (2024) - [c65]Dilushi Piumwardane, Madhushanka Padmal, Vaishnavi Nattar Ranganathan, Kasun Hewage, Christian Rohner, Thiemo Voigt:
Unlocking the Potential of Low-Cost High-Resolution Sensing with Analog Backscatter. RFID 2024: 1-6 - [i7]Tobias Mages, Christian Rohner:
Quantifying redundancies and synergies with measures of inequality. CoRR abs/2407.04415 (2024) - [i6]Xin Shen, Matteo Magnani, Christian Rohner, Fiona Skerman:
Fast and Accurate Algorithms to Calculate Expected Modularity in Probabilistic Networks. CoRR abs/2408.07161 (2024) - 2023
- [j12]Tobias Mages, Christian Rohner:
Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions. Entropy 25(7): 1014 (2023) - [c64]Gustaf Borgström, Christian Rohner, David Black-Schaffer:
Faster Functional Warming with Cache Merging. DroneSE/RAPIDO@HiPEAC 2023: 39-47 - [c63]Vipin N. Sathi, Christian Rohner, Thiemo Voigt:
A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices. ICC 2023: 615-621 - [c62]Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner:
Clipaha: A Scheme to Perform Password Stretching on the Client. ICISSP 2023: 58-69 - [c61]Tobias Mages, Wenqing Yan, Ambuj Varshney, Christian Rohner:
Demo: An Educational Platform to Learn Radio Frequency Wireless Communication. MobiSys 2023: 600-601 - [c60]Amin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson:
On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoT. NOMS 2023: 1-4 - [c59]Madhushanka Padmal, Christian Rohner, Robin Augustine, Thiemo Voigt:
RFID Tags as Passive Temperature Sensors. RFID 2023: 48-53 - [i5]Patrik Seiron, Axel Lindegren, Matteo Magnani, Christian Rohner, Tsuyoshi Murata, Petter Holme:
Modularity-based selection of the number of slices in temporal network clustering. CoRR abs/2311.14354 (2023) - 2022
- [j11]Tobias Mages, Magnus Almgren, Christian Rohner:
Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses. Comput. Secur. 116: 102633 (2022) - [c58]Dilushi Piumwardane, Madhushanka Padmal, Vaishnavi Nattar Ranganathan, Christian Rohner, Thiemo Voigt:
HarmonicID: An Identification System for Low-Power Analog Backscatter Tags. RFID 2022: 1-6 - [c57]Wenqing Yan, Thiemo Voigt, Christian Rohner:
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity. WISEC 2022: 85-97 - [i4]Amin Kaveh, Matteo Magnani, Christian Rohner:
Uncertainty in fMRI Functional Networks of Autism Brain Imaging Data. CoRR abs/2202.02228 (2022) - [i3]Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner:
Clipaha: A Scheme to Perform Password Stretching on the Client. IACR Cryptol. ePrint Arch. 2022: 1746 (2022) - 2021
- [j10]Amin Kaveh, Matteo Magnani, Christian Rohner:
Probabilistic network sparsification with ego betweenness. Appl. Netw. Sci. 6(1): 58 (2021) - [j9]Amin Kaveh, Matteo Magnani, Christian Rohner:
Defining and measuring probabilistic ego networks. Soc. Netw. Anal. Min. 11(1): 2 (2021) - [c56]Lorenzo Corneo, Nitinder Mohan, Aleksandr Zavodovski, Walter Wong, Christian Rohner, Per Gunningberg, Jussi Kangasharju:
(How Much) Can Edge Computing Change Network Latency? Networking 2021: 1-9 - [c55]Dilushi Piumwardane, Christian Rohner, Thiemo Voigt:
Reliable Flooding in Dense Backscatter-based Tag-to-Tag Networks. RFID 2021: 1-8 - 2020
- [c54]Thiemo Voigt, Carlos M. Pérez-Penichet, Christian Rohner:
Extended Abstract: Towards Physical-Layer Authentication for Backscatter Devices. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 224-234 - [c53]Carlos M. Pérez-Penichet, Dilushi Piumwardane, Christian Rohner, Thiemo Voigt:
A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless Networks. INFOCOM 2020: 994-1003 - [c52]Carlos M. Pérez-Penichet, Dilushi Piumwardane, Christian Rohner, Thiemo Voigt:
TagAlong: Efficient Integration of Battery-free Sensor Tags in Standard Wireless Networks. IPSN 2020: 169-180 - [c51]Wenqing Yan, Sam Hylamia, Thiemo Voigt, Christian Rohner:
PHY-IDS: a physical-layer spoofing attack detection system for wearable devices. WearSys@MobiSys 2020: 1-6 - [c50]Wenqing Yan, Christian Rohner:
Sensitivity of radiometric fingerprint against wireless channel: poster abstract. SenSys 2020: 719-720 - [c49]Thiemo Voigt, Christian Rohner, Wenqing Yan, Laya Joseph, Sam Hylamia, Noor Badariah Asan, Bappaditya Mandal, Mauricio David Perez, Robin Augustine:
Towards secure backscatter-based in-body sensor networks: poster abstract. SenSys 2020: 741-742 - [c48]Wenqing Yan, Thiemo Voigt, Christian Rohner:
Poster: Radiometric Signatures for Wireless Device Identification over Dynamic Channels. SP (Workshops) 2020: 127
2010 – 2019
- 2019
- [j8]Amin Kaveh, Matteo Magnani, Christian Rohner:
Comparing node degrees in probabilistic networks. J. Complex Networks 7(5): 749-763 (2019) - [j7]Martin Jacobsson, Christian Rohner:
Link quality estimation for arbitrary packet sizes over wireless links using packet reception events. Int. J. Commun. Syst. 32(16) (2019) - [c47]Dilushi Piumwardane, Carlos M. Pérez-Penichet, Christian Rohner, Thiemo Voigt:
Poster: Backscatter Communication for Wireless Robotic Materials. EWSN 2019: 224-225 - [c46]Dilushi Piumwardane, Carlos M. Pérez-Penichet, Christian Rohner, Thiemo Voigt:
Poster: Learning to Shine - Optimizing Glossy at Runtime with Reinforcement Learning. EWSN 2019: 226-227 - [c45]Dilushi Piumwardane, Carlos M. Pérez-Penichet, Christian Rohner, Thiemo Voigt:
Backscatter Communication for Wireless Robotic Materials. EWSN 2019: 336-340 - [c44]Lorenzo Corneo, Christian Rohner, Per Gunningberg:
Age of Information-Aware Scheduling for Timely and Scalable Internet of Things Applications. INFOCOM 2019: 2476-2484 - [c43]Sam Hylamia, Wenqing Yan, Christian Rohner, Thiemo Voigt:
Tiek: Two-tier Authentication and Key Distribution for Wearable Devices. WiMob 2019: 1-6 - 2018
- [c42]Robert Hartung, Jan Käberich, Lars C. Wolf, Laura Marie Feeney, Christian Rohner, Per Gunningberg:
A Platform for Experiments with Energy Storage Devices for Low-power Wireless Networks. WiNTECH 2018: 68-76 - [c41]Robert Hartung, Jan Käberich, Lars C. Wolf, Laura Marie Feeney, Christian Rohner, Per Gunningberg:
Demo: Integration of a Platform for Energy Storage Experiments into a Generic Testbed Framework. WiNTECH 2018: 77-78 - [c40]Andreas Johnsson, Christian Rohner:
On performance observability in IoT systems using active measurements. NOMS 2018: 1-5 - [c39]Abdullah Hylamia, Ambuj Varshney, Andreas Soleiman, Panagiotis Papadimitratos, Christian Rohner, Thiemo Voigt:
Towards Battery-free Radio Tomographic Imaging. WISEC 2018: 293-295 - 2017
- [c38]Laura Marie Feeney, Christian Rohner, Per Gunningberg:
Demo: Making Batteries a First Class Element in the Design and Evaluation of Embedded Wireless Systems. EWSN 2017: 242-243 - [c37]Ambuj Varshney, Carlos M. Pérez-Penichet, Christian Rohner, Thiemo Voigt:
Towards Wide-area Backscatter Networks. HotWireless@MobiCom 2017: 49-53 - [c36]Ambuj Varshney, Oliver Harms, Carlos M. Pérez-Penichet, Christian Rohner, Frederik Hermans, Thiemo Voigt:
LoRea: A Backscatter Architecture that Achieves a Long Communication Range. SenSys 2017: 18:1-18:14 - [c35]Ambuj Varshney, Carlos M. Pérez-Penichet, Christian Rohner, Thiemo Voigt:
LoRea: A Backscatter Architecture that Achieves a Long Communication Range. SenSys 2017: 50:1-50:2 - [c34]Laura Marie Feeney, Robert Hartung, Christian Rohner, Ulf Kulau, Lars C. Wolf, Per Gunningberg:
Towards realistic lifetime estimation in battery-powered IoT devices. SenSys 2017: 67:1-67:2 - 2016
- [c33]Carlos M. Pérez-Penichet, Ambuj Varshney, Frederik Hermans, Christian Rohner, Thiemo Voigt:
Do Multiple Bits per Symbol Increase the Throughput of Ambient Backscatter Communications? EWSN 2016: 355-360 - [c32]Abdalah Hilmia, Kasun Hewage, Ambuj Varshney, Christian Rohner, Thiemo Voigt:
Poster Abstract: BouKey: Location-Based Key Sharing Using Visible Light Communication. IPSN 2016: 38:1-38:2 - [c31]Hjalmar Wennerström, Christian Rohner:
Towards even coverage monitoring with opportunistic sensor networks. CHANTS@MOBICOM 2016: 81-86 - [c30]Frederik Hermans, Liam McNamara, Gábor Sörös, Christian Rohner, Thiemo Voigt, Edith C. H. Ngai:
FOCUS: Robust Visual Codes for Everyone. MobiSys 2016: 319-332 - [i2]Pushpam Aji John, Rudolf Agren, Yu-Jung Chen, Christian Rohner, Edith C. H. Ngai:
868 MHz Wireless Sensor Network - A Study. CoRR abs/1609.00475 (2016) - [i1]Ambuj Varshney, Oliver Harms, Carlos M. Pérez-Penichet, Christian Rohner, Frederik Hermans, Thiemo Voigt:
LoRea: A Backscatter Reader for Everyone! CoRR abs/1611.00096 (2016) - 2015
- [j6]Martin Jacobsson, Christian Rohner:
Estimating Packet Delivery Ratio for Arbitrary Packet Sizes Over Wireless Links. IEEE Commun. Lett. 19(4): 609-612 (2015) - [c29]Hjalmar Wennerström, Christian Rohner, David B. Smith:
Considering Multi-Contact Encounters in Opportunistic Networks. CHANTS@MobiCom 2015: 13-18 - [c28]Atis Elsts, Hjalmar Wennerström, Christian Rohner:
IEEE 802.15.4 Channel Diversity in an Outdoor Environment. RealWSN@SenSys 2015: 11-14 - 2014
- [j5]Fredrik Bjurefors, Merkourios Karaliopoulos, Christian Rohner, Paul Smith, George Theodoropoulos, Per Gunningberg:
Resilience and opportunistic forwarding: Beyond average value analysis. Comput. Commun. 48: 111-120 (2014) - [j4]Erik Nordström, Christian Rohner, Per Gunningberg:
Haggle: Opportunistic mobile content sharing using search. Comput. Commun. 48: 121-132 (2014) - [c27]Frederik Hermans, Hjalmar Wennerström, Liam McNamara, Christian Rohner, Per Gunningberg:
All Is Not Lost: Understanding and Exploiting Packet Corruption in Outdoor Sensor Networks. EWSN 2014: 116-132 - [c26]Frederik Hermans, Liam McNamara, Thiemo Voigt, Christian Rohner, Edith C. H. Ngai, Per Gunningberg:
Poster abstract: supporting heterogeneous LCD/camera links. IPSN 2014: 289-290 - [c25]Laura Marie Feeney, Christian Rohner, Anders Lindgren:
How do the dynamics of battery discharge affect sensor lifetime? WONS 2014: 49-56 - 2013
- [j3]Martin Jacobsson, Christian Rohner:
Comparing wireless flooding protocols using trace-based simulations. EURASIP J. Wirel. Commun. Netw. 2013: 169 (2013) - [c24]Fredrik Bjurefors, Merkourios Karaliopoulos, Christian Rohner, Paul Smith, George Theodoropoulos, Per Gunningberg:
Resilience and opportunistic forwarding: beyond average value analysis. CHANTS@MobiCom 2013: 19-24 - [c23]Hjalmar Wennerström, Frederik Hermans, Olof Rensfelt, Christian Rohner, Lars-Åke Norden:
A long-term study of correlations between meteorological conditions and 802.15.4 link performance. SECON 2013: 221-229 - [c22]Christian Rohner, Laura Marie Feeney, Per Gunningberg:
Evaluating Battery Models in Wireless Sensor Networks. WWIC 2013: 29-42 - 2012
- [c21]Volkan Cambazoglu, Christian Rohner, Björn Victor:
The impact of trace and adversary models on location privacy provided by K-anonymity. MPM@EuroSys 2012: 6:1-6:6 - [c20]Merkourios Karaliopoulos, Christian Rohner:
Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation. INFOCOM 2012: 2651-2655 - [c19]Christian Rohner, Fredrik Bjurefors, Per Gunningberg, Liam McNamara, Erik Nordström:
