default search action
Alf Zugenmaier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Manuel Keil, Alf Zugenmaier:
Evaluating the evaluation criteria for account-recovery procedures in passwordless authentication. Open Identity Summit 2024: 73-84
2010 – 2019
- 2019
- [j6]Bassam Moussa, Chantale Robillard, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - 2018
- [j5]Anand R. Prasad, Sivabalan Arumugam, Sheeba B., Alf Zugenmaier:
3GPP 5G Security. J. ICT Stand. 6(1-2): 137-158 (2018) - [c25]Fabian Ritz, Alf Zugenmaier:
The Impact of Uncle Rewards on Selfish Mining in Ethereum. EuroS&P Workshops 2018: 50-57 - [i1]Fabian Ritz, Alf Zugenmaier:
The Impact of Uncle Rewards on Selfish Mining in Ethereum. CoRR abs/1805.08832 (2018) - 2017
- [c24]Dominik Ernsberger, Adeyemi Richard Ikuesan, Hein S. Venter, Alf Zugenmaier:
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness. ICDF2C 2017: 64-79 - 2015
- [c23]Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. SEC 2015: 267-280 - 2012
- [j4]Ashiq Khan, Alf Zugenmaier, Dan Jurca, Wolfgang Kellerer:
Network virtualization: a hypervisor for the internet? IEEE Commun. Mag. 50(1): 136-143 (2012) - 2011
- [c22]Alf Zugenmaier:
Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces. Security Protocols Workshop 2011: 150-155 - [c21]Alf Zugenmaier:
Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion). Security Protocols Workshop 2011: 156-169 - 2010
- [j3]George B. Huitema, Ralph Kühne, Ulrike Meyer, Henk Ensing, Alf Zugenmaier, Alain Bibas, Olavi Karasti, Frens Jan Rumph, Johanneke Siljee:
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing. Comput. Commun. 33(15): 1823-1833 (2010)
2000 – 2009
- 2009
- [c20]Alf Zugenmaier, Sven Lachmund, Dileesh Jostin:
Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. ACSAC 2009: 333-339 - 2008
- [j2]Simone Teofili, Michele Di Mascolo, Cristina Basile, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier:
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS). Secur. Commun. Networks 1(6): 473-485 (2008) - [c19]Wesley Brandi, Martin S. Olivier, Alf Zugenmaier:
Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. TrustBus 2008: 195-204 - [c18]Mortaza S. Bargh, Bob Hulsebosch, Henk Eertink, Geert J. Heijenk, Jeroen Idserda, Julien Laganier, Anand R. Prasad, Alf Zugenmaier:
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings. WOWMOM 2008: 1-10 - 2007
- [c17]Julien Laganier, Matthias Flege, Alf Zugenmaier, Anand R. Prasad, James Kempf, Jonathan Wood:
Travelling without Moving: 802.11 Access Points backed by Secure NETLMM. ICCCN 2007: 809-816 - [c16]Alf Zugenmaier, Thomas Walter:
Security in Pervasive Computing Calling for new Security Principles. ICPS 2007: 96-99 - [c15]Adolf Hohl, Alf Zugenmaier:
Safeguarding Personal Data using Rights Management in Distributed Applications. SEC 2007: 449-456 - [c14]Alf Zugenmaier, Julien Laganier, Anand R. Prasad, Kristian Slavov:
Anchor-Less Secure Session Mobility. Security Protocols Workshop 2007: 104-109 - [c13]Alf Zugenmaier:
Anchor-Less Secure Session Mobility (Transcript of Discussion). Security Protocols Workshop 2007: 110-113 - 2006
- [c12]Alf Zugenmaier, Anand R. Prasad, Julien Laganier:
Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks. ISSA 2006: 1-11 - 2005
- [c11]Adolf Hohl, Lutz Lowis, Alf Zugenmaier:
Look Who's Talking - Authenticating Service Access Points. SPC 2005: 151-162 - [c10]Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Austin Donnelly:
Countering Automated Exploits with System Security CAPTCHAS. Security Protocols Workshop 2005: 162-169 - [c9]Alf Zugenmaier:
Countering Automated Exploits with System Security CAPTCHAS. Security Protocols Workshop 2005: 170-179 - 2004
- [c8]Alf Zugenmaier:
FLASCHE - A Mechanism Providing Anonymity for Mobile Users. Privacy Enhancing Technologies 2004: 121-141 - [c7]Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM 2004: 193-204 - [c6]Tuomas Aura, Alf Zugenmaier:
Privacy, Control and Internet Mobility. Security Protocols Workshop 2004: 133-145 - 2003
- [b1]Alf Zugenmaier:
Anonymität für Benutzer mobiler Geräte durch Ortsadressierung = Anonymity for users of mobile devices through location addressing. University of Freiburg, Freiburg im Breisgau, Germany, Rhombos-Verlag 2003, ISBN 978-3-930894-96-3, pp. 1-151 - [c5]Alf Zugenmaier:
The Freiburg privacy diamond. GLOBECOM 2003: 1501-1505 - [c4]Moritz Strasser, Alf Zugenmaier:
Personalization through Mask Marketing. HICSS 2003: 219 - [c3]Alf Zugenmaier, Michael Kreutzer, Günter Müller:
The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment. KiVS Kurzbeiträge 2003: 131-141 - 2001
- [j1]Michael Kreutzer, Alf Zugenmaier:
Verbindlichkeit durch netzinterne Sicherheitsdienste (Reaching Accountability by Security Services inside Networks). Informationstechnik Tech. Inform. 43(5): 270-279 (2001) - [c2]Matthias Kabatnik, Alf Zugenmaier:
Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks. ICN (2) 2001: 20-30
1990 – 1999
- 1999
- [c1]Uwe Jendricke, Alf Zugenmaier:
Architekturen für mehrseitige sichere Telekommunikationsnetze. GI Jahrestagung 1999: 190-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint