CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks J Girao, D Westhoff, M Schneider IEEE International Conference on Communications, 2005. ICC 2005. 2005 5 …, 2005 | 405 | 2005 |
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation D Westhoff, J Girao, M Acharya IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006 | 349 | 2006 |
Public key based cryptoschemes for data concealment in wireless sensor networks E Mykletun, J Girao, D Westhoff 2006 IEEE international conference on communications 5, 2288-2295, 2006 | 258 | 2006 |
Context aware detection of selfish nodes in DSR based ad-hoc networks K Paul, D Westhoff Proceedings IEEE 56th Vehicular Technology Conference 4, 2424-2429, 2002 | 241 | 2002 |
Cross-layer privacy enhancement and non-repudiation in vehicular communication F Armknecht, A Festag, D Westhoff, K Zeng Communication in Distributed Systems-15. ITG/GI Symposium, 1-12, 2007 | 156 | 2007 |
Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks J Girao, D Westhoff, E Mykletun, T Araki Ad Hoc Networks 5 (7), 1073-1089, 2007 | 127 | 2007 |
Charging support for ad hoc stub networks B Lamparter, K Paul, D Westhoff Computer Communications 26 (13), 1504-1514, 2003 | 118 | 2003 |
A survey on the encryption of convergecast traffic with in-network processing S Peter, D Westhoff, C Castelluccia IEEE Transactions on Dependable and Secure Computing 7 (1), 20-34, 2008 | 113 | 2008 |
Initial observations on economics, pricing, and penetration of the internet of things market JM Bohli, C Sorge, D Westhoff ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009 | 96 | 2009 |
Zero common-knowledge authentication for pervasive networks A Weimerskirch, D Westhoff Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003 …, 2004 | 90 | 2004 |
Secure comparison of encrypted data in wireless sensor networks M Acharya, J Girao, D Westhoff Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005 | 82 | 2005 |
Vehicle-to-vehicle and road-side sensor communication for enhanced road safety A Festag, A Hessler, R Baldessari, L Le, W Zhang, D Westhoff Proceedings of the 15th world congress on intelligent transport systems, 2008 | 74 | 2008 |
Non-manipulable aggregator node election protocols for wireless sensor networks M Sirivianos, D Westhoff, F Armknecht, J Girao 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad …, 2007 | 73 | 2007 |
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks O Ugus, D Westhoff, R Laue, A Shoufan, SA Huss arXiv preprint arXiv:0903.3900, 2009 | 63 | 2009 |
A secure and resilient WSN roadside architecture for intelligent transport systems JM Bohli, A Hessler, O Ugus, D Westhoff Proceedings of the first ACM conference on Wireless network security, 161-171, 2008 | 63 | 2008 |
Methods for protecting a mobile agent’s route M Mambo, Y Zheng, D Westhoff, M Schneider, C Unger, F Kaderali Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur …, 1999 | 53 | 1999 |
Security solutions for wireless sensor networks D Westhoff, J Girao, A Sarma NEC Technical Journal 1 (3), 106-111, 2006 | 52 | 2006 |
Protecting a mobile agent’s route against collusions D Westhoff, M Schneider, C Unger, F Kaderali Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000 | 47 | 2000 |
Identity certified authentication for ad-hoc networks A Weimerskirch, D Westhoff Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 43 | 2003 |
Privacy-enhanced architecture for smart metering F Gómez Mármol, C Sorge, R Petrlic, O Ugus, D Westhoff, ... International journal of information security 12, 67-82, 2013 | 41 | 2013 |