Research

Professional services

I have served/am serving on the Technical Program Committee of

I have served / am serving as a reviewer for 

Publications

A comprehensive list of publications I (co-)authored. See also:

2018

  • [DOI] J. H. Ziegeldorf, “Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy,” PhD Thesis, 2018.
    [Bibtex] [Abstract]
    @phdthesis{ziegeldorf2018designing, 
      abstract = {In the past two decades, tremendously successful digital services have been built that collect, process, and monetize massive amounts of personal user data, up to the point where data is proclaimed the oil of the 21st century. Along come serious threats to data security and privacy that significantly increase the demand for effective protection, e.g., as manifested in the growth of encrypted Internet traffic. Communication security protocols, however, protect data against external attackers and do not address the root cause of almost all privacy threats, the need to share sensitive data with third parties. These third parties may illicitly process data beyond its original purpose of collection or be hacked and forced to provide data access. Countering these threats requires the development of Privacy Enhancing Technologies that complement or replace traditional communication security protocols. We identify Secure Multiparty Computation (SMC) as a rigorous approach not only to provide data security and privacy protection, but even to reconcile privacy interests with seemingly adverse public and business interests. However, the potential of SMC is foremost on the theoretical level - it is often dismissed for being too inefficient and impedimentary for real-world applications. This thesis bridges the gap between the theoretical strength of SMC and the feeble realization of its potential in practice. To this end, we conduct a qualitative and quantitative analysis of SMC frameworks and abstract three research challenges: i) Extending the functionality and ii) increasing the efficiency of SMC as well as iii) customizing it to challenged environments. We choose a use case-driven research methodology to address these questions, which allows us to motivate and validate all our contributions in practice. First, we motivate the problem of financial privacy in cryptocurrencies and propose decentralized mixing as a solution. We recognize the advantages of securing mixing operations with SMC and contribute secure protocols to technically realize our novel approach. As a result, our mixing system achieves stronger security and privacy guarantees than prior works while remaining highly scalable and fully compatible with the prevalent designs of decentralized cryptocurrencies such as Bitcoin. Second, we propose efficient SMC designs for different classification algorithms to address data security and privacy issues in pattern recognition and machine learning. The evaluation of our classifiers shows that they are secure, accurate, and outperform the state of the art. We demonstrate three real-world use cases that prove applicability of our classifiers but also motivate their deployment in challenged environments. Thus, we present two additional approaches, bandwidth optimizations and secure outsourcing, to bring our secure classifiers to these scenarios. Finally, we investigate secure outsourcing as a general strategy to customize SMC to challenged deployment and operation scenarios by the example of computing set intersections, a universal building block in many real-world applications and a well studied SMC problem. We present efficient schemes with negligible overheads for the outsourcers and demonstrate their applicability in two comprehensive case studies, privacy-preserving crowd-sensing and genetic disease testing in the cloud. In summary, the contributions made in this thesis widen the technical solution space for practical data security and privacy protection in data-driven digital services.},
      author    = {Jan Henrik Ziegeldorf},
      title     = {Designing Digital Services with Cryptographic Guarantees for Data
                   Security and Privacy},
      school    = {{RWTH} Aachen University, Germany},
      year      = {2018},
      url       = {http://publications.rwth-aachen.de/record/722141},
      urn       = {urn:nbn:de:101:1-201805203549},
      isbn      = {978-3-8440-5837-6},
      timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
      doi       = {10.18154/RWTH-2018-223431},
      biburl    = {https://dblp.org/rec/bib/phd/dnb/Ziegeldorf18},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }

    In the past two decades, tremendously successful digital services have been built that collect, process, and monetize massive amounts of personal user data, up to the point where data is proclaimed the oil of the 21st century. Along come serious threats to data security and privacy that significantly increase the demand for effective protection, e.g., as manifested in the growth of encrypted Internet traffic. Communication security protocols, however, protect data against external attackers and do not address the root cause of almost all privacy threats, the need to share sensitive data with third parties. These third parties may illicitly process data beyond its original purpose of collection or be hacked and forced to provide data access. Countering these threats requires the development of Privacy Enhancing Technologies that complement or replace traditional communication security protocols. We identify Secure Multiparty Computation (SMC) as a rigorous approach not only to provide data security and privacy protection, but even to reconcile privacy interests with seemingly adverse public and business interests. However, the potential of SMC is foremost on the theoretical level – it is often dismissed for being too inefficient and impedimentary for real-world applications. This thesis bridges the gap between the theoretical strength of SMC and the feeble realization of its potential in practice. To this end, we conduct a qualitative and quantitative analysis of SMC frameworks and abstract three research challenges: i) Extending the functionality and ii) increasing the efficiency of SMC as well as iii) customizing it to challenged environments. We choose a use case-driven research methodology to address these questions, which allows us to motivate and validate all our contributions in practice. First, we motivate the problem of financial privacy in cryptocurrencies and propose decentralized mixing as a solution. We recognize the advantages of securing mixing operations with SMC and contribute secure protocols to technically realize our novel approach. As a result, our mixing system achieves stronger security and privacy guarantees than prior works while remaining highly scalable and fully compatible with the prevalent designs of decentralized cryptocurrencies such as Bitcoin. Second, we propose efficient SMC designs for different classification algorithms to address data security and privacy issues in pattern recognition and machine learning. The evaluation of our classifiers shows that they are secure, accurate, and outperform the state of the art. We demonstrate three real-world use cases that prove applicability of our classifiers but also motivate their deployment in challenged environments. Thus, we present two additional approaches, bandwidth optimizations and secure outsourcing, to bring our secure classifiers to these scenarios. Finally, we investigate secure outsourcing as a general strategy to customize SMC to challenged deployment and operation scenarios by the example of computing set intersections, a universal building block in many real-world applications and a well studied SMC problem. We present efficient schemes with negligible overheads for the outsourcers and demonstrate their applicability in two comprehensive case studies, privacy-preserving crowd-sensing and genetic disease testing in the cloud. In summary, the contributions made in this thesis widen the technical solution space for practical data security and privacy protection in data-driven digital services.

