Publications

On this page, all publications that were written in cooperation with our institute are listed. Publications that have been written before the author was employed at our institute can be found at the authors' employee page.

2016

285.
S. Dietzel, J. Gürtler and F. Kargl, "A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy" , Ad Hoc Networks , vol. 37, Part 1 , pp. 101 - 109 , Feb. 2016. http://www.sciencedirect.com/science/article/pii/S1570870515001985 .
DOI: 10.1016/j.adhoc.2015.09.002
284.
J. Köstler, J. Seidemann and H. P. Reiser, "Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments" in 35th Int. Symp. on Reliable Distrib. Sys. Workshops - SRDSW , 2016.
DOI: 10.1109/SRDSW.2016.19
283.
V. Nikolov, "Ein hierarchisches Scheduling-Modell für unbekannte Anwendungen mit schwankenden Ressourcenanforderungen" , Dissertation , Fakultät für Ingenieurwissenschaften, Informatik und Psychologie, Universität Ulm , 2016.
DOI: 10.18725/OPARU-4099
282.
M. Matousek, C. Bösch and F. Kargl, "Using Searchable Encryption to Protect Privacy in Connected Cars" in Proceedings of the 4th GI/ITG KuVS Fachgespräch Inter-Vehicle Communication , Berlin, Germany , 2016.
https://edoc.hu-berlin.de/handle/18452/2084
281.
G. Habiger, F. J. Hauck, J. Köstler and H. P. Reiser, "Vertikale Skalierung für aktiv replizierte Dienste in Cloud-Infrastrukturen" , 2016.
https://www.uni-ulm.de/fileadmin/website_uni_ulm/iui.inst.200/files/publikationen/Habiger16.pdf
280.
[English] S. Müelich, S. Puchinger, D. Mödinger and M. Bossert, "An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero" in International Symposium on Information Theory (ISIT), 2016 IEEE , Barcelona, Spain : IEEE , 2016.

2015

279.
S. Dietzel, R. W. van der Heijden, J. Petit and F. Kargl, "Context-adaptive Detection of Insider Attacks in VANET Information Dissemination Schemes" in Vehicular Networking Conference (VNC), 2015 IEEE , Vehicular Networking Conference (VNC), 2015 IEEE , Kyoto, Japan , December 2015 , IEEE , Dec. 2015. pp. 293-300.
DOI: 10.1109/VNC.2015.7385590
278.
A. Al-Momani, F. Kargl, C. Waldschmidt, S. Moser and F. Slomka, "Wireless Channel-Based Message Authentication" in Vehicular Networking Conference (VNC), 2015 IEEE , Vehicular Networking Conference (VNC), 2015 IEEE , Kyoto, Japan , December 2015 , IEEE , Dec. 2015. pp. 277-280.
DOI: 10.1109/VNC.2015.7385587
277.
D. Förster, H. Löhr and F. Kargl, "Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing" in Vehicular Networking Conference (VNC), 2015 IEEE , Vehicular Networking Conference (VNC), 2015 IEEE , Kyoto, Japan , December 2015 , IEEE , Dec. 2015. pp. 285-292.
DOI: 10.1109/VNC.2015.7385589
276.
J. Petit, D. Broekhuis, M. Feiri and F. Kargl, "Connected Vehicles: Surveillance Threat and Mitigation" in Black Hat Europe , Nov. 2015.
275.
J. Petit, B. Stottelaar, M. Feiri and F. Kargl, "Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR" in Black Hat Europe , Nov. 2015.
274.
V. Nikolov, F. J. Hauck and L. Schubert, "Ein hierarchisches Scheduling-Modell für unbekannte Anwendungen mit schwankenden Ressourcenanforderungen" in Echtzeit und Betriebssysteme , Boppard , 11.-12.11.2015 , Nov. 2015.
273.
V. Nikolov, F. J. Hauck and S. Wesner, "Assembling a framework for unkown real-time applications with RTSJ" in Proc. of the 13th Int. Workshop on Java Techn. for Real-time and Embedded Sys. , Paris , Oct. 7-8, 2015 , Oct. 2015.
272.
S. Kleber, F. Unterstein, M. Matousek, F. Kargl, F. Slomka and M. Hiller, "Design of the Secure Execution PUF-based Processor (SEPP)" in Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015 , Workshop on Trustworthy Manufacturing and Utilization of Secure Devices , Saint Malo , Sep. 2015.
DOI: 10.18725/OPARU-3255
271.
[English] D. Förster, H. Löhr, J. Zibuschka and F. Kargl, "REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks" in Trust and Trustworthy Computing , Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis, Eds. Springer International Publishing , Aug. 2015. pp. 193-208.
DOI: 10.1007/978-3-319-22846-4_12
270.
S. Kleber, F. Unterstein, M. Matousek, F. Kargl, F. Slomka and M. Hiller, "Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption" , Jul. 2015.
269.
B. Erb and F. Kargl, "A Conceptual Model for Event-sourced Graph Computing" in Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems , New York, NY, USA : ACM , Jun. 2015. pp. 352-355.
DOI: 10.1145/2675743.2776773
268.
B. Erb and F. Kargl, "A Conceptual Model for Event-sourced Graph Computing" in Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems , DEBS'15 , Oslo, Norwegen , Jun. 2015.
DOI: 10.1145/2675743.2776773
267.
B. Erb, "Towards Distributed Processing on Event-sourced Graphs (Extended Abstract)" in Doctoral Symposium, 9th ACM International Conference on Distributed Event-Based Systems , DEBS'15 , Oslo, Norwegen , Jun. 2015.
DOI: 10.13140/RG.2.1.3273.3289
266.
D. Förster, F. Kargl and H. Löhr, "A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-hoc Networks" in Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks , New York, NY, USA : ACM , Jun. 2015. pp. 19:1--19:6.
DOI: 10.1145/2766498.2766520
265.
S. Dietzel, A. Peter and F. Kargl, "Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks" in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st , Glasgow, U.K. , Glasgow, U.K. , May 2015. pp. 1-5.
DOI: 10.1109/VTCSpring.2015.7146074
264.
M. Feiri, R. Pielage, J. Petit, N. Zannone and F. Kargl, "Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET" in Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st , May 2015. pp. 1-5.
DOI: 10.1109/VTCSpring.2015.7146029
263.
M. Caselli, E. Zambon and F. Kargl, "Sequence-aware Intrusion Detection in Industrial Control Systems" in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security , Singapore, Republic of Singapore , New York, NY, USA : ACM , Apr. 2015. pp. 13-24.
DOI: 10.1145/2732198.2732200
262.
S. Kleber, R. W. van der Heijden, H. Kopp and F. Kargl, "Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions" in Networked Systems (NetSys), 2015 International Conference and Workshops on , Cottbus, Germany , IEEE , Mar. 2015. pp. 1-8.
DOI: 10.1109/NetSys.2015.7089068
261.
M. Feiri, J. Petit and F. Kargl, "The case for announcing pseudonym changes" in Proceedings of 3rd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2015) , 3rd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2015) , Ulm , March 2015 , Frank, Raphael and Sommer, Christoph and Kargl, Frank and Dietzel, Stefan and van der Heijden, Rens W., Eds. Ulm, Germany , Mar. 2015. pp. 31-33.