default search action
Dirk Westhoff
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c48]Jan Breig, Dirk Westhoff:
Short Paper: Debating Ethics with Cybersecurity Students. Sicherheit 2022: 183-192 - 2020
- [c47]Louis Tajan, Dirk Westhoff, Frederik Armknecht:
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private. ICETE (2) 2020: 443-450 - [i6]Louis Tajan, Dirk Westhoff:
Approach for GDPR Compliant Detection of COVID-19 Infection Chains. CoRR abs/2007.08248 (2020)
2010 – 2019
- 2019
- [c46]Louis Tajan, Dirk Westhoff:
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets. CECC 2019: 16:1-16:6 - [i5]Louis Tajan, Dirk Westhoff, Frederik Armknecht:
Private Set Relations with Bloom Filters for Outsourced SLA Validation. IACR Cryptol. ePrint Arch. 2019: 993 (2019) - 2018
- [j22]Dirk Westhoff, Maximilian Zeiser:
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility. Int. J. Cyber Warf. Terror. 8(2): 1-16 (2018) - [c45]Louis Tajan, Moritz Kaumanns, Dirk Westhoff:
Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing. NTMS 2018: 1-6 - 2017
- [j21]Johann Betz, Dirk Westhoff, Günter Müller:
Survey on covert channels in virtual machines and cloud computing. Trans. Emerg. Telecommun. Technol. 28(6) (2017) - [c44]Maximilian Zeiser, Johann Betz, Dirk Westhoff:
Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's Credit Scheduler. GLOBECOM 2017: 1-7 - 2016
- [c43]Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht:
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing. ICITST 2016: 162-169 - [c42]Maximilian Zeiser, Dirk Westhoff:
Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices. I4CS 2016: 75-89 - 2015
- [c41]Asif Mohammad, Jurgen Stader, Dirk Westhoff:
A privacy-friendly smart metering architecture with few-instance storage. I4CS 2015: 1-7 - [c40]Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander, Dennis Schweer, Katharina Mollus, Dirk Westhoff:
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8 - [c39]Sascha Niro, Jose M. Lopez, Dirk Westhoff, Andreas H. Christ:
A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for Prosumer Markets. SASO Workshops 2015: 31-36 - 2014
- [j20]Friedbert Kaspar, Bertold Laschinger, Dirk Westhoff:
Portrait: Arbeitsgruppe IT-Sicherheit, Hochschule Furtwangen (HFU). Prax. Inf.verarb. Kommun. 37(1): 67-68 (2014) - [c38]Johann Betz, Dirk Westhoff:
C3-Sched - A cache covert channel robust cloud computing scheduler. ICITST 2014: 54-60 - [c37]Katharina Mollus, Dirk Westhoff, Tobias Markmann:
Curtailing privilege escalation attacks over asynchronous channels on Android. I4CS 2014: 87-94 - [c36]Jose M. Lopez, Thomas Rübsamen, Dirk Westhoff:
Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption. I4CS 2014: 95-103 - [e6]Jens-Matthias Bohli, Friedbert Kaspar, Dirk Westhoff:
Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen. De Gruyter Oldenbourg 2014, ISBN 978-3-11-035865-0 [contents] - 2013
- [j19]Félix Gómez Mármol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martínez Pérez:
Privacy-enhanced architecture for smart metering. Int. J. Inf. Sec. 12(2): 67-82 (2013) - [c35]Tobias Markmann, Dennis Gessner, Dirk Westhoff:
QuantDroid: Quantitative approach towards mitigating privilege escalation on Android. ICC 2013: 2144-2149 - [c34]Dirk Westhoff, Osman Ugus:
Malleability resilient (premium) Concealed Data Aggregation. WOWMOM 2013: 1-6 - 2012
- [j18]Alban Hessler, Takahiro Kakumaru, Heiner Perrey, Dirk Westhoff:
Data obfuscation with network coding. Comput. Commun. 35(1): 48-61 (2012) - [c33]Osman Ugus, Martin Landsmann, Dennis Gessner, Dirk Westhoff:
A Smartphone Security Architecture for App Verification and Process Authentication. ICCCN 2012: 1-9 - [c32]Benjamin Vetter, Dirk Westhoff:
Simulation study on code attestation with compressed instruction code. PerCom Workshops 2012: 296-301 - [c31]Osman Ugus, Dirk Westhoff, Hariharan Rajasekaran:
A leaky bucket called smartphone. PerCom Workshops 2012: 374-380 - [c30]Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge:
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. SECRYPT 2012: 102-112 - [c29]Matthias Wählisch, Sebastian Trapp, Jochen H. Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder:
Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles. SIGCOMM 2012: 271-272 - 2011