  • [PDF] J. H. Ziegeldorf, J. Metzke, and K. Wehrle, “SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments,” in Proceedings of the 34rd Annual Computer Security Applications Conference, New York, NY, USA, 2018, pp. 1-15. Acceptance rate: 21 %.
    [Bibtex] [Abstract]
    @inproceedings{ziegeldorf2018shield,
      Abstract = {Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance.
    Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers.
    In this work, we resolve the conflict between privacy and business interests using Secure Two-Party Computation.
    Concretely, we propose SHIELD, a framework for efficient, and accurate machine learning classification with security in the semi-honest model.
    Building on SHIELD, we realize several widely used classifiers and real-world use cases that compare favorably against related work.
    Departing definitively from prior works, all of SHIELD's protocols are designed from the ground up to enable secure outsourcing to untrusted computation clouds enabling even constrained devices to handle our most complex use cases in (milli)seconds.},
      Acceptancerate = {21 %},
      Address = {New York, NY, USA},
      Author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Wehrle, Klaus},
      Booktitle = {Proceedings of the 34rd Annual Computer Security Applications Conference},
      Date-Added = {2018-10-10 14:11:45 +0000},
      Date-Modified = {2018-10-10 14:20:39 +0000},
      Location = {San Juan, Puerto Rico, USA},
      Month = {December},
      Pages = {1--15},
      Publisher = {ACM},
      Series = {ACSAC'18},
      Title = {SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments},
      Year = {2018},
      Bdsk-Url-1 = {https://doi.org/10.1145/3029806.3029816}}

    Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance. Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers. In this work, we resolve the conflict between privacy and business interests using Secure Two-Party Computation. Concretely, we propose SHIELD, a framework for efficient, and accurate machine learning classification with security in the semi-honest model. Building on SHIELD, we realize several widely used classifiers and real-world use cases that compare favorably against related work. Departing definitively from prior works, all of SHIELD’s protocols are designed from the ground up to enable secure outsourcing to untrusted computation clouds enabling even constrained devices to handle our most complex use cases in (milli)seconds.

  • [PDF] R. Matzutt, J. Hiller, M. Henze, J. H. Ziegeldorf, D. Müllmann, O. Hohlfeld, and K. Wehrle, “A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin,” in Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), 2018. Acceptance rate: 27 %.
    [Bibtex]
    @inproceedings{matzutt2018quantitative,
      Acceptancerate = {27 %},
      Author = {Matzutt, Roman and Hiller, Jens and Henze, Martin and Ziegeldorf, Jan Henrik and M{\"u}llmann, Dirk and Hohlfeld, Oliver and Wehrle, Klaus},
      Booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC)},
      Date-Added = {2018-10-06 15:58:33 +0000},
      Date-Modified = {2018-10-10 05:23:04 +0000},
      Publisher = {Springer},
      Title = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin},
      Year = {2018}}
  • [PDF] [DOI] R. Matzutt, M. Henze, J. H. Ziegeldorf, J. Hiller, and K. Wehrle, “Thwarting Unwanted Blockchain Content Insertion,” in 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, pp. 364-370.
    [Bibtex]
    @inproceedings{matzutt2018thwarting,
      Author = {R. Matzutt and M. Henze and J. H. Ziegeldorf and J. Hiller and K. Wehrle},
      Booktitle = {2018 IEEE International Conference on Cloud Engineering (IC2E)},
      Date-Added = {2018-10-06 15:54:23 +0000},
      Date-Modified = {2018-10-06 15:57:04 +0000},
      Doi = {10.1109/IC2E.2018.00070},
      Keywords = {Internet;risk management;security of data;imminent risk;increased efficiency;special-purpose content detectors;content-agnostic countermeasures;harmful content;blockchain systems;distributed consensus;smart contracts;arbitrary content;arguably objectionable content;clearly objectionable content;even illegal content;Bitcoin blockchain;unwanted blockchain content insertion thwarting;ad hoc mitigation;identifier commitments;Bitcoin;Peer-to-peer computing;Public key;Face;Bitcoin;blockchain;security;objectionable content;countermeasure},
      Month = {April},
      Pages = {364-370},
      Title = {Thwarting Unwanted Blockchain Content Insertion},
      Year = {2018},
      Bdsk-Url-1 = {https://doi.org/10.1109/IC2E.2018.00070}}

2017

  • [PDF] R. Matzutt, D. Müllmann, E. Zeissig, C. Horst, K. Kasugai, S. Lidynia, S. Wieninger, J. H. Ziegeldorf, G. Gudergan, I. S. gen. Döhmann, K. Wehrle, and M. Ziefle, “myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data,” in INFORMATIK 2017, 2017, pp. 1073-1084.
    [Bibtex]
    @inproceedings{matzutt2017mynedata,
      Author = {Matzutt, Roman AND M{\"u}llmann, Dirk AND Zeissig, Eva-Maria AND Horst, Christiane AND Kasugai, Kai AND Lidynia, Sean AND Wieninger, Simon AND Ziegeldorf, Jan Henrik AND Gudergan, Gerhard AND gen. D{\"o}hmann, Indra Spiecker AND Wehrle, Klaus AND Ziefle, Martina},
      Booktitle = {INFORMATIK 2017},
      Date-Added = {2018-10-06 16:04:58 +0000},
      Date-Modified = {2018-10-06 16:05:03 +0000},
      Editor = {Eibl, Maximilian AND Gaedke, Martin},
      Pages = {1073-1084},
      Publisher = {Gesellschaft f{\"u}r Informatik, Bonn},
      Title = {myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data},
      Year = {2017}}
  • [PDF] [DOI] J. H. Ziegeldorf, M. Henze, J. Bavendiek, and K. Wehrle, “TraceMixer: Privacy-preserving crowd-sensing sans trusted third party,” in 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), 2017, pp. 17-24. Acceptance rate: 31 %.
    [Bibtex]
    @inproceedings{ziegeldorf2017tracemixer,
      Acceptancerate = {31 %},
      Author = {J. H. Ziegeldorf and M. Henze and J. Bavendiek and K. Wehrle},
      Booktitle = {2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS)},
      Date-Added = {2018-10-06 16:04:31 +0000},
      Date-Modified = {2018-10-10 05:26:04 +0000},
      Doi = {10.1109/WONS.2017.7888771},
      Keywords = {data protection;mobile computing;smart phones;trusted computing;TraceMixer;privacy-preserving crowd-sensing;trusted third party;large scale data collection;smart phone users;fine-grained location data;data utility;location privacy protection;trajectory privacy;secure two-party computation;trustless architecture;Privacy;Data privacy;Trajectory;Data collection;Roads;Sensors;Distortion},
      Month = {Feb},
      Pages = {17-24},
      Title = {TraceMixer: Privacy-preserving crowd-sensing sans trusted third party},
      Year = {2017},
      Bdsk-Url-1 = {https://doi.org/10.1109/WONS.2017.7888771}}
  • [PDF] [DOI] J. H. Ziegeldorf, J. Metzke, J. Rüth, M. Henze, and K. Wehrle, “Privacy-Preserving HMM Forward Computation,” in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, New York, NY, USA, 2017, pp. 83-94. Acceptance rate: 16 %. Outstanding Paper Award.
    [Bibtex]
    @inproceedings{ziegeldorf2017priward,
      Acceptancerate = {16 %},
      Acmid = {3029816},
      Address = {New York, NY, USA},
      Author = {Ziegeldorf, Jan Henrik and Metzke, Jan and R\"{u}th, Jan and Henze, Martin and Wehrle, Klaus},
      Booktitle = {Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy},
      Date-Added = {2018-10-06 16:03:52 +0000},
      Date-Modified = {2018-10-10 05:36:57 +0000},
      Doi = {10.1145/3029806.3029816},
      Isbn = {978-1-4503-4523-1},
      Keywords = {forward algorithm, garbled circuits, hidden Markov models, privacy-preserving protocols, secure two-party computation},
      Location = {Scottsdale, Arizona, USA},
      Note = {Outstanding Paper Award},
      Numpages = {12},
      Pages = {83--94},
      Publisher = {ACM},
      Series = {CODASPY '17},
      Title = {Privacy-Preserving HMM Forward Computation},
      Url = {http://doi.acm.org/10.1145/3029806.3029816},
      Year = {2017},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/3029806.3029816},
      Bdsk-Url-2 = {https://doi.org/10.1145/3029806.3029816}}
  • [DOI] M. Henze, R. Matzutt, J. Hiller, E. Mühmer, J. H. Ziegeldorf, J. v. d. Giet, and K. Wehrle, “Practical Data Compliance for Cloud Storage,” in 2017 IEEE International Conference on Cloud Engineering (IC2E), 2017, pp. 252-258. Acceptance rate: 36 % (full + short papers).
    [Bibtex]
    @inproceedings{henze2017practical,
      Acceptancerate = {36 % (full + short papers)},
      Author = {M. Henze and R. Matzutt and J. Hiller and E. M{\"u}hmer and J. H. Ziegeldorf and J. v. d. Giet and K. Wehrle},
      Booktitle = {2017 IEEE International Conference on Cloud Engineering (IC2E)},
      Date-Added = {2018-10-06 16:03:01 +0000},
      Date-Modified = {2018-10-10 05:24:15 +0000},
      Doi = {10.1109/IC2E.2017.32},
      Keywords = {cloud computing;data handling;data privacy;legislation;storage management;data compliance;cloud storage;data handling requirements;legislation;privacy concerns;PRADA;Cloud computing;Relays;Data handling;Standards;Organizations;Law;Load management;cloud storage;privacy;data handling requirements;compliance},
      Month = {April},
      Pages = {252-258},
      Title = {Practical Data Compliance for Cloud Storage},
      Year = {2017},
      Bdsk-Url-1 = {https://doi.org/10.1109/IC2E.2017.32}}
  • [DOI] T. Zimmermann, H. Wirtz, J. H. Ziegeldorf, C. Steinhaus, and K. Wehrle, “Resource and Execution Control for Mobile Offloadee Devices,” in 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2017, pp. 1-9. Acceptance rate: 27 %.
    [Bibtex]
    @inproceedings{zimmermann2017resource,
      Acceptancerate = {27 %},
      Author = {T. Zimmermann and H. Wirtz and J. H. Ziegeldorf and C. Steinhaus and K. Wehrle},
      Booktitle = {2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)},
      Date-Added = {2018-10-06 16:02:03 +0000},
      Date-Modified = {2018-10-10 05:23:57 +0000},
      Doi = {10.1109/SAHCN.2017.7964939},
      Issn = {2155-5494},
      Keywords = {mobile communication;resource allocation;smart phones;resource control;execution control;mobile offloadee devices;local task execution;resource constraints;Android smartphones;Mobile communication;Cloud computing;Containers;Resource management;Virtualization;Smart phones},
      Month = {June},
      Pages = {1-9},
      Title = {Resource and Execution Control for Mobile Offloadee Devices},
      Year = {2017},
      Bdsk-Url-1 = {https://doi.org/10.1109/SAHCN.2017.7964939}}
  • [PDF] J. H. Ziegeldorf, J. Pennekamp, D. Hellmanns, F. Schwinger, I. Kunze, M. Henze, J. Hiller, R. Matzutt, and K. Wehrle, “BLOOM: BLoom filter based Oblivious Outsourced Matchings,” BMC Medical Genomics, 2017. Impact factor: 2.848. Second place in the 2016 iDASH Secure Genome Analysis Competition.
    [Bibtex]
    @article{ziegeldorf2017bloom,
      Author = {Jan Henrik Ziegeldorf and Jan Pennekamp and David Hellmanns and Felix Schwinger and Ike Kunze and Martin Henze and Jens Hiller and Roman Matzutt and Klaus Wehrle},
      Date-Added = {2018-10-06 16:01:43 +0000},
      Date-Modified = {2018-10-10 05:36:42 +0000},
      Impactfactor = {2.848},
      Journal = {BMC Medical Genomics},
      Note = {Second place in the 2016 iDASH Secure Genome Analysis Competition},
      Publisher = {BioMed Central},
      Title = {{BLOOM: BLoom filter based Oblivious Outsourced Matchings}},
      Year = {2017}}
  • [PDF] [DOI] M. Henze, J. Pennekamp, D. Hellmanns, E. Mühmer, J. H. Ziegeldorf, A. Drichel, and K. Wehrle, “CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps,” in Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA, 2017, pp. 262-271. Acceptance rate: 44 %.
    [Bibtex]
    @inproceedings{henze2017cloudanalyzer,
      Acceptancerate = {44 %},
      Acmid = {3144471},
      Address = {New York, NY, USA},
      Author = {Henze, Martin and Pennekamp, Jan and Hellmanns, David and M\"{u}hmer, Erik and Ziegeldorf, Jan Henrik and Drichel, Arthur and Wehrle, Klaus},
      Booktitle = {Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
      Date-Added = {2018-10-06 16:00:48 +0000},
      Date-Modified = {2018-10-10 05:23:37 +0000},
      Doi = {10.1145/3144457.3144471},
      Isbn = {978-1-4503-5368-7},
      Keywords = {Cloud Computing, Privacy, Smartphones, Traffic Analysis},
      Location = {Melbourne, VIC, Australia},
      Numpages = {10},
      Pages = {262--271},
      Publisher = {ACM},
      Series = {MobiQuitous 2017},
      Title = {CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps},
      Url = {http://doi.acm.org/10.1145/3144457.3144471},
      Year = {2017},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/3144457.3144471},
      Bdsk-Url-2 = {https://doi.org/10.1145/3144457.3144471}}
  • [PDF] [DOI] M. Henze, R. Inaba, I. B. Fink, and J. H. Ziegeldorf, “Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps,” in Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA, 2017, pp. 543-544.
    [Bibtex]
    @inproceedings{henze2017privacy,
      Acmid = {3144511},
      Address = {New York, NY, USA},
      Author = {Henze, Martin and Inaba, Ritsuma and Fink, Ina Berenice and Ziegeldorf, Jan Henrik},
      Booktitle = {Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
      Date-Added = {2018-10-06 16:00:03 +0000},
      Date-Modified = {2018-10-06 16:00:07 +0000},
      Doi = {10.1145/3144457.3144511},
      Isbn = {978-1-4503-5368-7},
      Keywords = {Anonymity, Cloud Computing, Privacy, Security, Smartphones},
      Location = {Melbourne, VIC, Australia},
      Numpages = {2},
      Pages = {543--544},
      Publisher = {ACM},
      Series = {MobiQuitous 2017},
      Title = {Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps},
      Url = {http://doi.acm.org/10.1145/3144457.3144511},
      Year = {2017},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/3144457.3144511},
      Bdsk-Url-2 = {https://doi.org/10.1145/3144457.3144511}}
  • [DOI] M. Henze, J. Hiller, R. Hummen, R. Matzutt, K. Wehrle, and J. H. Ziegeldorf, “Network Security and Privacy for Cyber-Physical Systems,” in Security and Privacy in Cyber‐Physical Systems, Wiley-Blackwell, 2017, pp. 25-56.
    [Bibtex] [Abstract]
    @inbook{henze2017network,
      Abstract = {Summary Cyber-physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy-preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy-preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud-based environments.},
      Author = {Henze, Martin and Hiller, Jens and Hummen, Ren{\'e} and Matzutt, Roman and Wehrle, Klaus and Ziegeldorf, Jan H.},
      Booktitle = {Security and Privacy in Cyber‐Physical Systems},
      Chapter = {2},
      Date-Added = {2018-10-06 15:59:25 +0000},
      Date-Modified = {2018-10-06 15:59:32 +0000},
      Doi = {10.1002/9781119226079.ch2},
      Eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119226079.ch2},
      Isbn = {9781119226079},
      Keywords = {security and privacy, lightweight security, cyber-physical systems, Internet of Things, sensor networks, cloud},
      Pages = {25-56},
      Publisher = {Wiley-Blackwell},
      Title = {Network Security and Privacy for Cyber-Physical Systems},
      Url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119226079.ch2},
      Year = {2017},
      Bdsk-Url-1 = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119226079.ch2},
      Bdsk-Url-2 = {https://doi.org/10.1002/9781119226079.ch2}}

    Summary Cyber-physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy-preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy-preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud-based environments.

2016

  • J. H. Ziegeldorf, M. Henze, R. Hummen, and K. Wehrle, “Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper),” in Data Privacy Management, and Security Assurance, Cham, 2016, pp. 226-234. Acceptance rate: 41 % (full + position papers).
    [Bibtex] [Abstract]
    @inproceedings{ziegeldorf2016comparison,
      Abstract = {Social media continues to lead imprudent users into over-sharing, exposing them to various privacy threats. Recent research thus focusses on nudging the user into the `right' direction. In this paper, we propose Comparison-based Privacy (CbP), a design paradigm for privacy nudges that overcomes the limitations and challenges of existing approaches. CbP is based on the observation that comparison is a natural human behavior. With CbP, we transfer this observation to decision-making processes in the digital world by enabling the user to compare herself along privacy-relevant metrics to user-selected comparison groups. In doing so, our approach provides a framework for the integration of existing nudges under a self-adaptive, user-centric norm of privacy. Thus, we expect CbP not only to provide technical improvements, but to also increase user acceptance of privacy nudges. We also show how CbP can be implemented and present preliminary results.},
      Acceptancerate = {41 % (full + position papers)},
      Address = {Cham},
      Author = {Ziegeldorf, Jan Henrik and Henze, Martin and Hummen, Ren{\'e} and Wehrle, Klaus},
      Booktitle = {Data Privacy Management, and Security Assurance},
      Date-Added = {2018-10-06 16:08:50 +0000},
      Date-Modified = {2018-10-10 05:27:31 +0000},
      Editor = {Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Aldini, Alessandro and Martinelli, Fabio and Suri, Neeraj},
      Isbn = {978-3-319-29883-2},
      Pages = {226--234},
      Publisher = {Springer International Publishing},
      Title = {Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)},
      Year = {2016}}

    Social media continues to lead imprudent users into over-sharing, exposing them to various privacy threats. Recent research thus focusses on nudging the user into the `right’ direction. In this paper, we propose Comparison-based Privacy (CbP), a design paradigm for privacy nudges that overcomes the limitations and challenges of existing approaches. CbP is based on the observation that comparison is a natural human behavior. With CbP, we transfer this observation to decision-making processes in the digital world by enabling the user to compare herself along privacy-relevant metrics to user-selected comparison groups. In doing so, our approach provides a framework for the integration of existing nudges under a self-adaptive, user-centric norm of privacy. Thus, we expect CbP not only to provide technical improvements, but to also increase user acceptance of privacy nudges. We also show how CbP can be implemented and present preliminary results.

  • [PDF] [DOI] R. Matzutt, O. Hohlfeld, M. Henze, R. Rawiel, J. H. Ziegeldorf, and K. Wehrle, “POSTER: I Don’t Want That Content! On the Risks of Exploiting Bitcoin’s Blockchain As a Content Store,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2016, pp. 1769-1771. Acceptance rate: 41 % (posters).
    [Bibtex]
    @inproceedings{matzutt2016poster,
      Acceptancerate = {41 % (posters)},
      Acmid = {2989059},
      Address = {New York, NY, USA},
      Author = {Matzutt, Roman and Hohlfeld, Oliver and Henze, Martin and Rawiel, Robin and Ziegeldorf, Jan Henrik and Wehrle, Klaus},
      Booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
      Date-Added = {2018-10-06 16:06:24 +0000},
      Date-Modified = {2018-10-10 05:27:00 +0000},
      Doi = {10.1145/2976749.2989059},
      Isbn = {978-1-4503-4139-4},
      Keywords = {arbitrary content, bitcoin, blockchain technology, censorship resistency, measurement, peer-to-peer protocols},
      Location = {Vienna, Austria},
      Numpages = {3},
      Pages = {1769--1771},
      Publisher = {ACM},
      Series = {CCS '16},
      Title = {POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain As a Content Store},
      Url = {http://doi.acm.org/10.1145/2976749.2989059},
      Year = {2016},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/2976749.2989059},
      Bdsk-Url-2 = {https://doi.org/10.1145/2976749.2989059}}
  • [DOI] M. Henze, J. Hiller, S. Schmerling, J. H. Ziegeldorf, and K. Wehrle, “CPPL: Compact Privacy Policy Language,” in Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, 2016, pp. 99-110. Acceptance rate: 19 %.
    [Bibtex]
    @inproceedings{henze2016cppl,
      Acceptancerate = {19 %},
      Acmid = {2994627},
      Address = {New York, NY, USA},
      Author = {Henze, Martin and Hiller, Jens and Schmerling, Sascha and Ziegeldorf, Jan Henrik and Wehrle, Klaus},
      Booktitle = {Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society},
      Date-Added = {2018-10-06 16:05:44 +0000},
      Date-Modified = {2018-10-10 05:26:22 +0000},
      Doi = {10.1145/2994620.2994627},
      Isbn = {978-1-4503-4569-9},
      Keywords = {cloud computing, data handling, internet of things, privacy policies},
      Location = {Vienna, Austria},
      Numpages = {12},
      Pages = {99--110},
      Publisher = {ACM},
      Series = {WPES '16},
      Title = {CPPL: Compact Privacy Policy Language},
      Url = {http://doi.acm.org/10.1145/2994620.2994627},
      Year = {2016},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/2994620.2994627},
      Bdsk-Url-2 = {https://doi.org/10.1145/2994620.2994627}}
  • [PDF] [DOI] J. H. Ziegeldorf, R. Matzutt, M. Henze, F. Grossmann, and K. Wehrle, “Secure and anonymous decentralized Bitcoin mixing,” Future Generation Computer Systems, 2016. Acceptance rate: 25 %. Impact factor: 4.787.
    [Bibtex]
    @article{ziegeldorf2016secure,
      Acceptancerate = {25 %},
      Author = {Jan Henrik Ziegeldorf and Roman Matzutt and Martin Henze and Fred Grossmann and Klaus Wehrle},
      Date-Added = {2018-10-06 15:56:53 +0000},
      Date-Modified = {2018-10-10 05:23:11 +0000},
      Doi = {http://dx.doi.org/10.1016/j.future.2016.05.018},
      Impactfactor = {4.787},
      Issn = {0167-739X},
      Journal = {Future Generation Computer Systems},
      Keywords = {Pseudonymity, anonymity and untraceability},
      Title = {Secure and anonymous decentralized Bitcoin mixing},
      Url = {http://www.sciencedirect.com/science/article/pii/S0167739X16301297},
      Year = {2016},
      Bdsk-Url-1 = {http://www.sciencedirect.com/science/article/pii/S0167739X16301297},
      Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.future.2016.05.018}}

2015

  • [PDF] [DOI] J. H. Ziegeldorf, F. Grossmann, M. Henze, N. Inden, and K. Wehrle, “CoinParty: Secure Multi-Party Mixing of Bitcoins,” in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 2015, pp. 75-86. Acceptance rate: 21 %.
    [Bibtex]
    @inproceedings{ziegeldorf2015coinparty,
      Acceptancerate = {21 %},
      Acmid = {2699100},
      Address = {New York, NY, USA},
      Author = {Ziegeldorf, Jan Henrik and Grossmann, Fred and Henze, Martin and Inden, Nicolas and Wehrle, Klaus},
      Booktitle = {Proceedings of the 5th ACM Conference on Data and Application Security and Privacy},
      Date-Added = {2018-10-06 16:11:11 +0000},
      Date-Modified = {2018-10-10 05:27:51 +0000},
      Doi = {10.1145/2699026.2699100},
      Isbn = {978-1-4503-3191-3},
      Keywords = {anonymity, bitcoin, secure multi-party computation},
      Location = {San Antonio, Texas, USA},
      Numpages = {12},
      Pages = {75--86},
      Publisher = {ACM},
      Series = {CODASPY '15},
      Title = {CoinParty: Secure Multi-Party Mixing of Bitcoins},
      Url = {http://doi.acm.org/10.1145/2699026.2699100},
      Year = {2015},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/2699026.2699100},
      Bdsk-Url-2 = {https://doi.org/10.1145/2699026.2699100}}
  • [PDF] [DOI] J. H. Ziegeldorf, J. Metzke, M. Henze, and K. Wehrle, “Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks,” in 2015 IEEE Security and Privacy Workshops, 2015, pp. 198-205.
    [Bibtex]
    @inproceedings{ziegeldorf2015choose,
      Author = {J. H. Ziegeldorf and J. Metzke and M. Henze and K. Wehrle},
      Booktitle = {2015 IEEE Security and Privacy Workshops},
      Date-Added = {2018-10-06 16:10:40 +0000},
      Date-Modified = {2018-10-06 16:10:43 +0000},
      Doi = {10.1109/SPW.2015.9},
      Keywords = {data privacy;security of data;secure two-party computation frameworks;STC frameworks;privacy engineers;quantitative performance analysis;Benchmark testing;Protocols;Privacy;Cryptography;Servers;Libraries;Performance evaluation;Secure Two-Party Computation;Privacy;Performance Evaluation},
      Month = {May},
      Pages = {198-205},
      Title = {Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks},
      Year = {2015},
      Bdsk-Url-1 = {https://doi.org/10.1109/SPW.2015.9}}
  • [PDF] [DOI] S. Kowalewski, M. Ziefle, H. Ziegeldorf, and K. Wehrle, “Like us on Facebook! — Analyzing User Preferences Regarding Privacy Settings in Germany,” Procedia Manufacturing, vol. 3, pp. 815-822, 2015. 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, AHFE 2015.
    [Bibtex]
    @article{kowalewski2015likeus,
      Author = {Sylvia Kowalewski and Martina Ziefle and Henrik Ziegeldorf and Klaus Wehrle},
      Date-Added = {2018-10-06 16:10:15 +0000},
      Date-Modified = {2018-10-06 16:10:22 +0000},
      Doi = {https://doi.org/10.1016/j.promfg.2015.07.336},
      Issn = {2351-9789},
      Journal = {Procedia Manufacturing},
      Keywords = {Facebook, Privacy, User preferences, Contextual integrity},
      Note = {6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, AHFE 2015},
      Pages = {815 - 822},
      Title = {Like us on Facebook! -- Analyzing User Preferences Regarding Privacy Settings in Germany},
      Url = {http://www.sciencedirect.com/science/article/pii/S2351978915003376},
      Volume = {3},
      Year = {2015},
      Bdsk-Url-1 = {http://www.sciencedirect.com/science/article/pii/S2351978915003376},
      Bdsk-Url-2 = {https://doi.org/10.1016/j.promfg.2015.07.336}}
  • [PDF] J. H. Ziegeldorf, J. Hiller, M. Henze, H. Wirtz, and K. Wehrle, “Bandwidth-Optimized Secure Two-Party Computation of Minima,” in International Conference on Cryptology and Network Security, 2015, pp. 197-213. Acceptance rate: 53 %.
    [Bibtex]
    @inproceedings{ziegeldorf2015boma,
      Acceptancerate = {53 %},
      Author = {Ziegeldorf, Jan Henrik and Hiller, Jens and Henze, Martin and Wirtz, Hanno and Wehrle, Klaus},
      Booktitle = {International Conference on Cryptology and Network Security},
      Date-Added = {2018-10-06 16:07:04 +0000},
      Date-Modified = {2018-10-10 05:30:51 +0000},
      Organization = {Springer},
      Pages = {197--213},
      Title = {Bandwidth-Optimized Secure Two-Party Computation of Minima},
      Year = {2015}}

2014

  • [PDF] J. H. Ziegeldorf, N. Viol, M. Henze, and K. Wehrle, “POSTER: Privacy-preserving Indoor Localization,” WiSec’14, 2014.
    [Bibtex]
    @article{ziegeldorf2014poster,
      Author = {Ziegeldorf, Jan Henrik and Viol, Nicolai and Henze, Martin and Wehrle, Klaus},
      Date-Added = {2018-10-06 16:12:13 +0000},
      Date-Modified = {2018-10-06 16:12:13 +0000},
      Journal = {WiSec'14},
      Title = {POSTER: Privacy-preserving Indoor Localization},
      Year = {2014}}

2013

  • [DOI] V. F. Meca, J. H. Ziegeldorf, P. M. Sanchez, O. G. Morchon, S. S. Kumar, and S. L. Keoh, “HIP Security Architecture for the IP-Based Internet of Things,” in 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1331-1336.
    [Bibtex]
    @inproceedings{vidal2013hip,
      Author = {F. Vidal Meca and J. H. Ziegeldorf and P. M. Sanchez and O. G. Morchon and S. S. Kumar and S. L. Keoh},
      Booktitle = {2013 27th International Conference on Advanced Information Networking and Applications Workshops},
      Date-Added = {2018-10-06 16:14:59 +0000},
      Date-Modified = {2018-10-06 16:15:05 +0000},
      Doi = {10.1109/WAINA.2013.158},
      Keywords = {computer network management;computer network security;cryptographic protocols;data privacy;hypermedia;Internet;Internet of Things;IP networks;mobility management (mobile radio);multimedia communication;personal area networks;polynomials;transport protocols;HIP security architecture;IP-based Internet of Things;smart city infrastructure;information exchange;TCP;HTTP;IPv6 protocol;low power wireless personal area network;constrained application protocol;IETF;privacy;IoT;resource-constrained device;mobile smart object pervasive interaction;large-scale network management;host identity protocol;multimedia Internet keying protocol;asymmetric-key cryptography;MIKEY;polynomial;unambiguous thing identification;mobility support;Protocols;Hip;Cryptography;Polynomials;IP networks;Prototypes;Internet of Things;Security;Network Access;Key management},
      Month = {March},
      Pages = {1331-1336},
      Title = {HIP Security Architecture for the IP-Based Internet of Things},
      Year = {2013},
      Bdsk-Url-1 = {https://doi.org/10.1109/WAINA.2013.158}}
  • [DOI] O. Garcia-Morchon, S. L. Keoh, S. Kumar, P. Moreno-Sanchez, F. Vidal-Meca, and J. H. Ziegeldorf, “Securing the IP-based Internet of Things with HIP and DTLS,” in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), New York, NY, USA, 2013, pp. 119-124. Acceptance rate: 37 %.
    [Bibtex]
    @inproceedings{garcia2013securing,
      Acceptancerate = {37 %},
      Acmid = {2462117},
      Address = {New York, NY, USA},
      Author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep and Moreno-Sanchez, Pedro and Vidal-Meca, Francisco and Ziegeldorf, Jan Henrik},
      Booktitle = {Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
      Date-Added = {2018-10-06 16:14:38 +0000},
      Date-Modified = {2018-10-10 05:29:08 +0000},
      Doi = {10.1145/2462096.2462117},
      Isbn = {978-1-4503-1998-0},
      Keywords = {protocol design, security, security architecture},
      Location = {Budapest, Hungary},
      Numpages = {6},
      Pages = {119--124},
      Publisher = {ACM},
      Title = {Securing the IP-based Internet of Things with HIP and DTLS},
      Url = {http://doi.acm.org/10.1145/2462096.2462117},
      Year = {2013},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/2462096.2462117},
      Bdsk-Url-2 = {https://doi.org/10.1145/2462096.2462117}}
  • [PDF] [DOI] R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, “Towards Viable Certificate-based Authentication for the Internet of Things,” in Proceedings of the 2Nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, New York, NY, USA, 2013, pp. 37-42. Acceptance rate: 83 %.
    [Bibtex]
    @inproceedings{hummen2013towards,
      Acceptancerate = {83 %},
      Acmid = {2463193},
      Address = {New York, NY, USA},
      Author = {Hummen, Ren{\'e} and Ziegeldorf, Jan H. and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus},
      Booktitle = {Proceedings of the 2Nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy},
      Date-Added = {2018-10-06 16:14:16 +0000},
      Date-Modified = {2018-10-10 05:30:22 +0000},
      Doi = {10.1145/2463183.2463193},
      Isbn = {978-1-4503-2003-0},
      Keywords = {authentication, certificates, internet of things, tls},
      Location = {Budapest, Hungary},
      Numpages = {6},
      Pages = {37--42},
      Publisher = {ACM},
      Series = {HotWiSec '13},
      Title = {Towards Viable Certificate-based Authentication for the Internet of Things},
      Url = {http://doi.acm.org/10.1145/2463183.2463193},
      Year = {2013},
      Bdsk-Url-1 = {http://doi.acm.org/10.1145/2463183.2463193},
      Bdsk-Url-2 = {https://doi.org/10.1145/2463183.2463193}}
  • [PDF] [DOI] J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, “Privacy in the Internet of Things: threats and challenges,” Security and Communication Networks, vol. 7, iss. 12, pp. 2728-2742, 2013. Impact factor: 1.067.
    [Bibtex] [Abstract]
    @article{ziegeldorf2013privacy,
      Abstract = {The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of Things is, thus, the evolution of the Internet to cover the real world, enabling many new services that will improve people's everyday lives, spawn new businesses, and make buildings, cities, and transport smarter. Smart things allow indeed for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already now limiting the success of the Internet of Things vision when not implemented correctly. These threats involve new challenges such as the pervasive privacy-aware management of personal data or methods to control or avoid ubiquitous tracking and profiling. This paper analyzes the privacy issues in the Internet of Things in detail. To this end, we first discuss the evolving features and trends in the Internet of Things with the goal of scrutinizing their privacy implications. Second, we classify and examine privacy threats in this new setting, pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.},
      Author = {Ziegeldorf, Jan Henrik and Morchon, Oscar Garcia and Wehrle, Klaus},
      Date-Added = {2018-10-06 16:13:41 +0000},
      Date-Modified = {2018-10-10 05:39:54 +0000},
      Doi = {10.1002/sec.795},
      Eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.795},
      Impactfactor = {1.067},
      Journal = {Security and Communication Networks},
      Keywords = {privacy, Internet of Things, privacy-enhancing technology, legislation, threats},
      Number = {12},
      Pages = {2728-2742},
      Title = {Privacy in the Internet of Things: threats and challenges},
      Url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.795},
      Volume = {7},
      Year = {2013},
      Bdsk-Url-1 = {https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.795},
      Bdsk-Url-2 = {https://doi.org/10.1002/sec.795}}

    The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of Things is, thus, the evolution of the Internet to cover the real world, enabling many new services that will improve people’s everyday lives, spawn new businesses, and make buildings, cities, and transport smarter. Smart things allow indeed for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already now limiting the success of the Internet of Things vision when not implemented correctly. These threats involve new challenges such as the pervasive privacy-aware management of personal data or methods to control or avoid ubiquitous tracking and profiling. This paper analyzes the privacy issues in the Internet of Things in detail. To this end, we first discuss the evolving features and trends in the Internet of Things with the goal of scrutinizing their privacy implications. Second, we classify and examine privacy threats in this new setting, pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.

  • [PDF] [DOI] R. Hummen, H. Wirtz, J. H. Ziegeldorf, J. Hiller, and K. Wehrle, “Tailoring end-to-end IP security protocols to the Internet of Things,” in 2013 21st IEEE International Conference on Network Protocols (ICNP), 2013, pp. 1-10. Acceptance rate: 18 %.
    [Bibtex]
    @inproceedings{hummen2013tailoring,
      Acceptancerate = {18 %},
      Author = {R. Hummen and H. Wirtz and J. H. Ziegeldorf and J. Hiller and K. Wehrle},
      Booktitle = {2013 21st IEEE International Conference on Network Protocols (ICNP)},
      Date-Added = {2018-10-06 16:12:51 +0000},
      Date-Modified = {2018-10-10 05:28:12 +0000},
      Doi = {10.1109/ICNP.2013.6733571},
      Issn = {1092-1648},
      Keywords = {computer network security;cryptographic protocols;Internet of Things;public key cryptography;end-to-end IP security protocol;Internet of Things;DTLS;HIP DEX;IKEv2;public-key-based cryptographic primitives;peer authentication;key agreement;public-key-based operations;resource-constrained IoT devices;resource-constrained peers;DoS attacks;comprehensive session resumption mechanism;collaborative puzzle-based DoS protection mechanism;refined retransmission mechanism;denial of service attack;HIP diet exchange;Protocols;Hip;Cryptography;DH-HEMTs;IP networks;Internet},
      Month = {Oct},
      Pages = {1-10},
      Title = {Tailoring end-to-end IP security protocols to the Internet of Things},
      Year = {2013},
      Bdsk-Url-1 = {https://doi.org/10.1109/ICNP.2013.6733571}}

2012

  • N. Viol, Á. B. Jó. Link, H. Wirtz, D. Rothe, and K. Wehrle, “Hidden Markov model-based 3D path-matching using raytracing-generated Wi-Fi models,” in Indoor Positioning and Indoor Navigation (IPIN), 2012 International Conference on, 2012, pp. 1-10.
    [Bibtex]
    @inproceedings{viol2012hidden,
      Author = {Viol, Nicolai and Link, J{\'o} {\'A}gila Bitsch and Wirtz, Hanno and Rothe, Dirk and Wehrle, Klaus},
      Booktitle = {Indoor Positioning and Indoor Navigation (IPIN), 2012 International Conference on},
      Date-Added = {2018-10-14 13:00:23 +0000},
      Date-Modified = {2018-10-14 13:00:23 +0000},
      Organization = {IEEE},
      Pages = {1--10},
      Title = {Hidden Markov model-based 3D path-matching using raytracing-generated Wi-Fi models},
      Year = {2012}}
  • [PDF] [DOI] R. Hummen, J. H. Ziegeldorf, T. Heer, H. Wirtz, and K. Wehrle, “SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 525-532. Acceptance rate: 28 %.
    [Bibtex]
    @inproceedings{hummen2012seams,
      Acceptancerate = {28 %},
      Author = {R. Hummen and J. H. Ziegeldorf and T. Heer and H. Wirtz and K. Wehrle},
      Booktitle = {2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)},
      Date-Added = {2018-10-06 16:15:24 +0000},
      Date-Modified = {2018-10-10 05:29:44 +0000},
      Doi = {10.1109/TrustCom.2012.250},
      Issn = {2324-898X},
      Month = {June},
      Pages = {525-532},
      Title = {SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services},
      Year = {2012},
      Bdsk-Url-1 = {https://doi.org/10.1109/TrustCom.2012.250}}

2008

  • C. Buck, T. Gass, A. Hannig, J. Hosang, S. Jonas, J. Peter, P. Steingrube, and J. H. Ziegeldorf, “Data-Mining-Cup 2007,” Informatik-Spektrum, vol. 31, iss. 6, p. 591\textendash599, 2008.
    [Bibtex]
    @article{buck2008dataminingcup,
      Author = {Buck, Christian and Gass, Tobias and Hannig, Andreas and Hosang, Jan and Jonas, Stephan and Peter, Jan-Thorsten and Steingrube, Pascal and Ziegeldorf, Jan Hendrik},
      Date-Added = {2018-10-06 16:15:56 +0000},
      Date-Modified = {2018-10-06 16:16:05 +0000},
      Journal = {Informatik-Spektrum},
      Month = {December},
      Number = {6},
      Pages = {591{\textendash}599},
      Publisher = {Springer},
      Title = {Data-Mining-Cup 2007},
      Volume = {31},
      Year = {2008}}