Peer-to-peer systems and applications R Steinmetz, K Wehrle Springer, 2005 | 785 | 2005 |
Privacy in the Internet of Things: threats and challenges JH Ziegeldorf, OG Morchon, K Wehrle Security and Communication Networks 7 (12), 2728-2742, 2014 | 691 | 2014 |
A performance comparison of recent network simulators E Weingartner, H Vom Lehn, K Wehrle IEEE International Conference on Communications, 2009. ICC'09, 2009 | 675 | 2009 |
Security Challenges in the IP-based Internet of Things T Heer, O Garcia-Morchon, R Hummen, SL Keoh, SS Kumar, K Wehrle Wireless Personal Communications 61, 527-542, 2011 | 510 | 2011 |
Modeling and tools for network simulation K Wehrle, M Gunes, J Gross Springer, 2010 | 472 | 2010 |
Website Fingerprinting at Internet Scale. A Panchenko, F Lanze, J Pennekamp, T Engel, A Zinnen, M Henze, ... NDSS, 2016 | 440 | 2016 |
Accurate prediction of power consumption in sensor networks O Landsiedel, K Wehrle, S Gotz The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II., 37-44, 2005 | 362 | 2005 |
A comprehensive approach to privacy in the cloud-based Internet of Things M Henze, L Hermerschmidt, D Kerpen, R Häußling, B Rumpe, K Wehrle Future generation computer systems 56, 701-718, 2016 | 251 | 2016 |
Footpath: Accurate map-based indoor navigation using smartphones JAB Link, P Smith, N Viol, K Wehrle International Conference on Indoor Positioning and Indoor Navigation (IPIN …, 2011 | 249 | 2011 |
Linux Network Architecture K Wehrle, F Pahlke, H Ritter, D Muller, M Bechler Prentice-Hall, Inc., 2004 | 219 | 2004 |
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ... Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018 | 209 | 2018 |
6LoWPAN fragmentation attacks and mitigation mechanisms R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh, K Wehrle Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 202 | 2013 |
Coinparty: Secure multi-party mixing of bitcoins JH Ziegeldorf, F Grossmann, M Henze, N Inden, K Wehrle Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 188 | 2015 |
Delegation-based Authentication and Authorization for the IP-based Internet of Things R Hummen, H Shafagh, S Raza, T Voig, K Wehrle 2014 eleventh annual IEEE international conference on Sensing, Communication …, 2014 | 186 | 2014 |
Towards viable certificate-based authentication for the internet of things R Hummen, JH Ziegeldorf, H Shafagh, S Raza, K Wehrle Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013 | 175 | 2013 |
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment R Sasnauskas, O Landsiedel, MH Alizai, C Weise, S Kowalewski, ... Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010 | 167 | 2010 |
Bursty traffic over bursty links MH Alizai, O Landsiedel, JÁB Link, S Götz, K Wehrle Proceedings of ACM SenSys'07 -- 7th ACM Conference on Embedded Networked …, 2009 | 145 | 2009 |
EEG-based automatic emotion recognition: Feature extraction, selection and classification methods P Ackermann, C Kohlschein, JA Bitsch, K Wehrle, S Jeschke 2016 IEEE 18th international conference on e-health networking, applications …, 2016 | 137 | 2016 |
Secure and anonymous decentralized Bitcoin mixing JH Ziegeldorf, R Matzutt, M Henze, F Grossmann, K Wehrle Future Generation Computer Systems 80, 448-466, 2018 | 130 | 2018 |
IP multicast in differentiated services (DS) networks R Bless, K Wehrle | 123 | 2004 |