Publikationen

Auf dieser Seite finden Sie sämtliche Publikationen, die an unserem Institut entstanden sind. Veröffentlichungen, die entstanden sind, bevor der Autor an unser Institut gewechselt hat finden Sie auf den jeweiligen Mitarbeiterseiten.

2016

294.
B. Erb, G. Habiger and F. J. Hauck, "On the Potential of Event Sourcing for Retroactive Actor-based Programming" in Proc. of the 1st Workshop on Progr. Models and Lang. for Distrib. Comp., Rome, Italy, 2016-07-17, Jul.2016.
DOI:10.1145/2957319.2957378
293.
R. Kraft, B. Erb, D. Mödinger and F. Kargl, "Using Conflict-Free Replicated Data Types for Serverless Mobile Social Applications" in Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking , The 8th International Workshop on Hot Topics in Planet-­scale mObile computing and online Social neTworking (HotPOST’16), Paderborn, Germany, 2016-07-05, ACM, Jul.2016. pp. 49-54.
DOI:10.1145/2944789.2944868
ISBN:978-1-4503-4344-2
292.
C. Bösch, B. Erb, F. Kargl, H. Kopp and S. Pfattheicher, "Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns" , Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 4, pp. 237-254, Jul. 2016. De Gruyter.
DOI:10.1515/popets-2016-0038
291.
F. J. Hauck and J. Domaschka, "UDS: a unified approach to determinisitic multithreading" in 36th Int. Conf. on Distrib. Comp. Sys. (ICDCS), Nara, Japan, 2016-06-27, Jun.2016.
DOI:10.1109/ICDCS.2016.73
290.
A. Al-Momani, F. Kargl and C. Waldschmidt, "Physical Layer-Based Message Authentication in VANETs" in Fachgespräch Inter-Vehicle Communication 2016 (FG IVC 2016), 4th GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, Berlin, April 2016,Björn Scheuermann, Stefan Dietzel, Eds. Apr.2016. pp. 14-17.
289.
C. Corbett, E. Schoch, F. Kargl and F. Preussner, "Automotive Ethernet: security opportunity or challenge?" in Sicherheit 2016. Schutz und Zuverlässigkeit. Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Bonn, 5.-7. April 2016,Michael Meier, Delphine Reinhardt, Steffen Wendzel, Eds. Bonn: Köllen Verlag, Apr.2016. pp. 45-54.
ISBN:978-3-88579-650-3
288.
S. Puchinger, S. Müelich, D. Mödinger, J. S. R. Nielsen and M. Bossert, "Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm" in Algebraic and Combinatorial Coding Theory 2016, Algebraic and Combinatorial Coding Theory, Albena, Bulgaria , June 18-24, 2016 , Apr.2016.
287.
B. Erb, Computing on Event-sourced Graphs, Mä. 2016.
286.
D. Förster, F. Kargl and H. Löhr, "PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks" , Ad Hoc Networks, vol. 37, Part 1, pp. 122 - 132, Feb. 2016. http://www.sciencedirect.com/science/article/pii/S1570870515002280.
DOI:10.1016/j.adhoc.2015.09.011
285.
S. Dietzel, J. Gürtler and F. Kargl, "A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy" , Ad Hoc Networks, vol. 37, Part 1, pp. 101 - 109, Feb. 2016. http://www.sciencedirect.com/science/article/pii/S1570870515001985.
DOI:10.1016/j.adhoc.2015.09.002
284.
J. Köstler, J. Seidemann and H. P. Reiser, "Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments" in 35th Int. Symp. on Reliable Distrib. Sys. Workshops - SRDSW, 2016.
DOI:10.1109/SRDSW.2016.19
283.
G. Habiger, F. J. Hauck, J. Köstler and H. P. Reiser, "Vertikale Skalierung für aktiv replizierte Dienste in Cloud-Infrastrukturen" , 2016.
Datei:https://www.uni-ulm.de/fileadmin/website_uni_ulm/iui.inst.200/files/publikationen/Habiger16.pdf
282.
V. Nikolov, "Ein hierarchisches Scheduling-Modell für unbekannte Anwendungen mit schwankenden Ressourcenanforderungen", Dissertation, Fakultät für Ingenieurwissenschaften, Informatik und Psychologie, Universität Ulm, 2016.
DOI:10.18725/OPARU-4099
281.
M. Matousek, C. Bösch and F. Kargl, "Using Searchable Encryption to Protect Privacy in Connected Cars" in Proceedings of the 4th GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, Berlin, Germany, 2016.
Datei:https://edoc.hu-berlin.de/handle/18452/2084
280.
[English] S. Müelich, S. Puchinger, D. Mödinger and M. Bossert, "An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero" in International Symposium on Information Theory (ISIT), 2016 IEEE, Barcelona, Spain: IEEE, 2016.

