Skip to main content
Frank Kargl's Homepage
Navigation
About myself
Research
Publications
Habilitation
Dissertation
Presentations
Professional Activities
Teaching
Hobbies
Feed aggregator
Contact / Impressum
User login
Username
*
Password
*
Request new password
You are here
Home
›
Research
Publications
Search
Show only items where
Author
any
Al-Momani, Ala'a
Askoxylakis, Ioannis
Bader, Roland
Bajcsy, Ruzena
Bako, Boto
Balanici, Mihail
Bayarou, Kpatcha
Bernauer, Alexander
Bielova, Nataliia
Bißmeyer, Norbert
Boreli, Roksana
Bösch, Christoph
Bösch, Christoph
Brakemeier, Achim
Broekhuis, Djurre
Buchenscheit, Andreas
Buttyan, Levente
Caballero, Juan
Calandriello, Giorgio
Caselli, M.
Caselli, Marco
Chapkin, Sergey
Chen, Wai
Conti, Mauro
Dacier, Marc
Dacier, Marc
Dacier, Marc C.
Dannhäuser, Günter
Decke, H.
Dietzel, Stefan
Dietzel, Stefan
Dietzel, S
Domaschka, Jörg
Dong, Bin
Dressler, Falko
Engel, Thomas
Engelmann, Felix
Erb, Benjamin
Fazouane, Marouane
Feiri, Michael
Feiri, M.
Fischer, Martin
Flerlage, Florian
Forster, Markus
Förster, David
Frank, Raphaël
Freudiger, Julien
Freytag, Johann-Christoph
Friedman, Arik
Ganguli, Leena
Geiß, Alfred
Gessler, Sascha
Gozalvez, Javier
Gürtler, Julian
Hadziosmanovic, Dina
Heijenk, G.
Heijenk, Geert
Heijenk, G J
Held, Albert
Hipp, Markus
Hoefer, Christina
Holczer, Tamas
Hubaux, Jean-Pierre
Illmann, Torsten
Jiang, Zhen
Kargl, Frank
Kargl, Frank
Kargl, F
Kargl, Frank (ed.)
Keller, Alexander
Keppler, Moritz
Kleber, S.
Klenk, Andreas
Kluge, Jonas
Knapik, Peter
Knapik, Peter
Koenings, Bastian
König, Hartmut
Könings, Bastian
Könings, Bastian
Kopp, Henning
Kopp, H.
Kost, Martin
Kraft, Robin
Kravets, Robin
Kroh, Rainer
Krueger, Tillmann
Krüger, Tillmann
Kung, Antonio
Laugier, Christian
Lawrence, Elaine
Le Métayer, Daniel
Lefevre, Stephanie
Leinmüller, Tim
Liebig, Torsten
Lim, Yen Yang
Löhr, Hans
Lukaseder, Thomas
Ma, Zhendong
Maier, Jörn
Maihöfer, Christian
Martin, Don
Mauthofer, Sebastian
Messina, Marco
Mittag, Jens
Mödinger, David
Moser, Steffen
Müller, Maik
Müter, Michael
Nagler, Jürgen
Nagler-Ihlein, Jürgen
Neubert, Andreas
Ott, Jörg
Pan, Yi
Papadimitratos, Panagiotis
Papadimitratos, Panos
Peter, A.
Petit, Jonathan
Petit, J.
Petit, J. Y.
Petit, Jonathan
Pfattheicher, Stefan
Pielage, R.
Piessens, Frank
Pinto, Michele
Raschke, Axel
Raya, Maxim
Ribhegge, Stefan
Rice, M.
Rikanovic, Igor
Schäfer, Günter
Schalk, Michael
Schaub, Florian
Schaub, F
Schaub, Florian
Scheuermann, Björn
Schlott, Stefan
Schmidt, Robert
Schmidt, Robert K
Schmidt, Robert K
Schneider, Matthias
Schoch, Elmar
Schunter, Matthias
Shenoi, S.
Slomka, Frank
Sommer, Christoph
Spenrath, Felix
Stottelaar, Bas
Tongh, Ta-Vinh
Tonguz, Ozan K
Traud, Alexander
Tsai, Michael
Tsang, Tommy
Valdes, Alfonso
Valdes, Alfonso
van der Heijden, RensW.
van der Heijden, Rens
van der Heijden, R.
van der Heijden, Rens W.
van der Heijden, Rens Wouter
van der Heijden, R.W.
Waldschmidt, Christian
Weber, Michael
Weber, Michael (ed.)
Weingärtner, Elias
Wiedersheim, Björn
Wischof, Lars
Wolf, Fabian
Wollmann, Philipp
Zambon, E.
Zambon, Emmanuele
Zannone, N.
Zeile, Matthias
Zibuschka, Jan
Type
any
Conference Paper
Journal Article
Miscellaneous
Book Chapter
Conference Proceedings
Report
Thesis
Book
Term
any
Publications - Aggregates
Publications - Anonymity
Publications - Anonymous credentials
Publications - Authentication
Publications - authentication
Publications - Authentication;Conferences;Cryptography;Principal component analysis;Privacy;Protocols;Vehicles
Publications - Bandwidth
Publications - bandwidth-efficient integrity proofs
Publications - Bandwidth;Cryptography;Protocols;Roads;Vectors;Vehicles;VANETs;information aggregation;multi-hop communication;security
Publications - batch processing
Publications - bit rate 9.5 Gbit/s
Publications - Buffer storage
Publications - certificate management
Publications - certificate pre-distribution
Publications - Communication channels;Conferences;Packet loss;Receivers;Vehicles;Vehicular ad hoc networks;Analytical model;VANET;certificate omission;security
Publications - communication overhead
Publications - Computational modeling
Publications - computational power
Publications - Computer security;Industrial control;Industrial power systems;Industrial safety;Management;DCS;ICS;cyber-physical systems;distributed control systems;industrial control systems;security;security management
Publications - content filtering
Publications - CRDTs
Publications - cryptographic packet loss
Publications - cryptographic protocols
Publications - cryptographic signatures
Publications - Cryptography
Publications - cryptography
Publications - cyber-physical system
Publications - data consistency
Publications - Data structures
Publications - Delays
Publications - Detectors
Publications - differential privacy
Publications - digital signatures
Publications - discrete event simulation
Publications - distance bounding protocols
Publications - dynamic packet-filtering
Publications - electric vehicle charging
Publications - estimation theory
Publications - event processing
Publications - event sourcing
Publications - event-driven architecture
Publications - field programmable gate arrays
Publications - Field programmable gate arrays
Publications - filtering theory
Publications - formal verification
Publications - graph computing
Publications - graphy theory
Publications - Hardware
Publications - header field extraction
Publications - high-speed networks
Publications - hyperloglog estimators
Publications - in-network information aggregation
Publications - Industrial control systems
Publications - Information systems
Publications - intelligent transport systems
Publications - intelligent transportation systems
Publications - Intrusion detection
Publications - intrusion detection
Publications - intrusion detection system
Publications - intrusion detection systems
Publications - its
Publications - ITS
Publications - Licenses
Publications - location privacy
Publications - logic based framework
Publications - message integrity protection
Publications - misbehavior detection
Publications - mobile systems
Publications - multi-hop communication
Publications - Multi-hop communication
Publications - NetFPGA 10G architecture
Publications - parallel protocol-stack parser module
Publications - physical unclonable functions
Publications - privacy
Publications - Privacy
Publications - protocol analysis
Publications - Protocols
Publications - pseudonym
Publications - pseudonym systems
Publications - pseudonymous broadcast authentication
Publications - Public key
Publications - public key cryptography
Publications - public-key cryptography
Publications - PUF-analogue
Publications - radio networks
Publications - Registers
Publications - replication
Publications - Roads
Publications - Safety
Publications - safety enhancements
Publications - secure aggregation
Publications - secure cluster
Publications - security mechanism
Publications - security model
Publications - security problems
Publications - semantic attack
Publications - sequence attack
Publications - sequence attacks
Publications - signature based methods
Publications - SIMPL systems
Publications - social applications
Publications - telecommunication security
Publications - telecommunication traffic
Publications - Terrorism
Publications - terrorist fraud resistance
Publications - Throughput
Publications - Time factors
Publications - Timing
Publications - traffic efficiency enhancements
Publications - Tutorials
Publications - Uncertainty
Publications - unlinkability
Publications - untraceability
Publications - V2V networks
Publications - V2X communications
Publications - VANET
Publications - vanets
Publications - VANETs
Publications - vehicle to infrastructure communication
Publications - vehicle to vehicle communication
Publications - Vehicles
Publications - Vehicular ad hoc networks
Publications - vehicular ad hoc networks
Publications - vehicular ad-hoc networks
Publications - vehicular networks
Publications - velocity-based vehicle clustering
Publications - Wireless communication
Publications - wireless communication
Publications - world model
Year
any
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
Keyword
any
Aggregates
Anonymity
Anonymous credentials
Authentication
Authentication;Conferences;Cryptography;Principal component analysis;Privacy;Protocols;Vehicles
Bandwidth
bandwidth-efficient integrity proofs
Bandwidth;Cryptography;Protocols;Roads;Vectors;Vehicles;VANETs;information aggregation;multi-hop communication;security
batch processing
Biochemical cryptography
bit rate 9.5 Gbit/s
Buffer storage
carrier sensing
certificate management
certificate pre-distribution
clear channel assessment
Communication channels;Conferences;Packet loss;Receivers;Vehicles;Vehicular ad hoc networks;Analytical model;VANET;certificate omission;security
communication overhead
Computational modeling
computational power
Computer security;Industrial control;Industrial power systems;Industrial safety;Management;DCS;ICS;cyber-physical systems;distributed control systems;industrial control systems;security;security management
congestion control
content filtering
context awareness
CRDTs
cryptographic packet loss
cryptographic protocols
cryptographic signatures
cryptography
cyber-physical system
data consistency
Data structures
Delays
Detectors
differential privacy
digital signatures
discrete event simulation
distance bounding protocols
dynamic packet-filtering
electric vehicle charging
estimation theory
event processing
event sourcing
event-driven architecture
field programmable gate arrays
filtering theory
formal verification
graph computing
graphy theory
Hardware
header field extraction
high-speed networks
hyperloglog estimators
in-network information aggregation
Industrial control systems
Information systems
intelligent transport systems
intelligent transportation systems
Intrusion detection
intrusion detection system
intrusion detection systems
its
Licenses
location privacy
logic based framework
message integrity protection
misbehavior detection
mobile systems
multi-hop communication
NetFPGA 10G architecture
Ontologies
parallel protocol-stack parser module
personalization
pervasive computing
physical unclonable functions
Privacy
Privacy by Design
privacy impact assessment
protocol analysis
Protocols
pseudonym
pseudonym systems
pseudonymous broadcast authentication
Public key
public key cryptography
public-key cryptography
PUF-analogue
radio networks
Registers
replication
Roads
Safety
safety enhancements
secure aggregation
secure cluster
security mechanism
security model
security problems
semantic attack
sequence attack
sequence attacks
signature based methods
SIMPL systems
social applications
spatial reuse
telecommunication security
telecommunication traffic
Terrorism
terrorist fraud resistance
Throughput
Time factors
Timing
traffic efficiency enhancements
Tutorials
ubiquitous computing
Uncertainty
unlinkability
untraceability
V2V networks
V2X communications
VANET
vanets
vehicle to infrastructure communication
vehicle to vehicle communication
Vehicles
Vehicular ad hoc networks
vehicular ad-hoc networks
vehicular networks
velocity-based vehicle clustering
wireless communication
world model
Export 1 results:
BibTeX
[
Author
]
Title
Type
Year
Filters:
First Letter Of Last Name
is
T
[Clear All Filters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
T
A. Traud, Nagler-Ihlein, J. , Kargl, F. , and Weber, M.
,
“
Cyclic Data Synchronization through Resusing SyncML
”
, in
The Ninth International Conference on Mobile Data Management (mdm 2008)
, Beijing, China, 2008.
Google Scholar
BibTeX
Search form
Search
Recent blog posts
Informatik an Hamburger Schulen kein Pflichtfach mehr
Tuning Mac OS Snow Leopard for SSD
Deadline Extension IEEE WIVEC 2011
Drupal 7
27. VDI/VW Gemeinschaftstagung Automotive Security
Applications
IEEE WiVEC 2011 - CfP
Posters and Demos CfP - ACM WiSec 2011
Resources on good presentation techniques
Privacy in ITS Applications Workshop in Berlin
More
Recent Publications
A resilient in-network aggregation mechanism for \{VANETs\} based on dissemination redundancy
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns
Using Conflict-free Replicated Data Types for Serverless Mobile Social Applications
Wireless Channel-Based Message Authentication
More...