Search Results - "Wiesmaier, Alexander"
-
1
Efficient practical Byzantine consensus using random linear network coding
Published in Annales des télécommunications (01-02-2023)“…Using random linear network coding (RLNC) in asynchronous networks with one-to-many information flow has already been proven to be a valid approach to maximize…”
Get full text
Journal Article -
2
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
Published in Computers & security (01-05-2015)“…The world increasingly depends on archives to store digital documents, such as land registers and medical records, for long periods of time. For stored…”
Get full text
Journal Article -
3
In-packet Bloom filters: Design and networking applications
Published in Computer networks (Amsterdam, Netherlands : 1999) (25-04-2011)“…The Bloom filter (BF) is a well-known randomized data structure that answers set membership queries with some probability of false positives. In an attempt to…”
Get full text
Journal Article -
4
Towards a maturity model for crypto-agility assessment
Published 15-02-2022“…This work proposes the Crypto-Agility Maturity Model (CAMM for short), a maturity model for determining the state of crypto-agility of a given software or IT…”
Get full text
Journal Article -
5
A view on privacy & trust in IoT
Published in 2015 IEEE International Conference on Communication Workshop (ICCW) (01-06-2015)“…Internet of Things (IoT) technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in our personal life by means…”
Get full text
Conference Proceeding -
6
A survey of technologies for the internet of things
Published in 2015 International Wireless Communications and Mobile Computing Conference (IWCMC) (01-08-2015)“…The number of smart things is growing exponentially. By 2020, tens of billions of things will be deployed worldwide, collecting a wealth of diverse data…”
Get full text
Conference Proceeding -
7
Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte
Published 30-01-2021“…Currently, PQC algorithms are being standardized to address the emerging threat to conventional asymmetric algorithms from quantum computing. These new…”
Get full text
Journal Article -
8
On Message-based Consensus and Network Coding
Published in 2021 12th International Conference on Network of the Future (NoF) (06-10-2021)“…Using Random Linear Network Coding (RLNC) in asynchronous networks with one-to-many information flow has already been proven to be a valid approach to maximize…”
Get full text
Conference Proceeding -
9
crypto_{lib}$: Comparing and selecting cryptography libraries (long version of EICC 2022 publication)
Published 30-03-2022“…Selecting a library out of numerous candidates can be a laborious and resource-intensive task. We present the $crypto_{lib}$ index, a tool for decision-makers…”
Get full text
Journal Article -
10
On the Security of Encrypted Secret Sharing
Published in 2013 46th Hawaii International Conference on System Sciences (01-01-2013)“…Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption,…”
Get full text
Conference Proceeding -
11
Short Paper: IoT: Challenges, projects, architectures
Published in 2015 18th International Conference on Intelligence in Next Generation Networks (01-01-2015)“…Internet of Things (IoT) is a socio-technical phenomena with the power to disrupt our society such as the Internet before. IoT promises the (inter-) connection…”
Get full text
Conference Proceeding -
12
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Published 10-07-2020“…A good documentation is essential for a good usability of (security) APIs, i.e. especially for the correct use of the APIs. Requirements for good documentation…”
Get full text
Journal Article -
13
On PQC Migration and Crypto-Agility
Published 17-06-2021“…Besides the development of PQC algorithms, the actual migration of IT systems to such new schemes has to be considered, best by utilizing or establishing…”
Get full text
Journal Article -
14
End-2-End privacy architecture for IoT
Published in 2015 IEEE Conference on Communications and Network Security (CNS) (01-09-2015)“…We present an IoT privacy architecture covering End-2-End data handling at devices, connections and in the cloud. The system is driven by privacy policies…”
Get full text
Conference Proceeding -
15
Multi domain information architecture and modeling for Smart Grids
Published in 2013 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia) (01-11-2013)“…Smart Grids are trending towards integrating Industrial Control Systems (ICS) and other domain systems for efficient operational and maintenance activities and…”
Get full text
Conference Proceeding -
16
Withdrawn: Privacy in smart metering ecosystems
Published in 2012 International Conference on Smart Grid Technology, Economics and Policies (SG-TEP) (01-12-2012)“…While smart metering is a key technology for reaching a sustainable consumption of resources, smart buildings are on their way to provide ubiquitous home…”
Get full text
Conference Proceeding -
17
In-packet Bloom filters: Design and networking applications
Published 25-08-2009“…The Bloom filter (BF) is a well-known space-efficient data structure that answers set membership queries with some probability of false positives. In an…”
Get full text
Journal Article