


default search action
René Hummen
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Lukas Wüsteney, David Hellmanns, Markus Schramm
, Lukas Osswald, René Hummen, Michael Menth, Tobias Heer:
Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks. CoNEXT 2022: 91-109 - 2021
- [c20]David Hellmanns, Lucas Haug
, Moritz Hildebrand, Frank Dürr, Stephan Kehrer, René Hummen:
How to Optimize Joint Routing and Scheduling Models for TSN Using Integer Linear Programming. RTNS 2021: 100-111 - [c19]Lukas Wüsteney, Michael Menth, René Hummen, Tobias Heer:
Impact of Packet Filtering on Time-Sensitive Networking Traffic. WFCS 2021: 59-66 - 2020
- [c18]David Hellmanns, Jonathan Falk, Alexander Glavackij, René Hummen, Stephan Kehrer, Frank Dürr:
On the Performance of Stream-based, Class-based Time-aware Shaping and Frame Preemption in TSN. ICIT 2020: 298-303 - [c17]David Hellmanns, Alexander Glavackij, Jonathan Falk, René Hummen, Stephan Kehrer, Frank Dürr:
Scaling TSN Scheduling for Factory Automation Networks. WFCS 2020: 1-8
2010 – 2019
- 2016
- [i2]Martin Henze
, René Hummen, Roman Matzutt, Klaus Wehrle:
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud. CoRR abs/1607.03239 (2016) - 2015
- [b1]René Hummen:
Resource-conscious network security for the IP-based internet of things. RWTH Aachen University, Shaker 2015, pp. 1-218 - [c16]Jan Henrik Ziegeldorf, Martin Henze
, René Hummen, Klaus Wehrle
:
Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper). DPM/QASA@ESORICS 2015: 226-234 - 2014
- [c15]Martin Henze
, Sebastian Bereda, René Hummen, Klaus Wehrle
:
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud. EUSPN/ICTH 2014: 370-375 - [c14]René Hummen, Hossein Shafagh, Shahid Raza
, Thiemo Voigt, Klaus Wehrle
:
Delegation-based authentication and authorization for the IP-based Internet of Things. SECON 2014: 284-292 - [p2]Martin Henze
, René Hummen, Roman Matzutt
, Klaus Wehrle
:
A Trust Point-based Security Architecture for Sensor Data in the Cloud. Trusted Cloud Computing 2014: 77-106 - [p1]Michael Eggert, Roger Häußling, Martin Henze
, Lars Hermerschmidt, René Hummen, Daniel Kerpen
, Antonio Navarro Pérez, Bernhard Rumpe
, Dirk Thißen, Klaus Wehrle
:
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. Trusted Cloud Computing 2014: 203-218 - 2013
- [j3]Martin Henze
, René Hummen, Roman Matzutt
, Daniel Catrein, Klaus Wehrle
:
Maintaining User Control While Storing and Processing Sensor Data in the Cloud. Int. J. Grid High Perform. Comput. 5(4): 97-112 (2013) - [c13]René Hummen, Klaus Wehrle
:
Standards-based end-to-end IP security for the Internet of Things. ICNP 2013: 1-3 - [c12]René Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller
, Klaus Wehrle
:
Tailoring end-to-end IP security protocols to the Internet of Things. ICNP 2013: 1-10 - [c11]Martin Henze
, René Hummen, Klaus Wehrle
:
The Cloud Needs Cross-Layer Data Handling Annotations. IEEE Symposium on Security and Privacy Workshops 2013: 18-22 - [c10]René Hummen, Jens Hiller
, Martin Henze
, Klaus Wehrle
:
Slimfit - A HIP DEX compression layer for the IP-based Internet of Things. WiMob 2013: 259-266 - [c9]René Hummen, Jens Hiller
, Hanno Wirtz, Martin Henze
, Hossein Shafagh, Klaus Wehrle
:
6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66 - [i1]Michael Eggert, Roger Häußling, Martin Henze
, Lars Hermerschmidt, René Hummen, Daniel Kerpen
, Antonio Navarro Pérez, Bernhard Rumpe
, Dirk Thißen, Klaus Wehrle
:
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. CoRR abs/1310.6542 (2013) - 2012
- [c8]René Hummen, Martin Henze
, Daniel Catrein, Klaus Wehrle
:
A Cloud design for user-controlled storage and processing of sensor data. CloudCom 2012: 232-240 - [c7]Hanno Wirtz, Tobias Heer, René Hummen, Klaus Wehrle
:
Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks. ICC 2012: 653-658 - [c6]René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle
:
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. TrustCom 2012: 525-532 - 2011
- [j2]René Hummen, Hanno Wirtz, Nicolai Viol, Tobias Heer, Klaus Wehrle
:
WiSec 2011 demo: PISA-SA - security and mobility in a collaborative muni-fi. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 35-36 (2011) - [j1]Tobias Heer, Oscar García Morchon, René Hummen, Sye Loong Keoh
, Sandeep S. Kumar, Klaus Wehrle
:
Security Challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61(3): 527-542 (2011) - [c5]Hanno Wirtz, René Hummen, Nicolai Viol, Tobias Heer, Mónica Alejandra Lora Girón, Klaus Wehrle:
Cooperative Wi-Fi-sharing: Encouraging fair play. Kaleidoscope 2011: 1-8 - [c4]Hanno Wirtz, Robert Backhaus, René Hummen, Klaus Wehrle
:
Establishing mobile ad-hoc networks in 802.11 infrastructure mode. WiNTECH 2011: 89-90 - 2010
- [c3]Tobias Heer, Thomas Jansen, René Hummen, Stefan Götz, Hanno Wirtz, Elias Weingärtner, Klaus Wehrle
:
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing. ICCCN 2010: 1-8 - [c2]Tobias Heer, René Hummen, Nicolai Viol, Hanno Wirtz, Stefan Götz, Klaus Wehrle
:
Collaborative municipal Wi-Fi networks - challenges and opportunities. PerCom Workshops 2010: 588-593
2000 – 2009
- 2009
- [c1]Tobias Heer, René Hummen, Miika Komu, Stefan Götz, Klaus Wehrle
:
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace. ICC 2009: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 00:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint