Publications

Publications

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
  • TU Darmstadt (91389)
Group by: Date | Creator(s) | Item type
Jump to: 2020 | 2019 | 2018 | 2017 | 2016
Number of items at this level: 68.

2020

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure two-party computation in a post-quantum world.
In: 18th International Conference on Applied Cryptography and Network Security (ACNS'20), Rome, Italy, 19.-22.10.2020, [Online-Edition: https://sites.google.com/di.uniroma1.it/ACNS2020/],
[Conference item]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
In: 25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Online-Edition: https://www.surrey.ac.uk/esorics-2020],
[Conference item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
In: 15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Online-Edition: https://www.ares-conference.eu/],
[Conference item]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, In: Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Online-Edition: https://irtf.org/anrw/2020/],
[Conference item]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Online-Edition: https://encrypto.de/papers/AGKS20.pdf],
[Article]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference item]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020. IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
In: 24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Online-Edition: https://encrypto.de/papers/TMWSK20.pdf],
[Conference item]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Online-Edition: http://www.secrypt.icete.org/],
[Conference item]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
In: ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference item]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, In: 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Online-Edition: https://dsn2020.webs.upv.es/],
[Conference item]

2019

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor thesis]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference item]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, (2), 23. S. 16-21, ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Online-Edition: https://dl.acm.org/doi/10.1145/3372300.3372304],
[Article]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference item]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference item]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Online-Edition: https://encrypto.de/papers/TNKSB19.pdf],
[Article]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Gedeon, Julien ; Brandherm, Florian ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
In: IEEE Access, 7IEEE, S. 152847-152878, ISSN 2169-3536,
DOI: 10.1109/ACCESS.2019.2948399,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9302],
[Article]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität, DOI: 10.25534/tuprints-00009642,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9642],
[PhD thesis]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference item]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, S. 521-541, ISBN 978-3-030-29962-0,
[Conference item]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference item]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference item]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference item]

Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference item]

Maass, Max ; Schwär, Stephan ; Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, In: Privacy Technologies and Policy, In: Annual Privacy Forum 2019, Rome, Italy, June 7th and 8th, 2019, DOI: 10.1007/978-3-030-21752-5_2,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8725],
[Conference item]

Maass, Max ; Schwär, Stephan ; Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: Annual Privacy Forum (LNCS), In: Proceedings of the Annual Privacy Forum 2019, Rome, Italy, Rome, [Online-Edition: https://maass.xyz/publication/maass-2019-b/maass-2019-b.pdf],
[Conference item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[PhD thesis]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), Springer, S. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference item]

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8516],
[Article]

Maass, Max ; Walter, Nicolas ; Herrmann, Dominik ; Hollick, Matthias (2019):
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
In: Wirtschaftsinformatik 2019, Siegen, Germany, 25-27.2.2019, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8515],
[Conference item]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Conference item]

Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8601],
[PhD thesis]

2018

Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Online-Edition: https://aisel.aisnet.org/icis2018/social/Presentations/1],
[Conference item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[PhD thesis]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference item]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, S. 1-6, DOI: 10.1109/NOMS.2018.8406315,
[Conference item]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master thesis]

Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696],
[Article]

Weiler, Michael ; Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691,
DOI: 10.1007/s11846-018-0280-5,
[Online-Edition: https://doi.org/10.1007/s11846-018-0280-5],
[Article]

Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7704],
[PhD thesis]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, S. 2300-2302, DOI: 10.1145/3243734.3278521,
[Conference item]

2017

Stute, Milan ; Maass, Max ; Schons, Tom ; Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17, 2. updated version,
In: The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7682],
[Conference item]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, S. 24-31, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference item]

Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MRMCD 2017, [Online-Edition: https://media.ccc.de/v/DC9AG9],
[Other]

Brendel, Jacqueline ; Fischlin, Marc Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, S. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book section]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PPS. 1, DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, S. 1-10, DOI: 10.1145/3098954.3098968,
[Conference item]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
10547In: Lecture Notes in Computer Science, In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, S. 213-223, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Conference item]

Maass, Max ; Laubach, Anne ; Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: Proceedings of INFORMATIK 2017, Leipzig, Deutschland, [Online-Edition: https://arxiv.org/abs/1705.08889],
[Conference item]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, S. 118–134, DOI: 10.1515/popets-2017-0030,
[Conference item]

Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]

Funke, Sebastian Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, S. 1-10, [Conference item]

Maass, Max ; Wichmann, Pascal ; Pridöhl, Henning ; Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017, Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Online-Edition: https://arxiv.org/abs/1705.05139],
[Conference item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, S. 1-8, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), S. 337-340, DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference item]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, S. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference item]

2016

Brendel, J. ; Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), S. 543-550, DOI: 10.1109/PST.2016.7907013,
[Conference item]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, S. 738-744, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference item]

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario Curry, Edward ; Wahlster, Wolfgang (Hrsg.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, S. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Book section]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[PhD thesis]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76Elsevier, S. 42-53, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

This list was generated on Mon Aug 3 02:04:46 2020 CEST.