2015

279.
S. Dietzel, R. W. van der Heijden, J. Petit and F. Kargl, "Context-adaptive Detection of Insider Attacks in VANET Information Dissemination Schemes" in Vehicular Networking Conference (VNC), 2015 IEEE, Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, December 2015, IEEE, Dez.2015. pp. 293-300.
DOI:10.1109/VNC.2015.7385590
278.
A. Al-Momani, F. Kargl, C. Waldschmidt, S. Moser and F. Slomka, "Wireless Channel-Based Message Authentication" in Vehicular Networking Conference (VNC), 2015 IEEE, Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, December 2015, IEEE, Dez.2015. pp. 277-280.
DOI:10.1109/VNC.2015.7385587
277.
D. Förster, H. Löhr and F. Kargl, "Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing" in Vehicular Networking Conference (VNC), 2015 IEEE, Vehicular Networking Conference (VNC), 2015 IEEE, Kyoto, Japan, December 2015, IEEE, Dez.2015. pp. 285-292.
DOI:10.1109/VNC.2015.7385589
276.
J. Petit, B. Stottelaar, M. Feiri and F. Kargl, "Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR" in Black Hat Europe, Nov.2015.
275.
V. Nikolov, F. J. Hauck and L. Schubert, "Ein hierarchisches Scheduling-Modell für unbekannte Anwendungen mit schwankenden Ressourcenanforderungen" in Echtzeit und Betriebssysteme, Boppard, 11.-12.11.2015, Nov.2015.
274.
J. Petit, D. Broekhuis, M. Feiri and F. Kargl, "Connected Vehicles: Surveillance Threat and Mitigation" in Black Hat Europe, Nov.2015.
273.
V. Nikolov, F. J. Hauck and S. Wesner, "Assembling a framework for unkown real-time applications with RTSJ" in Proc. of the 13th Int. Workshop on Java Techn. for Real-time and Embedded Sys., Paris, Oct. 7-8, 2015, Okt.2015.
272.
S. Kleber, F. Unterstein, M. Matousek, F. Kargl, F. Slomka and M. Hiller, "Design of the Secure Execution PUF-based Processor (SEPP)" in Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015, Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Saint Malo, Sep.2015.
DOI:10.18725/OPARU-3255
271.
[English] D. Förster, H. Löhr, J. Zibuschka and F. Kargl, "REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks" in Trust and Trustworthy Computing, Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis, Eds. Springer International Publishing, Aug.2015. pp. 193-208.
DOI:10.1007/978-3-319-22846-4_12
ISBN:978-3-319-22845-7
270.
S. Kleber, F. Unterstein, M. Matousek, F. Kargl, F. Slomka and M. Hiller, "Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption" , Jul. 2015.

Ältere News finden Sie im Archiv.

Kontakt

Sekretariat

Marion Köhler
Claudia Kastner
Emailaddresse Sekretariat
Telefon: +49 731 50-24140
Telefax: +49 731 50-24142

Postanschrift

Institut für Verteilte Systeme
Universität Ulm
Albert-Einstein-Allee 11
89081 Ulm

Besucheranschrift

James-Franck-Ring
Gebäude O27, Raum 349
89081 Ulm

Anfahrt