Search the dblp DataBase
Dirk Westhoff :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Andreas Festag , Joao Girão , Telemaco Melia , Dirk Westhoff On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols. [Citation Graph (0, 0)][DBLP ] DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:61-76 [Conf ] Joao Girão , Bernd Lamparter , Dirk Westhoff , Rui L. Aguiar , Joao P. Barraca Linking Ad Hoc Charging Schemes to AAAC Architectures. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:66-81 [Conf ] Frederik Armknecht , Joao Girão , Marc Stoecklin , Dirk Westhoff Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:18-31 [Conf ] Stefan Lucks , Erik Zenner , André Weimerskirch , Dirk Westhoff Entity Recognition for Sensor Network Motes. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2005, pp:145-149 [Conf ] Dirk Westhoff , Bernd Lamparter Charging related mobile Device Authentication. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2001, pp:129-135 [Conf ] Jonathan Hammell , André Weimerskirch , Joao Girão , Dirk Westhoff Recognition in a Low-Power Environment. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:933-938 [Conf ] Joao Girão , Joao P. Barraca , Bernd Lamparter , Dirk Westhoff , Rui L. Aguiar QoS-Differentiated Secure Charging in Ad-Hoc Environments. [Citation Graph (0, 0)][DBLP ] ICT, 2004, pp:1093-1100 [Conf ] Dirk Westhoff , Markus Schneider II , Claus Unger , Firoz Kaderali Methods for Protecting a Mobile Agent's Route. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:57-71 [Conf ] Bernd Lamparter , Dirk Westhoff A Low-Cost Packet Originator Verification for Metering at Access-Routers. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2003, pp:287-297 [Conf ] André Weimerskirch , Dirk Westhoff Zero Common-Knowledge Authentication for Pervasive Networks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:73-87 [Conf ] Dirk Westhoff , Markus Schneider II , Claus Unger , Firoz Kaderali Protecting a Mobile Agent's Route against Collusions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:215-225 [Conf ] André Weimerskirch , Dirk Westhoff Identity certified authentication for ad-hoc networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:33-40 [Conf ] Hannes Hartenstein , K. Jonas , Marco Liebsch , M. Stiemerling , Ralf Schmitz , Dirk Westhoff Scalable Anonymous Connections in the Context of MIP and AAA. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:217-222 [Conf ] Mithun Acharya , Joao Girão , Dirk Westhoff Secure Comparison of Encrypted Data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] WiOpt, 2005, pp:47-53 [Conf ] Bernd Lamparter , Marc Plaggemeier , Dirk Westhoff Estimating the value of co-operation approaches for multi-hop ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2005, v:3, n:1, pp:17-26 [Journal ] Bernd Lamparter , Krishna Paul , Dirk Westhoff Charging support for ad hoc stub networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:13, pp:1504-1514 [Journal ] Dirk Westhoff An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2001, v:11, n:5, pp:607-619 [Journal ] Bernd Lamparter , Marc Plaggemeier , Dirk Westhoff About the impact of co-operation approaches for Ad hoc networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2003, v:7, n:3, pp:41-42 [Journal ] Dirk Westhoff , Joao Girão , Mithun Acharya Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2006, v:5, n:10, pp:1417-1431 [Journal ] Joao Girão , Dirk Westhoff , Einar Mykletun , Toshinori Araki TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:7, pp:1073-1089 [Journal ] Oliver Stanze , Kilian Weniger , Martina Zitterbart , Stefan Aust , Nico Bayer , Michael Gerharz , Bernd Lamparter , Dirk Westhoff , Erik Weiss Routing and Self-organization in IP based Wireless Access Networks (Routing und Selbstorganisation in drahtlosen IP-basierten Zugangsnetzen). [Citation Graph (0, 0)][DBLP ] it - Information Technology, 2006, v:48, n:5, pp:287-0 [Journal ] Concrete Security for Entity Recognition: The Jane Doe Protocol. [Citation Graph (, )][DBLP ] Using Merkle's Puzzle for key agreement with low-end devices. [Citation Graph (, )][DBLP ] Security enhanced multi-hop over the air reprogramming with Fountain Codes. [Citation Graph (, )][DBLP ] When Eco-IT meets security: Concealed network coding for multicast traffic. [Citation Graph (, )][DBLP ] A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP ] FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. [Citation Graph (, )][DBLP ] A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. [Citation Graph (, )][DBLP ] Initial observations on economics, pricing, and penetration of the internet of things market. [Citation Graph (, )][DBLP ] A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. [Citation Graph (, )][DBLP ] FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks [Citation Graph (, )][DBLP ] Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.280secs