SoNet–Privacy and Replication in Federated Online Social Networks L Schwittmann, C Boelmann, M Wander, T Weis Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd …, 2013 | 36 | 2013 |
Privacy Preservation in Decentralized Online Social Networks L Schwittmann, M Wander, C Boelmann, T Weis IEEE Internet Computing 18 (2), 16-23, 2013 | 31 | 2013 |
Measurement Survey of Server-Side DNSSEC Adoption M Wander Network Traffic Measurement and Analysis Conference (TMA), 2017, 2017 | 25 | 2017 |
Measurement of Globally Visible DNS Injection M Wander, C Boelmann, L Schwittmann, T Weis IEEE Access 2, 526-536, 2014 | 23 | 2014 |
GPU-based NSEC3 Hash Breaking M Wander, L Schwittmann, C Boelmann, T Weis Network Computing and Applications (NCA), 2014 IEEE 13th International …, 2014 | 22 | 2014 |
Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities L Schwittmann, M Wander, T Weis 2019 IEEE European Symposium on Security and Privacy (EuroS & P), 544-559, 2019 | 18 | 2019 |
Video Recognition using Ambient Light Sensors L Schwittmann, V Matkovic, M Wander, T Weis 2016 IEEE International Conference on Pervasive Computing and Communications …, 2016 | 18 | 2016 |
Measuring Occurrence of DNSSEC Validation M Wander, T Weis Passive and Active Measurement (PAM) 7799, 125-134, 2013 | 16 | 2013 |
Identifying TV Channels & On-Demand Videos using Ambient Light Sensors L Schwittmann, C Boelmann, V Matkovic, M Wander, T Weis Pervasive and Mobile Computing 38, 363-380, 2017 | 10 | 2017 |
SecureCloud: an encrypted, scalable storage for cloud forensics M Uphoff, M Wander, T Weis, M Waltereit 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 8 | 2018 |
SYNI – TCP Hole Punching based on SYN Injection S Holzapfel, M Wander, A Wacker, T Weis 2011 IEEE 10th International Symposium on Network Computing and Applications …, 2011 | 8 | 2011 |
Towards Peer-to-Peer-based Cryptanalysis M Wander, A Wacker, T Weis IEEE Local Computer Network Conference, 1005-1012, 2010 | 8 | 2010 |
A New Protocol to Determine the NAT Characteristics of a Host S Holzapfel, M Wander, A Wacker, L Schwittmann, T Weis 2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011 | 7 | 2011 |
An Architecture for Complex P2P Systems S Holzapfel, A Wacker, T Weis, M Wander Consumer Communications and Networking Conference (CCNC), 2012 | 5 | 2012 |
NTALG–TCP NAT Traversal with Application-Level Gateways M Wander, S Holzapfel, A Wacker, T Weis Consumer Communications and Networking Conference (CCNC), 2012 | 5 | 2012 |
Detecting Opportunistic Cheaters in Volunteer Computing M Wander, T Weis, A Wacker 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 5 | 2011 |
How Bitcoin Works M Wander | 4 | 2011 |
Mobile Devices as Digital Sextants for Zero-Permission Geolocation L Schwittmann, M Wander, T Weis Proceedings of the 5th International Conference on Information Systems …, 2019 | 3 | 2019 |
Adaptive cheat detection in decentralized volunteer computing with untrusted nodes N Kopal, M Wander, C Konze, H Heck IFIP International Conference on Distributed Applications and Interoperable …, 2017 | 3 | 2017 |
Application-level determinism in distributed systems C Boelmann, L Schwittmann, M Waltereit, M Wander, T Weis 2016 IEEE 22nd International Conference on Parallel and Distributed Systems …, 2016 | 2 | 2016 |