Making the most of your contacts: transfer ordering in data-centric opportunistic networks. MobiOpp 2012: 53-60 - [c18]Ioana Rodhe, Christian Rohner, Edith C. H. Ngai:
On location privacy and quality of information in participatory sensing. Q2SWinet 2012: 55-62 - [c17]Saeed Bastani, Björn Landfeldt, Christian Rohner, Per Gunningberg:
A social node model for realising information dissemination strategies in delay tolerant networks. MSWiM 2012: 79-88 - [c16]Liam McNamara, Christian Rohner:
Mining conversations of geographically changing users. WWW (Companion Volume) 2012: 667-670 - 2011
- [c15]Fredrik Bjurefors, Per Gunningberg, Christian Rohner, Sam Tavakoli:
Congestion avoidance in a data-centric opportunistic network. ICN 2011: 32-37 - [c14]Theus Hossmann, Paolo Carta, Dominik Schatzmann, Franck Legendre, Per Gunningberg, Christian Rohner:
Twitter in disaster mode: security architecture. SWID@CoNEXT 2011: 7:1-7:8 - [c13]Theus Hossmann, Franck Legendre, Paolo Carta, Per Gunningberg, Christian Rohner:
Twitter in disaster mode: opportunistic communication and distribution of sensor data in emergencies. ExtremeCom 2011: 1:1-1:6 - [c12]João Guerreiro, Edith C. H. Ngai, Christian Rohner:
Privacy-aware probabilistic sampling for data collection in wireless sensor networks. IWCMC 2011: 314-319 - [c11]Davor Sutic, Ioana Rodhe, Christian Rohner, Björn Victor:
Lower trees with fixed degrees: A recipe for efficient secure hierarchical aggregation in WSNs. WCNC 2011: 659-664 - 2010
- [c10]Ioana Rodhe, Christian Rohner:
Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs. WWIC 2010: 386-397
2000 – 2009
- 2009
- [c9]Erik Nordström, Daniel Aldman, Fredrik Bjurefors, Christian Rohner:
Search-based picture sharing with mobile phones. MobiHoc 2009: 327-328 - [c8]Erik Nordström, Per Gunningberg, Christian Rohner:
Haggle: a data-centric network architecture for mobile devices. S³@MobiHoc 2009: 37-40 - 2008
- [c7]Ioana Rodhe, Christian Rohner:
n-LDA: n-Layers Data Aggregation in Sensor Networks. ICDCS Workshops 2008: 400-405 - 2007
- [j2]Laura Marie Feeney, Christian Rohner, Bengt Ahlgren:
Leveraging a power save protocol to improve performance in ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 51-52 (2007) - [c6]Andreas Achtzehn, Christian Rohner, Ioana Rodhe:
ARPD: Asynchronous random key predistribution in the LEAP framework for Wireless Sensor Networks. MASS 2007: 1-6 - [c5]Ioana Rodhe, Christian Rohner, Andreas Achtzehn:
n-LQA: n-Layers Query Authentication in Sensor Networks. MASS 2007: 1-6 - [c4]Laura Marie Feeney, Christian Rohner, Bengt Ahlgren:
The Impact of Wakeup Schedule Distribution in Asynchronous Power Save Protocols on the Performance of Multihop Wireless Networks. WCNC 2007: 3147-3152 - 2006
- [c3]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c2]Andreas Achtzehn, Zinaida Benenson, Christian Rohner:
Implementing Agreement Protocols in Sensor Networks. MASS 2006: 858-863 - 2001
- [j1]Reto Hermann, Dirk Husemann, Michael Moser, Michael Nidd, Christian Rohner, Andreas Schade:
DEAPspace - Transient ad hoc networking of pervasive devices. Comput. Networks 35(4): 411-428 (2001) - 2000
- [c1]Reto Hermann, Dirk Husemann, Michael Moser, Michael Nidd, Christian Rohner, Andreas Schade:
DEAPspace: transient ad-hoc networking of pervasive devices. MobiHoc 2000: 133-134
1990 – 1999
- 1991
- [b1]Christian Rohner:
Systematische Bedarfsermittlung, Spezifikation und Bereitstellung der Führungsinformationssysteme einer Unternehmung. ETH Zurich, Switzerland, 1991
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint