Publications

On this page, all publications that were written in cooperation with our institute are listed. Publications that have been written before the author was employed at our institute can be found at the authors' employee page.

2006

85.
T. Leinmüller, E. Schoch, F. Kargl and C. Maihöfer, "<prt>Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification</prt>" in 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2006) , Los Angeles, USA : ACM , 2006.
DOI: http://doi.acm.org/10.1145/1161064.1161075
http://doi.acm.org/10.1145/1161064.1161075
84.
F. Kargl, Z. Ma and E. Schoch, "<prt>Security Engineering for VANETs</prt>" in 4th Workshop on Embedded Security in Cars (escar 2006) , Berlin, Germany , 2006.
83.
F. Kargl, S. Schlott and M. Weber, "<prt>Identification in Ad hoc Networks</prt>" in 39th Hawaii International Conference on System Sciences (HICSS-39) , Hawaii, USA : IEEE , 2006.
DOI: 10.1109/HICSS.2006.208
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1579771&isnumber=33369
82.
J. Domaschka, "<prt> Design and Implementation of a Framework for Decentralized, Adaptive Services</prt>" , Diplomarbeit , Universität Erlangen-Nürnberg , 2006.
81.
R. Bader, M. Pinto, F. Spenrath, P. Wollmann and F. Kargl, "<prt>BigNurse: A Wireless Ad Hoc Network for Patient Monitoring</prt>" in Pervasive Health, First Workshop on Location Based Services for Health Care (Locare'06) , Innsbruck, Austria : IEEE , 2006.
DOI: 10.1109/PCTHEALTH.2006.361691
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4205182&isnumber=4205140
80.
S. Schlott, F. Kargl and M. Weber, "<prt>Re-identifying Anonymous Nodes</prt>" in Location- And Context Awareness, Second International Workshop (LoCA 2006) , Dublin, Ireland : Springer , 2006.
DOI: 10.1007/11752967_8
http://www.springerlink.com/content/a2435629v5246766/fulltext.pdf
79.
E. Schoch, F. Kargl, S. Schlott, T. Leinmüller and P. Papadimitratos, "<prt>Impact of Pseudonym Changes on Geographic Routing in VANETs</prt>" in Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2006) , Hamburg, Germany : Springer , 2006.
DOI: 10.1007/11964254_6
http://www.springerlink.com/content/p16332607rkk7gj6/fulltext.pdf
78.
S. Chapkin, B. Bako, F. Kargl and E. Schoch, "<prt>Location Tracking Attack in Ad Hoc Networks based on Topology Information</prt>" in IEEE MASS Workshop on Wireless and Sensor Networks Security, WSNS 2006 , Vancouver, Canada : IEEE , 2006.
DOI: 10.1109/MOBHOC.2006.278667
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4054013&isnumber=4053890
77.
T. Leinmüller, E. Schoch and F. Kargl, "<prt>Position Verification Approaches for Vehicular Ad Hoc Networks</prt>" , IEEE Wireless Communication Magazine , vol. 13 , no. 5 , pp. 16-21 , 2006.
DOI: 10.1109/WC-M.2006.250353
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4015704&isnumber=4015697
76.
P. Papadimitratos, A. Kung, J. Hubaux and F. Kargl, "<prt>Privacy and Identity Management for Vehicular Communication Systems: A Position Paper</prt>" in Workshop on Standards for Privacy in User-Centric Identity Management , Zurich, Switzerland , 2006.

2005

75.
T. Leinmüller, E. Schoch, F. Kargl and C. Maihöfer, "<prt>Influence of Falsified Position Data on Geographic Ad-Hoc Routing</prt>" in 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005) , Visegrad, Hungary : Springer , 2005.
DOI: 10.1007/11601494_9
http://www.springerlink.com/content/fr78w4721t9n8801/fulltext.pdf
74.
S. Schlott, F. Kargl and M. Weber, "<prt>Random IDs for preserving location privacy (Short Paper)</prt>" in First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) , Athens, Greece : IEEE , 2005.
DOI: 10.1109/SECURECOMM.2005.47
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1607601&isnumber=33755
73.
F. Kargl, A. Geiß, S. Schlott and M. Weber, "<prt>Secure Dynamic Source Routing</prt>" in <prt>38th Hawaii International Conference on System Sciences (HICSS-38)</prt> , Hawaii, USA : IEEE , 2005.
DOI: 10.1109/HICSS.2005.531
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1385905&isnumber=30166
72.
F. Kargl, A. Klenk, M. Weber and S. Schlott, "<prt>Sensors for Detection of Misbehaving Nodes in MANETs</prt>" , PIK - Praxis der Informationstechnik , vol. 28 , no. 1 , pp. 38-44 , 2005.
DOI: 10.1515/PIKO.2005.38
http://www.reference-global.com/doi/abs/10.1515/PIKO.2005.38
71.
F. Kargl and A. Bernauer, "<prt>The COMPASS Location System</prt>" in First International Workshop on Location- And Context Awareness (LoCA 2005) , Oberpfaffenhofen, Germany : Springer , 2005.
DOI: 10.1007/11426646_10
http://www.springerlink.com/content/pgrm6pypby64m6dn/fulltext.pdf
70.
S. Schlott and F. Kargl, "<prt>Wiedererkennung anonymer Knoten</prt>" , 3. Krypto-Tag - Workshop über Kryptographie , 2005.
69.
R. Kapitza, M. Kirstein, H. Schmidt and F. J. Hauck, "FORMI: An RMI extension for adaptive applications" in Proc. of the 4th Workshop on Adaptive and Reflective Middleware , ARM , Grenoble, France , 28.11.2005 , ACM Digital Library , 2005.
DOI: 10.1145/1101516.1101518
68.
F. Kargl, S. Schlott and M. Weber, "<prt>Identitäten in Mobilen Ad hoc Netzwerken</prt>" in WMAN 2005, part of the Informatik 2005, Annual Meeting of the German Association for Computer Science (GI) , Bonn, Germany : GI e.V. , 2005.

2004

67.
F. Kargl, S. Schlott, M. Weber, A. Klenk and A. Geiß, "<prt>Securing Ad hoc Routing Protocols</prt>" in 30th Euromicro Conference , Rennes, France , 2004.
DOI: 10.1109/EURMIC.2004.1333415
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1333415&isnumber=29441
66.
F. Kargl, "<prt>Sicherheit in Mobilen Ad-hoc Netzwerken</prt>" in Ausgezeichnete Informatikdissertationen 2003 , et al., Dorothea Wagner, Eds. 2004.
65.
F. Kargl, A. Klenk, M. Weber and S. Schlott, "<prt>Sensors for Detection of Misbehaving Nodes in MANETs</prt>" in Workshop Detection of Intrusions and Malware &amp; Vulnerability Assessment (DIMVA 2004) , Dortmund, Germany : GI e.V. , 2004.
64.
F. Kargl, S. Schlott and M. Weber, "<prt>Integrierte Sicherheit für Mobile Ad-hoc Netzwerke</prt>" in WMAN 2004, part of the Informatik 2004, Annual Meeting of the German Association for Computer Science (GI) , Ulm, Germany : GI e.V. , 2004.
63.
F. Kargl, A. Klenk, S. Schlott and M. Weber, "<prt>Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks</prt>" in 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) , Heidelberg, Germany : Springer , 2004.
DOI: 10.1007/b105219
http://www.springerlink.com/content/mhexqdjn8c7t88gh/fulltext.pdf
62.
J. Domaschka, "<prt> Entwurf und Implementierung einer statischen Java-Laufzeitumgebung für den LEGO Mindstorms RCX </prt>" , Studienarbeit , Universität Erlangen-Nürnberg , 2004.

2003

61.
R. Kapitza and F. J. Hauck, "DLS: a CORBA service for dynamic loading of code" in Proc. of the Int. Symp. on Distrib. Obj. and Appl. - DOA , Dec. 2003.