Quantcast
Channel: dblp: Jens Hiller
Browsing latest articles
Browse All 31 View Live

Image may be NSFW.
Clik here to view.

6LoWPAN fragmentation attacks and mitigation mechanisms.

René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle: 6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66

View Article



Image may be NSFW.
Clik here to view.

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.

René Hummen, Jens Hiller, Martin Henze, Klaus Wehrle: Slimfit - A HIP DEX compression layer for the IP-based Internet of Things. WiMob 2013: 259-266

View Article

Image may be NSFW.
Clik here to view.

Tailoring end-to-end IP security protocols to the Internet of Things.

René Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle: Tailoring end-to-end IP security protocols to the Internet of Things. ICNP 2013: 1-10

View Article

Image may be NSFW.
Clik here to view.

End-to-End Security for Internet-Connected Smart Objects.

Jens Hiller: End-to-End Security for Internet-Connected Smart Objects. Prax. Inf.verarb. Kommun. 36(1): 23-29 (2013)

View Article

Image may be NSFW.
Clik here to view.

Bandwidth-Optimized Secure Two-Party Computation of Minima.

Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle: Bandwidth-Optimized Secure Two-Party Computation of Minima. CANS 2015: 197-213

View Article


Image may be NSFW.
Clik here to view.

CPPL: Compact Privacy Policy Language.

Martin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, Klaus Wehrle: CPPL: Compact Privacy Policy Language. WPES@CCS 2016: 99-110

View Article

Image may be NSFW.
Clik here to view.

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private...

Martin Henze, Jens Hiller, Oliver Hohlfeld, Klaus Wehrle: Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. IC2E Workshops 2016: 130-135

View Article

Image may be NSFW.
Clik here to view.

Towards Transparent Information on Individual Cloud Service Usage.

Martin Henze, Daniel Kerpen, Jens Hiller, Michael Eggert, David Hellmanns, Erik Mühmer, Oussama Renuli, Henning Maier, Christian Stüble, Roger Häußling, Klaus Wehrle: Towards Transparent Information on...

View Article


Image may be NSFW.
Clik here to view.

Practical Data Compliance for Cloud Storage.

Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Practical Data Compliance for Cloud Storage. IC2E 2017: 252-258

View Article


Image may be NSFW.
Clik here to view.

Complying with Data Handling Requirements in Cloud Storage Systems.

Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Complying with Data Handling Requirements in Cloud Storage Systems. CoRR...

View Article

Image may be NSFW.
Clik here to view.

Application-Agnostic Offloading of Datagram Processing.

Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle: Application-Agnostic Offloading of Datagram Processing. ITC (1) 2018: 46-54

View Article

Image may be NSFW.
Clik here to view.

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.

Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, Klaus Wehrle: Secure Low Latency Communication for Constrained Industrial IoT Scenarios. LCN 2018: 614-622

View Article

Image may be NSFW.
Clik here to view.

Thwarting Unwanted Blockchain Content Insertion.

Roman Matzutt, Martin Henze, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle: Thwarting Unwanted Blockchain Content Insertion. IC2E 2018: 364-370

View Article


Image may be NSFW.
Clik here to view.

Giving Customers Control Over Their Data: Integrating a Policy Language into...

Jens Hiller, Maël Kimmerlin, Max Plauth, Seppo Heikkilä, Stefan Klauck, Ville Lindfors, Felix Eberhardt, Dariusz Bursztynowski, Jesus Llorente Santos, Oliver Hohlfeld, Klaus Wehrle: Giving Customers...

View Article

Image may be NSFW.
Clik here to view.

A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on...

Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle: A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin....

View Article


Image may be NSFW.
Clik here to view.

SPLIT: Smart Protocol Loading for the IoT.

Torsten Zimmermann, Jens Hiller, Helge Reelfs, Pascal Hein, Klaus Wehrle: SPLIT: Smart Protocol Loading for the IoT. EWSN 2018: 49-54

View Article

Image may be NSFW.
Clik here to view.

Measuring Adoption of Security Additions to the HTTPS Ecosystem.

Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan...

View Article


Image may be NSFW.
Clik here to view.

A First Look at Certification Authority Authorization (CAA).

Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, Ralph Holz, David R. Choffnes, Alan Mislove, Georg Carle: A First Look at...

View Article

Image may be NSFW.
Clik here to view.

Application-Agnostic Offloading of Packet Processing.

Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle: Application-Agnostic Offloading of Packet Processing. CoRR abs/1904.00671 (2019)

View Article

Image may be NSFW.
Clik here to view.

The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads.

Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle: The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. LCN Symposium 2019: 83-91

View Article

Image may be NSFW.
Clik here to view.

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.

Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko: Multipathing Traffic to Reduce Entry Node Exposure in...

View Article


Image may be NSFW.
Clik here to view.

Tailoring Onion Routing to the Internet of Things: Security and Privacy in...

Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle: Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. ICNP 2019:...

View Article


Image may be NSFW.
Clik here to view.

Privacy-Preserving Remote Knowledge System.

Markus Dahlmanns, Chris Dax, Roman Matzutt, Jan Pennekamp, Jens Hiller, Klaus Wehrle: Privacy-Preserving Remote Knowledge System. ICNP 2019: 1-2

View Article

Image may be NSFW.
Clik here to view.

POSTER: Traffic Splitting to Counter Website Fingerprinting.

Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko: POSTER: Traffic Splitting to Counter Website Fingerprinting. CCS 2019:...

View Article

Image may be NSFW.
Clik here to view.

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in...

Jens Hiller, Johanna Amann, Oliver Hohlfeld: The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CoRR abs/2009.08772 (2020)

View Article


Image may be NSFW.
Clik here to view.

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.

Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko: TrafficSliver: Fighting Website Fingerprinting Attacks...

View Article

Image may be NSFW.
Clik here to view.

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in...

Jens Hiller, Johanna Amann, Oliver Hohlfeld: The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CCS 2020: 1289-1306

View Article

Image may be NSFW.
Clik here to view.

Tracking the deployment of TLS 1.3 on the web: a story of experimentation and...

Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, Oliver Hohlfeld: Tracking the deployment of TLS 1.3 on the web: a story of experimentation and...

View Article

Image may be NSFW.
Clik here to view.

Complying With Data Handling Requirements in Cloud Storage Systems.

Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Complying With Data Handling Requirements in Cloud Storage Systems. IEEE Trans. Cloud...

View Article



Image may be NSFW.
Clik here to view.

Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.

Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle: Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks. Electron. Commun. Eur. Assoc. Softw. Sci....

View Article

Image may be NSFW.
Clik here to view.

Improving functionality, efficiency, and trustworthiness of secure...

Jens Hiller: Improving functionality, efficiency, and trustworthiness of secure communication on an Internet diversified by mobile devices and the Internet of Things. RWTH Aachen University, Germany,...

View Article
Browsing latest articles
Browse All 31 View Live




Latest Images