Follow
Dirk Westhoff
Dirk Westhoff
Professor in Computer Science, Offenburg University of Applied Sciences
Verified email at hs-offenburg.de - Homepage
Title
Cited by
Cited by
Year
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
J Girao, D Westhoff, M Schneider
IEEE International Conference on Communications, 2005. ICC 2005. 2005 5 …, 2005
4032005
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
D Westhoff, J Girao, M Acharya
IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006
3462006
Public key based cryptoschemes for data concealment in wireless sensor networks
E Mykletun, J Girao, D Westhoff
2006 IEEE international conference on communications 5, 2288-2295, 2006
2542006
Context aware detection of selfish nodes in DSR based ad-hoc networks
K Paul, D Westhoff
Proceedings IEEE 56th Vehicular Technology Conference 4, 2424-2429, 2002
2352002
Cross-layer privacy enhancement and non-repudiation in vehicular communication
F Armknecht, A Festag, D Westhoff, K Zeng
Communication in Distributed Systems-15. ITG/GI Symposium, 1-12, 2007
1532007
Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
J Girao, D Westhoff, E Mykletun, T Araki
Ad Hoc Networks 5 (7), 1073-1089, 2007
1262007
Charging support for ad hoc stub networks
B Lamparter, K Paul, D Westhoff
Computer Communications 26 (13), 1504-1514, 2003
1162003
A survey on the encryption of convergecast traffic with in-network processing
S Peter, D Westhoff, C Castelluccia
IEEE Transactions on Dependable and Secure Computing 7 (1), 20-34, 2008
1122008
Initial observations on economics, pricing, and penetration of the internet of things market
JM Bohli, C Sorge, D Westhoff
ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009
932009
Zero common-knowledge authentication for pervasive networks
A Weimerskirch, D Westhoff
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003 …, 2004
902004
Secure comparison of encrypted data in wireless sensor networks
M Acharya, J Girao, D Westhoff
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005
822005
Non-manipulable aggregator node election protocols for wireless sensor networks
M Sirivianos, D Westhoff, F Armknecht, J Girao
2007 5th International Symposium on Modeling and Optimization in Mobile, Ad …, 2007
742007
Vehicle-to-vehicle and road-side sensor communication for enhanced road safety
A Festag, A Hessler, R Baldessari, L Le, W Zhang, D Westhoff
Proceedings of the 15th world congress on intelligent transport systems, 2008
722008
A secure and resilient WSN roadside architecture for intelligent transport systems
JM Bohli, A Hessler, O Ugus, D Westhoff
Proceedings of the first ACM conference on Wireless network security, 161-171, 2008
622008
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
O Ugus, D Westhoff, R Laue, A Shoufan, SA Huss
arXiv preprint arXiv:0903.3900, 2009
612009
Methods for protecting a mobile agent’s route
M Mambo, Y Zheng, D Westhoff, M Schneider, C Unger, F Kaderali
Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur …, 1999
541999
Security solutions for wireless sensor networks
D Westhoff, J Girao, A Sarma
NEC Technical Journal 1 (3), 106-111, 2006
512006
Protecting a mobile agent’s route against collusions
D Westhoff, M Schneider, C Unger, F Kaderali
Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000
472000
Identity certified authentication for ad-hoc networks
A Weimerskirch, D Westhoff
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
432003
Privacy-enhanced architecture for smart metering
F Gómez Mármol, C Sorge, R Petrlic, O Ugus, D Westhoff, ...
International journal of information security 12, 67-82, 2013
382013
The system can't perform the operation now. Try again later.
Articles 1–20