default search action
Martin Henze
Person information
- affiliation: Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Germany
- affiliation (former): RWTH Aachen University, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c70]Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt:
Towards Secure 5G Infrastructures for Production Systems. ACNS Workshops (2) 2024: 198-203 - [c69]Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
When and How to Aggregate Message Authentication Codes on Lossy Channels? ACNS (2) 2024: 241-264 - [c68]Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze:
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. AsiaCCS 2024 - [c67]Markus Dahlmanns, Felix Heidenreich, Johannes Lohmöller, Jan Pennekamp, Klaus Wehrle, Martin Henze:
Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet. NOMS 2024: 1-8 - [c66]Philipp Bönninghausen, Rafael Uetz, Martin Henze:
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets. CSET @ USENIX Security Symposium 2024: 34-40 - [c65]Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze:
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks. USENIX Security Symposium 2024 - [i45]Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt:
POSTER: Towards Secure 5G Infrastructures for Production Systems. CoRR abs/2401.13306 (2024) - [i44]Ömer Sen, Tarek Hassan, Andreas Ulbig, Martin Henze:
Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks. CoRR abs/2402.14599 (2024) - [i43]Philipp Bönninghausen, Rafael Uetz, Martin Henze:
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets. CoRR abs/2408.02521 (2024) - [i42]Sotiris Michaelides, Thomas Vogt, Martin Henze:
Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities. CoRR abs/2408.16833 (2024) - [i41]Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze:
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure. CoRR abs/2411.01971 (2024) - 2023
- [j10]Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze:
[SoK] Evaluations in Industrial Intrusion Detection Research. J. Syst. Res. 3(1) (2023) - [c64]Jan Pennekamp, Johannes Lohmöller, Eduard Vlad, Joscha Loos, Niklas Rodemann, Patrick Sapel, Ina Berenice Fink, Seth Schmitz, Christian Hopmann, Matthias Jarke, Günther Schuh, Klaus Wehrle, Martin Henze:
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking. CAiSE 2023: 489-505 - [c63]Lennart Bader, Eric Wagner, Martin Henze, Martin Serror:
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks. ESORICS Workshops (1) 2023: 25-45 - [c62]Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, Martin Henze:
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection. ESORICS (2) 2023: 102-122 - [c61]Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. EuroS&P 2023: 1065-1081 - [c60]Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig:
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids. ISGT EUROPE 2023: 1-6 - [c59]Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, Martin Henze:
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols. LCN 2023: 1-9 - [d5]Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze:
Artifact: SoK: Evaluations in Industrial Intrusion Detection Research. Zenodo, 2023 - [i40]Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. CoRR abs/2305.09390 (2023) - [i39]Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, Michael Zeng:
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead. CoRR abs/2305.10151 (2023) - [i38]Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, Martin Henze:
Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities. CoRR abs/2311.01338 (2023) - [i37]Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze:
SoK: Evaluations in Industrial Intrusion Detection Research. CoRR abs/2311.02929 (2023) - [i36]Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze:
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks. CoRR abs/2311.10197 (2023) - [i35]Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze:
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. CoRR abs/2312.09650 (2023) - [i34]Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
When and How to Aggregate Message Authentication Codes on Lossy Channels? CoRR abs/2312.09660 (2023) - [i33]Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig:
Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis. CoRR abs/2312.13697 (2023) - [i32]Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig:
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids. CoRR abs/2312.13705 (2023) - [i31]Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig:
An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids. CoRR abs/2312.13737 (2023) - [i30]Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
When and How to Aggregate Message Authentication Codes on Lossy Channels? IACR Cryptol. ePrint Arch. 2023: 1919 (2023) - 2022
- [j9]Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze:
On specification-based cyber-attack detection in smart grids. Energy Inform. 5 (2022) - [j8]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Complying With Data Handling Requirements in Cloud Storage Systems. IEEE Trans. Cloud Comput. 10(3): 1661-1674 (2022) - [c58]Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze:
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. AsiaCCS 2022: 252-266 - [c57]Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger:
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. CCS 2022: 3463-3465 - [c56]Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze:
A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection. CPSS@AsiaCCS 2022: 73-84 - [c55]Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner, Klaus Wehrle, Martin Henze:
Can Industrial Intrusion Detection Be SIMPLE? ESORICS (3) 2022: 574-594 - [c54]Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze:
Scalable and Privacy-Focused Company-Centric Supply Chain Management. ICBC 2022: 1-5 - [c53]Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, Martin Henze:
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset. LCN 2022: 114-122 - [c52]Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze:
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. RAID 2022: 510-525 - [c51]Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror:
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. CSET @ USENIX Security Symposium 2022: 49-53 - [c50]Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
BP-MAC: Fast Authentication for Short Messages. WISEC 2022: 201-206 - [c49]Eric Wagner, Jan Bauer, Martin Henze:
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. WISEC 2022: 207-221 - [d4]Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Martin Henze, Klaus Wehrle:
RadarPWN. Version 1.0.0. Zenodo, 2022 [all versions] - [d3]Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Martin Henze, Klaus Wehrle:
RadarPWN. Version 1.0.1. Zenodo, 2022 [all versions] - [d2]Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Martin Henze, Klaus Wehrle:
radarsec-lab. Zenodo, 2022 - [d1]Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Martin Henze, Klaus Wehrle:
RadarPWN. Version 1.0.2. Zenodo, 2022 [all versions] - [i29]Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze:
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection. CoRR abs/2205.09199 (2022) - [i28]Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
BP-MAC: Fast Authentication for Short Messages. CoRR abs/2205.09635 (2022) - [i27]Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze:
Scalable and Privacy-Focused Company-Centric Supply Chain Management. CoRR abs/2205.10961 (2022) - [i26]Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze:
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. CoRR abs/2206.00322 (2022) - [i25]Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror:
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. CoRR abs/2207.04716 (2022) - [i24]Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze:
On Specification-based Cyber-Attack Detection in Smart Grids. CoRR abs/2209.04354 (2022) - 2021
- [j7]Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze:
Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21(18): 6225 (2021) - [j6]Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle:
Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(5): 2985-2996 (2021) - [j5]Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle:
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively. IEEE Trans. Netw. Serv. Manag. 18(3): 3064-3078 (2021) - [c48]Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze:
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. ACSAC 2021: 690-705 - [c47]Markus Dahlmanns, Jan Pennekamp, Ina Berenice Fink, Bernd Schoolmann, Klaus Wehrle, Martin Henze:
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems. SAT-CPS@CODASPY 2021: 78-87 - [c46]Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig:
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. ISGT-Europe 2021: 1-6 - [c45]Michael Rademacher, Hendrik Linka, Thorsten Horstmann, Martin Henze:
Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study. VTC Fall 2021: 1-6 - [i23]Eric Wagner, Jan Bauer, Martin Henze:
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. CoRR abs/2103.08560 (2021) - [i22]Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze:
Cybersecurity in Power Grids: Challenges and Opportunities. CoRR abs/2105.00013 (2021) - [i21]Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres:
Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids. CoRR abs/2109.02336 (2021) - [i20]Michael Rademacher, Hendrik Linka, Thorsten Horstmann, Martin Henze:
Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study. CoRR abs/2109.07768 (2021) - [i19]Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze:
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment. CoRR abs/2110.02040 (2021) - [i18]Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig:
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. CoRR abs/2110.09162 (2021) - [i17]Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze:
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. CoRR abs/2111.03438 (2021) - [i16]Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze:
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. CoRR abs/2111.07847 (2021) - [i15]Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle:
Challenges and Opportunities in Securing the Industrial Internet of Things. CoRR abs/2111.11714 (2021) - [i14]Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle:
