Jens Hiller
Jens Hiller
Verified email at - Homepage
Cited by
Cited by
6LoWPAN fragmentation attacks and mitigation mechanisms
R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
International Conference on Financial Cryptography and Data Security, 420-438, 2018
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
Slimfit—A HIP DEX compression layer for the IP-based Internet of things
R Hummen, J Hiller, M Henze, K Wehrle
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
A first look at certification authority authorization (caa)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
Moving privacy-sensitive services from public clouds to decentralized private clouds
M Henze, J Hiller, O Hohlfeld, K Wehrle
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
Cppl: Compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC medical genomics 10 (2), 44, 2017
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
Towards transparent information on individual cloud service usage
M Henze, D Kerpen, J Hiller, M Eggert, D Hellmanns, E Mühmer, O Renuli, ...
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J van der Giet, ...
2017 IEEE International Conference on Cloud Engineering (IC2E), 252-258, 2017
Tailoring onion routing to the Internet of Things: Security and privacy in untrusted environments
J Hiller, J Pennekamp, M Dahlmanns, M Henze, A Panchenko, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-12, 2019
Secure Low Latency Communication for Constrained Industrial IoT Scenarios
J Hiller, M Henze, M Serror, E Wagner, JN Richter, K Wehrle
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 614-622, 2018
SSICLOPS Deliverable 2. 1: Report on Body of Knowledge in Secure Cloud Data Storage
F Eberhardt, M Plauth, A Polze, S Klauck, M Uflacker, J Hiller, O Hohlfeld, ...
Technical report. June 2015. Bastian et al.: Facilitating Policy Adherence …, 2015
Privacy-Preserving Remote Knowledge System
M Dahlmanns, C Dax, R Matzutt, J Pennekamp, J Hiller, K Wehrle
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
SPLIT: Smart Protocol Loading for the IoT.
T Zimmermann, J Hiller, H Reelfs, P Hein, K Wehrle
EWSN, 49-54, 2018
Design of Inter-Cloud Security Policies, Architecture, and Annotations for Data Storage
F Eberhardt, J Hiller, O Hohlfeld, S Klauck, M Plauth, A Polze, M Uflacker, ...
Technical report. Hasso Plattner Institute, University of Potsdam, 2016
Bandwidth-optimized secure two-party computation of minima
JH Ziegeldorf, J Hiller, M Henze, H Wirtz, K Wehrle
International Conference on Cryptology and Network Security, 197-213, 2015
Giving Customers Control Over Their Data: Integrating a Policy Language into the Cloud
J Hiller, M Kimmerlin, M Plauth, S Heikkila, S Klauck, V Lindfors, ...
2018 IEEE International Conference on Cloud Engineering (IC2E), 241-249, 2018
The system can't perform the operation now. Try again later.
Articles 1–20