You are here


Export 165 results:
Author Title Type [ Year(Desc)]
D. Förster, Kargl, F. , and Löhr, H. , A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-hoc Networks, in Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 2015.
M. Caselli, Zambon, E. , Petit, J. Y. , and Kargl, F. , Modeling message sequences for intrusion detection in industrial control systems, in Proceedings of the Ninth IFIP 11.10 International Conference, Arlington, Virginia, US, 2015.
M. Feiri, Pielage, R. , Petit, J. , Zannone, N. , and Kargl, F. , Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET, in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, 2015.
J. Petit, Schaub, F. , Feiri, M. , and Kargl, F. , Pseudonym Schemes in Vehicular Networks: A Survey, Communications Surveys Tutorials, IEEE, vol. 17, pp. 1-1, 2015.
J. Petit, Stottelaar, B. , Feiri, M. , and Kargl, F. , Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR, in Black Hat Europe, 2015.
D. Förster, Löhr, H. , Zibuschka, J. , and Kargl, F. , REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks, in Trust and Trustworthy Computing, 2015.
S. Dietzel, Peter, A. , and Kargl, F. , Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks, in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, Glasgow, U.K., 2015.
F. Kargl and Petit, J. , Security and privacy in vehicular networks, in Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment, W. Chen, Ed. Woodhead Publishing, 2015, pp. 171-190.
M. Caselli, Zambon, E. , and Kargl, F. , Sequence-aware Intrusion Detection in Industrial Control Systems, in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, New York, NY, USA, 2015.
S. Kleber, van der Heijden, R. W. , Kopp, H. , and Kargl, F. , Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions, in Networked Systems (NetSys), 2015 International Conference and Workshops on, 2015.
A. 'a Al-Momani, Kargl, F. , Waldschmidt, C. , Moser, S. , and Slomka, F. , Wireless Channel-Based Message Authentication, in Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, 2015.
D. Förster, Kargl, F. , and Löhr, H. , PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks, Ad Hoc Networks, vol. 37, Part 1, pp. 122 - 132, 2016.
S. Dietzel, Gürtler, J. , and Kargl, F. , A resilient in-network aggregation mechanism for \VANETs\ based on dissemination redundancy, Ad Hoc Networks, vol. 37, Part 1, pp. 101 - 109, 2016.
C. Bösch, Erb, B. , Kargl, F. , Kopp, H. , and Pfattheicher, S. , Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns, Proceedings on Privacy Enhancing Technologies, vol. 2016, pp. 237–254, 2016.
R. Kraft, Erb, B. , Mödinger, D. , and Kargl, F. , Using Conflict-free Replicated Data Types for Serverless Mobile Social Applications, in Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile Computing and Online Social neTworking, New York, NY, USA, 2016.