6LoWPAN fragmentation attacks and mitigation mechanisms.
René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle: 6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66
View ArticleSlimfit - A HIP DEX compression layer for the IP-based Internet of Things.
René Hummen, Jens Hiller, Martin Henze, Klaus Wehrle: Slimfit - A HIP DEX compression layer for the IP-based Internet of Things. WiMob 2013: 259-266
View ArticleTailoring end-to-end IP security protocols to the Internet of Things.
René Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle: Tailoring end-to-end IP security protocols to the Internet of Things. ICNP 2013: 1-10
View ArticleEnd-to-End Security for Internet-Connected Smart Objects.
Jens Hiller: End-to-End Security for Internet-Connected Smart Objects. Prax. Inf.verarb. Kommun. 36(1): 23-29 (2013)
View ArticleBandwidth-Optimized Secure Two-Party Computation of Minima.
Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle: Bandwidth-Optimized Secure Two-Party Computation of Minima. CANS 2015: 197-213
View ArticleCPPL: Compact Privacy Policy Language.
Martin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, Klaus Wehrle: CPPL: Compact Privacy Policy Language. WPES@CCS 2016: 99-110
View ArticleMoving Privacy-Sensitive Services from Public Clouds to Decentralized Private...
Martin Henze, Jens Hiller, Oliver Hohlfeld, Klaus Wehrle: Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. IC2E Workshops 2016: 130-135
View ArticleTowards Transparent Information on Individual Cloud Service Usage.
Martin Henze, Daniel Kerpen, Jens Hiller, Michael Eggert, David Hellmanns, Erik Mühmer, Oussama Renuli, Henning Maier, Christian Stüble, Roger Häußling, Klaus Wehrle: Towards Transparent Information on...
View ArticlePractical Data Compliance for Cloud Storage.
Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Practical Data Compliance for Cloud Storage. IC2E 2017: 252-258
View ArticleComplying with Data Handling Requirements in Cloud Storage Systems.
Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Complying with Data Handling Requirements in Cloud Storage Systems. CoRR...
View ArticleApplication-Agnostic Offloading of Datagram Processing.
Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle: Application-Agnostic Offloading of Datagram Processing. ITC (1) 2018: 46-54
View ArticleSecure Low Latency Communication for Constrained Industrial IoT Scenarios.
Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, Klaus Wehrle: Secure Low Latency Communication for Constrained Industrial IoT Scenarios. LCN 2018: 614-622
View ArticleThwarting Unwanted Blockchain Content Insertion.
Roman Matzutt, Martin Henze, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle: Thwarting Unwanted Blockchain Content Insertion. IC2E 2018: 364-370
View ArticleGiving Customers Control Over Their Data: Integrating a Policy Language into...
Jens Hiller, Maël Kimmerlin, Max Plauth, Seppo Heikkilä, Stefan Klauck, Ville Lindfors, Felix Eberhardt, Dariusz Bursztynowski, Jesus Llorente Santos, Oliver Hohlfeld, Klaus Wehrle: Giving Customers...
View ArticleA Quantitative Analysis of the Impact of Arbitrary Blockchain Content on...
Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle: A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin....
View ArticleSPLIT: Smart Protocol Loading for the IoT.
Torsten Zimmermann, Jens Hiller, Helge Reelfs, Pascal Hein, Klaus Wehrle: SPLIT: Smart Protocol Loading for the IoT. EWSN 2018: 49-54
View ArticleMeasuring Adoption of Security Additions to the HTTPS Ecosystem.
Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan...
View ArticleA First Look at Certification Authority Authorization (CAA).
Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, Ralph Holz, David R. Choffnes, Alan Mislove, Georg Carle: A First Look at...
View ArticleApplication-Agnostic Offloading of Packet Processing.
Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle: Application-Agnostic Offloading of Packet Processing. CoRR abs/1904.00671 (2019)
View ArticleThe Case for Session Sharing: Relieving Clients from TLS Handshake Overheads.
Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle: The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. LCN Symposium 2019: 83-91
View ArticleMultipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko: Multipathing Traffic to Reduce Entry Node Exposure in...
View ArticleTailoring Onion Routing to the Internet of Things: Security and Privacy in...
Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle: Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. ICNP 2019:...
View ArticlePrivacy-Preserving Remote Knowledge System.
Markus Dahlmanns, Chris Dax, Roman Matzutt, Jan Pennekamp, Jens Hiller, Klaus Wehrle: Privacy-Preserving Remote Knowledge System. ICNP 2019: 1-2
View ArticlePOSTER: Traffic Splitting to Counter Website Fingerprinting.
Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko: POSTER: Traffic Splitting to Counter Website Fingerprinting. CCS 2019:...
View ArticleThe Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in...
Jens Hiller, Johanna Amann, Oliver Hohlfeld: The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CoRR abs/2009.08772 (2020)
View ArticleTrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko: TrafficSliver: Fighting Website Fingerprinting Attacks...
View ArticleThe Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in...
Jens Hiller, Johanna Amann, Oliver Hohlfeld: The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CCS 2020: 1289-1306
View ArticleTracking the deployment of TLS 1.3 on the web: a story of experimentation and...
Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, Oliver Hohlfeld: Tracking the deployment of TLS 1.3 on the web: a story of experimentation and...
View ArticleComplying With Data Handling Requirements in Cloud Storage Systems.
Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle: Complying With Data Handling Requirements in Cloud Storage Systems. IEEE Trans. Cloud...
View ArticleDemo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle: Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks. Electron. Commun. Eur. Assoc. Softw. Sci....
View ArticleImproving functionality, efficiency, and trustworthiness of secure...
Jens Hiller: Improving functionality, efficiency, and trustworthiness of secure communication on an Internet diversified by mobile devices and the Internet of Things. RWTH Aachen University, Germany,...
View Article
More Pages to Explore .....