- [j17]Jens-Matthias Bohli, Alban Hessler, Klaus Maier, Osman Ugus, Dirk Westhoff:
Dependable Over-the-Air Programming. Ad Hoc Sens. Wirel. Networks 13(3-4): 313-340 (2011) - [j16]Heiner Perrey, Osman Ugus, Dirk Westhoff:
WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 45-46 (2011) - [c28]Benjamin Vetter, Dirk Westhoff:
Code Attestation with Compressed Instruction Code. IICS 2011: 170-181 - [c27]Osman Ugus, Dirk Westhoff:
An MTM based Watchdog for Malware Famishment in Smartphones. IICS 2011: 251-262 - [c26]Jens-Matthias Bohli, Panos Papadimitratos, Donato Verardi, Dirk Westhoff:
Resilient data aggregation for unattended WSNs. LCN 2011: 994-1002 - [e5]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8 [contents] - [i4]Benjamin Vetter, Dirk Westhoff:
Code Attestation with Compressed Instruction Code. CoRR abs/1102.5322 (2011) - 2010
- [j15]Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff:
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen). it Inf. Technol. 52(6): 313-319 (2010) - [j14]Steffen Peter, Dirk Westhoff, Claude Castelluccia:
A Survey on the Encryption of Convergecast Traffic with In-Network Processing. IEEE Trans. Dependable Secur. Comput. 7(1): 20-34 (2010) - [c25]Alban Hessler, Takahiro Kakumaru, Dirk Westhoff:
When Eco-IT meets security: Concealed network coding for multicast traffic. PerCom Workshops 2010: 630-635
2000 – 2009
- 2009
- [j13]Jens-Matthias Bohli, Christoph Sorge, Dirk Westhoff:
Initial observations on economics, pricing, and penetration of the internet of things market. Comput. Commun. Rev. 39(2): 50-55 (2009) - [c24]Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff:
Security enhanced multi-hop over the air reprogramming with Fountain Codes. LCN 2009: 850-857 - [c23]Frederik Armknecht, Dirk Westhoff:
Using Merkle's Puzzle for key agreement with low-end devices. LCN 2009: 858-864 - [c22]Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli:
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. WISEC 2009: 29-40 - [c21]Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff:
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. WISEC 2009: 253-260 - [i3]Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff:
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks. CoRR abs/0901.1095 (2009) - [i2]Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss:
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks. CoRR abs/0903.3900 (2009) - [i1]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper). IACR Cryptol. ePrint Arch. 2009: 175 (2009) - 2008
- [j12]Frederik Armknecht, Dirk Westhoff, Joao Girão, Alban Hessler:
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. Comput. Commun. 31(4): 734-749 (2008) - [j11]Christoph Sorge, Dirk Westhoff:
eIDs und Identitätsmanagement. Datenschutz und Datensicherheit 32(5): 337-341 (2008) - [c20]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol. INDOCRYPT 2008: 158-171 - [c19]Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff:
A secure and resilient WSN roadside architecture for intelligent transport systems. WISEC 2008: 161-171 - [e4]Holger Karl, Dirk Westhoff:
6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, WIOPT 2008, March 31 - April 4, 2008, Berlin, Germany. IEEE 2008, ISBN 978-963-9799-18-9 [contents] - 2007
- [j10]Joao Girão, Dirk Westhoff, Einar Mykletun, Toshinori Araki:
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks 5(7): 1073-1089 (2007) - [c18]Michael Sirivianos, Dirk Westhoff, Frederik Armknecht, Joao Girão:
Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks. WiOpt 2007: 1-10 - 2006
- [j9]Oliver Stanze, Kilian Weniger, Martina Zitterbart, Stefan Aust, Nico Bayer, Michael Gerharz, Bernd Lamparter, Dirk Westhoff, Erik Weiss:
Routing and Self-organization in IP based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen). it Inf. Technol. 48(5): 287- (2006) - [j8]Dirk Westhoff, Joao Girão, Mithun Acharya:
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Trans. Mob. Comput. 5(10): 1417-1431 (2006) - [c17]Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff:
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. ESAS 2006: 18-31 - [c16]Einar Mykletun, Joao Girão, Dirk Westhoff:
Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. ICC 2006: 2288-2295 - [e3]Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3 [contents] - 2005
- [j7]Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff:
Estimating the value of co-operation approaches for multi-hop ad hoc networks. Ad Hoc Networks 3(1): 17-26 (2005) - [j6]Dirk Westhoff, Bernd Lamparter, Christof Paar, André Weimerskirch:
On digital signatures in ad hoc networks. Eur. Trans. Telecommun. 16(5): 411-425 (2005) - [c15]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Entity Recognition for Sensor Network Motes. GI Jahrestagung (2) 2005: 145-149 - [c14]Joao Girão, Dirk Westhoff, Markus Schneider:
CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. ICC 2005: 3044-3049 - [c13]Jonathan Hammell, André Weimerskirch, Joao Girão, Dirk Westhoff:
Recognition in a Low-Power Environment. ICDCS Workshops 2005: 933-938 - [c12]Mithun Acharya, Joao Girão, Dirk Westhoff:
Secure Comparison of Encrypted Data in Wireless Sensor Networks. WiOpt 2005: 47-53 - [e2]Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff:
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3313, Springer 2005, ISBN 3-540-24396-8 [contents] - [e1]Refik Molva, Gene Tsudik, Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3813, Springer 2005, ISBN 3-540-30912-8 [contents] - 2004
- [c11]Andreas Festag, Joao Girão, Telemaco Melia, Dirk Westhoff:
On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols. DFN-Arbeitstagung über Kommunikationsnetze 2004: 61-76 - [c10]Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, João Paulo Barraca:
Linking Ad Hoc Charging Schemes to AAAC Architectures. ESAS 2004: 66-81 - [c9]Joao Girão, João Paulo Barraca, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar:
QoS-Differentiated Secure Charging in Ad-Hoc Environments. ICT 2004: 1093-1100 - 2003
- [j5]Bernd Lamparter, Krishna Paul, Dirk Westhoff:
Charging support for ad hoc stub networks. Comput. Commun. 26(13): 1504-1514 (2003) - [j4]Martina Zitterbart, Kilian Weniger, Oliver Stanze, Stefan Aust, Matthias Frank, Michael Gerharz, Reinhard Gloger, Carmelita Görg, Ingo Gruber, Sven Hischke, Paul James, Hui Li, Cornel Pampu, Christian de Waal, Erik Weiss, Dirk Westhoff, Jingzhu Wu, Di Yu, Bangnan Xu:
IPonAir - Drahtloses Internet der nächsten Generation. Prax. Inf.verarb. Kommun. 26(4): 190-196 (2003) - [j3]Bernd Lamparter, Ingo Riedel, Dirk Westhoff:
Anmerkungen zur Nutzung digitaler Signaturen in Ad Hoc Netzwerken. Prax. Inf.verarb. Kommun. 26(4): 223-227 (2003) - [j2]Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff:
About the impact of co-operation approaches for Ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3): 41-42 (2003) - [c8]Bernd Lamparter, Dirk Westhoff:
A Low-Cost Packet Originator Verification for Metering at Access-Routers. Networked Group Communication 2003: 287-297 - [c7]André Weimerskirch, Dirk Westhoff:
Zero Common-Knowledge Authentication for Pervasive Networks. Selected Areas in Cryptography 2003: 73-87 - [c6]André Weimerskirch, Dirk Westhoff:
Identity certified authentication for ad-hoc networks. SASN 2003: 33-40 - 2002
- [c5]Krishna Paul, Dirk Westhoff:
Context aware detection of selfish nodes in DSR based ad-hoc networks. GLOBECOM 2002: 178-182 - 2001
- [j1]Dirk Westhoff:
An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code. Int. J. Softw. Eng. Knowl. Eng. 11(5): 607-619 (2001) - [c4]Dirk Westhoff, Bernd Lamparter:
Charging related mobile Device Authentication. GI Jahrestagung (1) 2001: 129-135 - [c3]Hannes Hartenstein, Karl Jonas, Marco Liebsch, Martin Stiemerling, Ralf Schmitz, Dirk Westhoff:
Scalable Anonymous Connections in the Context of MIP and AAA. WETICE 2001: 217-222 - 2000
- [b1]Dirk Westhoff:
Ein dezentrales Agentensystem unter Berücksichtigung von mehrseitiger Sicherheit. University of Hagen, Germany, Shaker 2000, ISBN 978-3-8265-8117-5, pp. 1-217
1990 – 1999
- 1999
- [c2]Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Methods for Protecting a Mobile Agent's Route. ISW 1999: 57-71 - [c1]Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Protecting a Mobile Agent's Route against Collusions. Selected Areas in Cryptography 1999: 215-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint