The SCEAS System
Navigation Menu

Search the dblp DataBase


Dirk Westhoff: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andreas Festag, Joao Girão, Telemaco Melia, Dirk Westhoff
    On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:61-76 [Conf]
  2. Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, Joao P. Barraca
    Linking Ad Hoc Charging Schemes to AAAC Architectures. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:66-81 [Conf]
  3. Frederik Armknecht, Joao Girão, Marc Stoecklin, Dirk Westhoff
    Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:18-31 [Conf]
  4. Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff
    Entity Recognition for Sensor Network Motes. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2005, pp:145-149 [Conf]
  5. Dirk Westhoff, Bernd Lamparter
    Charging related mobile Device Authentication. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2001, pp:129-135 [Conf]
  6. Jonathan Hammell, André Weimerskirch, Joao Girão, Dirk Westhoff
    Recognition in a Low-Power Environment. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:933-938 [Conf]
  7. Joao Girão, Joao P. Barraca, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar
    QoS-Differentiated Secure Charging in Ad-Hoc Environments. [Citation Graph (0, 0)][DBLP]
    ICT, 2004, pp:1093-1100 [Conf]
  8. Dirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali
    Methods for Protecting a Mobile Agent's Route. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:57-71 [Conf]
  9. Bernd Lamparter, Dirk Westhoff
    A Low-Cost Packet Originator Verification for Metering at Access-Routers. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:287-297 [Conf]
  10. André Weimerskirch, Dirk Westhoff
    Zero Common-Knowledge Authentication for Pervasive Networks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:73-87 [Conf]
  11. Dirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali
    Protecting a Mobile Agent's Route against Collusions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:215-225 [Conf]
  12. André Weimerskirch, Dirk Westhoff
    Identity certified authentication for ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:33-40 [Conf]
  13. Hannes Hartenstein, K. Jonas, Marco Liebsch, M. Stiemerling, Ralf Schmitz, Dirk Westhoff
    Scalable Anonymous Connections in the Context of MIP and AAA. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:217-222 [Conf]
  14. Mithun Acharya, Joao Girão, Dirk Westhoff
    Secure Comparison of Encrypted Data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:47-53 [Conf]
  15. Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff
    Estimating the value of co-operation approaches for multi-hop ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:1, pp:17-26 [Journal]
  16. Bernd Lamparter, Krishna Paul, Dirk Westhoff
    Charging support for ad hoc stub networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:13, pp:1504-1514 [Journal]
  17. Dirk Westhoff
    An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2001, v:11, n:5, pp:607-619 [Journal]
  18. Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff
    About the impact of co-operation approaches for Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2003, v:7, n:3, pp:41-42 [Journal]
  19. Dirk Westhoff, Joao Girão, Mithun Acharya
    Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:10, pp:1417-1431 [Journal]
  20. Joao Girão, Dirk Westhoff, Einar Mykletun, Toshinori Araki
    TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:7, pp:1073-1089 [Journal]
  21. Oliver Stanze, Kilian Weniger, Martina Zitterbart, Stefan Aust, Nico Bayer, Michael Gerharz, Bernd Lamparter, Dirk Westhoff, Erik Weiss
    Routing and Self-organization in IP based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:5, pp:287-0 [Journal]

  22. Concrete Security for Entity Recognition: The Jane Doe Protocol. [Citation Graph (, )][DBLP]

  23. Using Merkle's Puzzle for key agreement with low-end devices. [Citation Graph (, )][DBLP]

  24. Security enhanced multi-hop over the air reprogramming with Fountain Codes. [Citation Graph (, )][DBLP]

  25. When Eco-IT meets security: Concealed network coding for multicast traffic. [Citation Graph (, )][DBLP]

  26. A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP]

  27. FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. [Citation Graph (, )][DBLP]

  28. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. [Citation Graph (, )][DBLP]

  29. Initial observations on economics, pricing, and penetration of the internet of things market. [Citation Graph (, )][DBLP]

  30. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. [Citation Graph (, )][DBLP]

  31. FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks [Citation Graph (, )][DBLP]

  32. Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks [Citation Graph (, )][DBLP]

Search in 0.013secs, Finished in 0.014secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002