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively. CoRR abs/2111.13525 (2021) - [i13]Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze:
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. CoRR abs/2112.11417 (2021) - [i12]Jan Pennekamp, Martin Henze, Klaus Wehrle:
Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation. ERCIM News 2021(126) (2021) - 2020
- [c44]Martin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, Dennis van der Velde:
Cybersecurity Research and Training for Power Distribution Grids - A Blueprint. CCS 2020: 2097-2099 - [c43]Konrad Wolsing, Eric Wagner, Martin Henze:
Facilitating Protocol-independent Industrial Intrusion Detection Systems. CCS 2020: 2105-2107 - [c42]Martin Henze:
The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation. CNS 2020: 1-5 - [c41]Jan Pennekamp, Lennart Bader, Roman Matzutt, Philipp Niemietz, Daniel Trauth, Martin Henze, Thomas Bergs, Klaus Wehrle:
Private Multi-Hop Accountability for Supply Chains. ICC Workshops 2020: 1-7 - [c40]Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze:
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. Internet Measurement Conference 2020: 101-110 - [c39]Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle:
How to Securely Prune Bitcoin's Blockchain. Networking 2020: 298-306 - [i11]Dennis van der Velde, Martin Henze, Philipp Kathmann, Erik Wassermann, Michael Andres, Detert Bracht, Raphael Ernst, George Hallak, Benedikt Klaer, Philipp Linnartz, Benjamin Meyer, Simon Ofner, Tobias Pletzer, Richard Sethmann:
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures. CoRR abs/2003.06185 (2020) - [i10]Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, Martin Henze:
Assessing the Security of OPC UA Deployments. CoRR abs/2003.12341 (2020) - [i9]Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle:
How to Securely Prune Bitcoin's Blockchain. CoRR abs/2004.06911 (2020) - [i8]Benedikt Klaer, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Michael Andres, Martin Henze:
Graph-based Model of Smart Grid Architectures. CoRR abs/2009.00273 (2020) - [i7]Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze:
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. CoRR abs/2010.13539 (2020) - [i6]Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze:
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking. IACR Cryptol. ePrint Arch. 2020: 1512 (2020)
2010 – 2019
- 2019
- [c38]Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, Klaus Wehrle:
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective. CPS-SPC@CCS 2019: 27-38 - [c37]René Glebke, Martin Henze, Klaus Wehrle, Philipp Niemietz, Daniel Trauth, Patrick Mattfeld, Thomas Bergs:
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems. HICSS 2019: 1-10 - [c36]Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle:
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. ICNP 2019: 1-12 - [c35]Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. ICNP 2019: 1-2 - [c34]Jan Pennekamp, René Glebke, Martin Henze, Tobias Meisen, Christoph Quix, Rihan Hai, Lars Christoph Gleim, Philipp Niemietz, Maximilian Rudack, Simon Knape, Alexander Epple, Daniel Trauth, Uwe Vroomen, Thomas Bergs, Christian Brecher, Andreas Bührig-Polaczek, Matthias Jarke, Klaus Wehrle:
Towards an Infrastructure Enabling the Internet of Production. ICPS 2019: 31-37 - [c33]Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle:
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. LCN Symposium 2019: 83-91 - [c32]Jan Pennekamp, Martin Henze, Oliver Hohlfeld, Andriy Panchenko:
Hi Doppelgänger : Towards Detecting Manipulation in News Comments. WWW (Companion Volume) 2019: 197-205 - 2018
- [b1]Martin Henze:
Accounting for Privacy in the Cloud Computing Landscape. RWTH Aachen University, Germany, Shaker 2018, ISBN 978-3-8440-6389-9, pp. 1-312 - [j4]Jan Henrik Ziegeldorf, Roman Matzutt, Martin Henze, Fred Grossmann, Klaus Wehrle:
Secure and anonymous decentralized Bitcoin mixing. Future Gener. Comput. Syst. 80: 448-466 (2018) - [c31]Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle:
Towards In-Network Security for Smart Homes. ARES 2018: 18:1-18:8 - [c30]Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle:
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Financial Cryptography 2018: 420-438 - [c29]Roman Matzutt, Martin Henze, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle:
Thwarting Unwanted Blockchain Content Insertion. IC2E 2018: 364-370 - [c28]Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, Klaus Wehrle:
Secure Low Latency Communication for Constrained Industrial IoT Scenarios. LCN 2018: 614-622 - [i5]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Complying with Data Handling Requirements in Cloud Storage Systems. CoRR abs/1806.11448 (2018) - 2017
- [j3]Jan Pennekamp, Martin Henze, Klaus Wehrle:
A survey on the evolution of privacy enforcement on smartphones and the road ahead. Pervasive Mob. Comput. 42: 58-76 (2017) - [c27]Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, Klaus Wehrle:
Privacy-Preserving HMM Forward Computation. CODASPY 2017: 83-94 - [c26]Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle:
Practical Data Compliance for Cloud Storage. IC2E 2017: 252-258 - [c25]Martin Henze, Jan Pennekamp, David Hellmanns, Erik Mühmer, Jan Henrik Ziegeldorf, Arthur Drichel, Klaus Wehrle:
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. MobiQuitous 2017: 262-271 - [c24]Martin Henze, Ritsuma Inaba, Ina Berenice Fink, Jan Henrik Ziegeldorf:
Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps. MobiQuitous 2017: 543-544 - [c23]Martin Henze, Mary Peyton Sanford, Oliver Hohlfeld:
Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape. TMA 2017: 1-9 - [c22]Martin Henze, Benedikt Wolters, Roman Matzutt, Torsten Zimmermann, Klaus Wehrle:
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things. TrustCom/BigDataSE/ICESS 2017: 185-192 - [c21]Jan Henrik Ziegeldorf, Martin Henze, Jens Bavendiek, Klaus Wehrle:
TraceMixer: Privacy-preserving crowd-sensing sans trusted third party. WONS 2017: 17-24 - [c20]Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel:
Analysis of Fingerprinting Techniques for Tor Hidden Services. WPES@CCS 2017: 165-175 - 2016
- [j2]Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle:
A comprehensive approach to privacy in the cloud-based Internet of Things. Future Gener. Comput. Syst. 56: 701-718 (2016) - [c19]Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel:
POSTER: Fingerprinting Tor Hidden Services. CCS 2016: 1766-1768 - [c18]Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle:
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. CCS 2016: 1769-1771 - [c17]Martin Henze, Daniel Kerpen, Jens Hiller, Michael Eggert, David Hellmanns, Erik Mühmer, Oussama Renuli, Henning Maier, Christian Stüble, Roger Häußling, Klaus Wehrle:
Towards Transparent Information on Individual Cloud Service Usage. CloudCom 2016: 366-370 - [c16]Martin Henze, Jens Hiller, Oliver Hohlfeld, Klaus Wehrle:
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. IC2E Workshops 2016: 130-135 - [c15]Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, Klaus Wehrle:
Website Fingerprinting at Internet Scale. NDSS 2016 - [c14]Martin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, Klaus Wehrle:
CPPL: Compact Privacy Policy Language. WPES@CCS 2016: 99-110 - [i4]Martin Henze, René Hummen, Roman Matzutt, Klaus Wehrle:
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud. CoRR abs/1607.03239 (2016) - 2015
- [c13]Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle:
Bandwidth-Optimized Secure Two-Party Computation of Minima. CANS 2015: 197-213 - [c12]Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, Klaus Wehrle:
CoinParty: Secure Multi-Party Mixing of Bitcoins. CODASPY 2015: 75-86 - [c11]Jan Henrik Ziegeldorf, Martin Henze, René Hummen, Klaus Wehrle:
Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper). DPM/QASA@ESORICS 2015: 226-234 - [c10]Jan Henrik Ziegeldorf, Jan Metzke, Martin Henze, Klaus Wehrle:
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks. IEEE Symposium on Security and Privacy Workshops 2015: 198-205 - 2014
- [c9]Ismet Aktas, Martin Henze, Muhammad Hamad Alizai, Kevin Möllering, Klaus Wehrle:
Graph-based redundancy removal approach for multiple cross-layer interactions. COMSNETS 2014: 1-8 - [c8]Martin Henze, Sebastian Bereda, René Hummen, Klaus Wehrle:
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud. EUSPN/ICTH 2014: 370-375 - [c7]Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle:
User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things. FiCloud 2014: 191-196 - [c6]Florian Schmidt, Martin Henze, Klaus Wehrle:
Piccett: Protocol-independent classification of corrupted error-tolerant traffic. ISCC 2014: 1-7 - [p2]Martin Henze, René Hummen, Roman Matzutt, Klaus Wehrle:
A Trust Point-based Security Architecture for Sensor Data in the Cloud. Trusted Cloud Computing 2014: 77-106 - [p1]Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, Klaus Wehrle:
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. Trusted Cloud Computing 2014: 203-218 - [i3]Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, Klaus Wehrle:
POSTER: Privacy-preserving Indoor Localization. CoRR abs/1410.3270 (2014) - [i2]Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle:
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things. CoRR abs/1412.3325 (2014) - 2013
- [j1]Martin Henze, René Hummen, Roman Matzutt, Daniel Catrein, Klaus Wehrle:
Maintaining User Control While Storing and Processing Sensor Data in the Cloud. Int. J. Grid High Perform. Comput. 5(4): 97-112 (2013) - [c5]Martin Henze, Marcel Grossfengels, Maik Koprowski, Klaus Wehrle:
Towards Data Handling Requirements-Aware Cloud Computing. CloudCom (2) 2013: 266-269 - [c4]Martin Henze, René Hummen, Klaus Wehrle:
The Cloud Needs Cross-Layer Data Handling Annotations. IEEE Symposium on Security and Privacy Workshops 2013: 18-22 - [c3]René Hummen, Jens Hiller, Martin Henze, Klaus Wehrle:
Slimfit - A HIP DEX compression layer for the IP-based Internet of Things. WiMob 2013: 259-266 - [c2]René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle:
6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66 - [i1]Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, Klaus Wehrle:
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. CoRR abs/1310.6542 (2013) - 2012
- [c1]René Hummen, Martin Henze, Daniel Catrein, Klaus Wehrle:
A Cloud design for user-controlled storage and processing of sensor data. CloudCom 2012: 232-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint