You are here

Publications

Export 165 results:
Author Title Type [ Year(Asc)]
2016
D. Förster, Kargl, F. , and Löhr, H. , PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks, Ad Hoc Networks, vol. 37, Part 1, pp. 122 - 132, 2016.
S. Dietzel, Gürtler, J. , and Kargl, F. , A resilient in-network aggregation mechanism for \VANETs\ based on dissemination redundancy, Ad Hoc Networks, vol. 37, Part 1, pp. 101 - 109, 2016.
C. Bösch, Erb, B. , Kargl, F. , Kopp, H. , and Pfattheicher, S. , Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns, Proceedings on Privacy Enhancing Technologies, vol. 2016, pp. 237–254, 2016.
R. Kraft, Erb, B. , Mödinger, D. , and Kargl, F. , Using Conflict-free Replicated Data Types for Serverless Mobile Social Applications, in Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile Computing and Online Social neTworking, New York, NY, USA, 2016.
2015
M. Feiri, Petit, J. , and Kargl, F. , The case for announcing pseudonym changes. 2015.
B. Erb and Kargl, F. , A Conceptual Model for Event-sourced Graph Computing, in Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, New York, NY, USA, 2015.
J. Petit, Broekhuis, D. , Feiri, M. , and Kargl, F. , Connected Vehicles: Surveillance Threat and Mitigation, in Black Hat Europe, 2015.
S. Dietzel, van der Heijden, R. W. , Petit, J. , and Kargl, F. , Context-adaptive Detection of Insider Attacks in VANET Information Dissemination Schemes, in Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, 2015.
D. Förster, Löhr, H. , and Kargl, F. , Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing, in Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, 2015.
M. Fazouane, Kopp, H. , van der Heijden, R. W. , Le Métayer, D. , and Kargl, F. , Formal Verification of Privacy Properties in Electric Vehicle Charging, in Engineering Secure Software and Systems, 2015.
D. Förster, Kargl, F. , and Löhr, H. , A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-hoc Networks, in Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 2015.
M. Caselli, Zambon, E. , Petit, J. Y. , and Kargl, F. , Modeling message sequences for intrusion detection in industrial control systems, in Proceedings of the Ninth IFIP 11.10 International Conference, Arlington, Virginia, US, 2015.
M. Feiri, Pielage, R. , Petit, J. , Zannone, N. , and Kargl, F. , Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET, in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, 2015.
J. Petit, Schaub, F. , Feiri, M. , and Kargl, F. , Pseudonym Schemes in Vehicular Networks: A Survey, Communications Surveys Tutorials, IEEE, vol. 17, pp. 1-1, 2015.
J. Petit, Stottelaar, B. , Feiri, M. , and Kargl, F. , Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR, in Black Hat Europe, 2015.
D. Förster, Löhr, H. , Zibuschka, J. , and Kargl, F. , REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks, in Trust and Trustworthy Computing, 2015.
S. Dietzel, Peter, A. , and Kargl, F. , Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks, in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, Glasgow, U.K., 2015.
F. Kargl and Petit, J. , Security and privacy in vehicular networks, in Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment, W. Chen Woodhead Publishing, 2015, pp. 171-190.
M. Caselli, Zambon, E. , and Kargl, F. , Sequence-aware Intrusion Detection in Industrial Control Systems, in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, New York, NY, USA, 2015.
S. Kleber, van der Heijden, R. W. , Kopp, H. , and Kargl, F. , Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions, in Networked Systems (NetSys), 2015 International Conference and Workshops on, 2015.
A. 'a Al-Momani, Kargl, F. , Waldschmidt, C. , Moser, S. , and Slomka, F. , Wireless Channel-Based Message Authentication, in Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, 2015.
2014
B. Erb and Kargl, F. , Combining Discrete Event Simulations and Event Sourcing, in Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, ICST, Brussels, Belgium, Belgium, 2014.
B. Erb, Kargl, F. , and Domaschka, J. , Concurrent programming in web applications, it - Information Technology - Special Issue: Architecture of Web Application, vol. 56, pp. 87-146, 2014.
P. Knapik, Petit, J. , Kargl, F. , and Schoch, E. , Cooperative Home Light: Assessment of a Security Function for the Automotive Field, IARIA Journal on Advances in Security, vol. 7, pp. 1-14, 2014.
F. Engelmann, Lukaseder, T. , Erb, B. , van der Heijden, R. W. , and Kargl, F. , Dynamic packet-filtering in high-speed networks using NetFPGAs, in Future Generation Communication Technology (FGCT), 2014 Third International Conference on, Luton, UK, 2014.
M. Feiri, Petit, J. , and Kargl, F. , An evaluation framework for pre-distribution strategies of certificates in VANETs, in Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), Luxemburg, 2014.
S. Dietzel, van der Heijden, R. , Decke, H. , and Kargl, F. , A flexible, subjective logic-based framework for misbehavior detection in V2V networks, in A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on, 2014.
M. Feiri, Petit, J. , and Kargl, F. , Formal Model of Certificate Omission Schemes in VANET, in Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), Paderborn, Germany, 2014.
S. Dietzel, Petit, J. , Kargl, F. , and Scheuermann, B. , In-Network Aggregation for Vehicular Ad Hoc Networks, IEEE Communications Surveys and Tutorials, vol. 16, pp. 1909–1932, 2014.
F. Kargl, van der Heijden, R. W. , König, H. , Valdes, A. , and Dacier, M. C. , Insights on the Security and Dependability of Industrial Control Systems, IEEE Security and Privacy Magazine, vol. 12, 2014.

Pages