default search action
Matthias Hollick
Person information
- affiliation: TU Darmstadt, Department of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Janzen, Kamyar Abedi, Marko S. Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali:
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts. IEEE Access 12: 155666-155695 (2024) - [j57]Florentin Putz, Steffen Haesler, Matthias Hollick:
Sounds Good? Fast and Secure Contact Exchange in Groups. Proc. ACM Hum. Comput. Interact. 8(CSCW2): 1-44 (2024) - [j56]Alexander Heinrich, Leon Würsching, Matthias Hollick:
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection. Proc. Priv. Enhancing Technol. 2024(3): 353-371 (2024) - [j55]Luis F. Abanto-Leon, Aravindh Krishnamoorthy, Andres Garcia-Saavedra, Gek Hong Sim, Robert Schober, Matthias Hollick:
Radio Resource Management Design for RSMA: Optimization of Beamforming, User Admission, and Discrete/Continuous Rates With Imperfect SIC. IEEE Trans. Mob. Comput. 23(12): 11498-11518 (2024) - [c217]Dustin Kern, Christoph Krauß, Matthias Hollick:
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains. ARES 2024: 11:1-11:12 - [c216]Florentin Putz, Steffen Haesler, Thomas Völkl, Maximilian Gehring, Nils Rollshausen, Matthias Hollick:
PairSonic: Helping Groups Securely Exchange Contact Information. CSCW Companion 2024: 69-71 - [c215]Swantje Lange, Francesco Gringoli, Matthias Hollick, Jiska Classen:
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements. ESORICS (4) 2024: 208-228 - [c214]Vincenz Mechler, Felix Wiegand, Matthias Hollick, Bastian Bloessl:
Always On Air: Adaptive Physical Layer Switching For Uninterrupted UAV Air-to-Ground Communication. DroNet@MobiSys 2024: 25-30 - [c213]Max Granzow, Alexander Heinrich, Matthias Hollick, Marco Zimmerling:
Poster: Leveraging Apple's Find My Network for Large-Scale Distributed Sensing. MobiSys 2024: 666-667 - [c212]Lukas Arnold, Matthias Hollick, Jiska Classen:
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database. RAID 2024: 613-629 - [c211]Sönke Huster, Matthias Hollick, Jiska Classen:
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices. SP 2024: 4629-4645 - [c210]Leon Janzen, Lucas Becker, Colin Wiesenäcker, Matthias Hollick:
Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base Station. WOOT @ USENIX Security Symposium 2024: 101-115 - [c209]Lucas Becker, Matthias Hollick, Jiska Classen:
SoK: On the Effectiveness of Control-Flow Integrity in Practice. WOOT @ USENIX Security Symposium 2024: 189-209 - [i62]Luis F. Abanto-Leon, Aravindh Krishnamoorthy, Andres Garcia-Saavedra, Gek Hong Sim, Robert Schober, Matthias Hollick:
Radio Resource Management Design for RSMA: Optimization of Beamforming, User Admission, and Discrete/Continuous Rates with Imperfect SIC. CoRR abs/2404.19611 (2024) - [i61]Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Würsching, Kamyar Abedi, Marko S. Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali:
Resilience-by-Design Concepts for 6G Communication Networks. CoRR abs/2405.17480 (2024) - 2023
- [j54]Alina Stöver, Nina Gerber, Henning Pridöhl, Max Maass, Sebastian Bretthauer, Indra Spiecker genannt Döhmann, Matthias Hollick, Dominik Herrmann:
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges. Proc. Priv. Enhancing Technol. 2023(2): 251-264 (2023) - [j53]Artur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick, Bernd Freisleben:
Energy-Efficient Decentralized Broadcasting in Wireless Multi-Hop Networks. Sensors 23(17): 7419 (2023) - [j52]Luis F. Abanto-Leon, Arash Asadi, Andres Garcia-Saavedra, Gek Hong Sim, Matthias Hollick:
RadiOrchestra: Proactive Management of Millimeter-Wave Self-Backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control. IEEE Trans. Wirel. Commun. 22(1): 153-173 (2023) - [c208]Dustin Kern, Christoph Krauß, Matthias Hollick:
Detection of Anomalies in Electric Vehicle Charging Sessions. ACSAC 2023: 298-309 - [c207]Leon Würsching, Florentin Putz, Steffen Haesler, Matthias Hollick:
FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones. CHI 2023: 68:1-68:16 - [c206]Afifa Ishtiaq, Arash Asadi, Ladan Khaloopour, Waqar Ahmed, Vahid Jamali, Matthias Hollick:
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries. CNS 2023: 1-9 - [c205]Mikhail Fomichev, Timm Lippert, Matthias Hollick:
Hardening and Speeding Up Zero-interaction Pairing and Authentication. EWSN 2023: 262-273 - [c204]Amir Ashtari Gargari, Andrea Ortiz, Matteo Pagin, Anja Klein, Matthias Hollick, Michele Zorzi, Arash Asadi:
Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks. INFOCOM 2023: 1-10 - [c203]Artur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick, Bernd Freisleben:
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks. LCN 2023: 1-4 - [c202]Jakob Link, David Breuer, Francesco Gringoli, Matthias Hollick:
Rolling the D11: An Emulation Game for the Whole BCM43 Family. WiNTECH 2023: 88-95 - [c201]Hermann Leinweber, Jonatan Crystall, Frank Hessel, Florentin Putz, Matthias Hollick:
Introducing FreeSpeaker - A Modular Smart Home Hub Prototyping Platform. MobiCom 2023: 113:1-113:3 - [d22]Leon Würsching, Florentin Putz, Steffen Haesler, Matthias Hollick:
Lab Study Dataset: FIDO2 Platform and Roaming Authentication on Smartphones. Zenodo, 2023 - [i60]Amir Ashtari Gargari, Andrea Ortiz, Matteo Pagin, Anja Klein, Matthias Hollick, Michele Zorzi, Arash Asadi:
Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks. CoRR abs/2301.03201 (2023) - [i59]Stephan Kleber, Milan Stute, Matthias Hollick, Frank Kargl:
Network Message Field Type Classification and Recognition for Unknown Binary Protocols. CoRR abs/2301.03584 (2023) - [i58]Leon Würsching, Florentin Putz, Steffen Haesler, Matthias Hollick:
FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones. CoRR abs/2302.07777 (2023) - [i57]Alexander Heinrich, Sören Krollmann, Florentin Putz, Matthias Hollick:
Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging. CoRR abs/2303.11220 (2023) - [i56]Mikhail Fomichev, Timm Lippert, Matthias Hollick:
Hardening and Speeding Up Zero-interaction Pairing and Authentication. CoRR abs/2306.04458 (2023) - [i55]Leon Würsching, Matthias Hollick:
Maintaining App Services in Disrupted Cities: A Crisis and Resilience Evaluation Tool. CoRR abs/2310.11124 (2023) - 2022
- [j51]Milan Stute, Florian Kohnhäuser, Lars Baumgärtner, Lars Almon, Matthias Hollick, Stefan Katzenbeisser, Bernd Freisleben:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. IEEE Trans. Dependable Secur. Comput. 19(3): 1722-1734 (2022) - [j50]Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick:
Next2You: Robust Copresence Detection Based on Channel State Information. ACM Trans. Internet Things 3(2): 11:1-11:31 (2022) - [j49]Frank Hessel, Lars Almon, Matthias Hollick:
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation. ACM Trans. Sens. Networks 18(4): 70:1-70:55 (2022) - [c200]Stephan Kleber, Frank Kargl, Milan Stute, Matthias Hollick:
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols. DSN Workshops 2022: 80-87 - [c199]Roland Bless, Bastian Bloessl, Matthias Hollick, Marius Corici, Holger Karl, Dennis Krummacker, Daniel Lindenschmitt, Hans D. Schotten, Lara Wimmer:
Dynamic network (re-)configuration across time, scope, and structure. EuCNC 2022: 547-552 - [c198]Luis F. Abanto-Leon, Matthias Hollick, Bruno Clerckx, Gek Hong (Allyson) Sim:
Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions. ICC 2022: 3904-3910 - [c197]Thomas Roth, Fabian Freyer, Matthias Hollick, Jiska Classen:
AirTag of the Clones: Shenanigans with Liberated Item Finders. SP (Workshops) 2022: 301-311 - [c196]Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick:
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. SP 2022: 1229-1245 - [c195]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. USENIX Security Symposium 2022: 1343-1359 - [c194]Alexander Heinrich, Niklas Bittner, Matthias Hollick:
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. WISEC 2022: 26-38 - [c193]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. WISEC 2022: 146-156 - [c192]Lukas Burg, Max Granzow, Alexander Heinrich, Matthias Hollick:
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones. WISEC 2022: 277-279 - [i54]Luis F. Abanto-Leon, Arash Asadi, Gek Hong Sim, Andres Garcia-Saavedra, Matthias Hollick:
RadiOrchestra: Proactive Management of Millimeter-wave Self-backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control. CoRR abs/2201.10297 (2022) - [i53]Luis F. Abanto-Leon, Matthias Hollick, Bruno Clerckx, Gek Hong Sim:
Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions. CoRR abs/2201.10426 (2022) - [i52]Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen:
Very Pwnable Network: Cisco AnyConnect Security Analysis. CoRR abs/2202.05573 (2022) - [i51]Alexander Heinrich, Niklas Bittner, Matthias Hollick:
AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices. CoRR abs/2202.11813 (2022) - [i50]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones. CoRR abs/2205.06114 (2022) - [i49]Thomas Plagemann, Vera Goebel, Matthias Hollick, Boris Koldehofe:
Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things. CoRR abs/2210.16352 (2022) - 2021
- [j48]Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick:
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 157:1-157:24 (2021) - [j47]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. Proc. Priv. Enhancing Technol. 2021(3): 227-245 (2021) - [j46]Artur Sterz, Matthias Eichholz, Ragnar Mogk, Lars Baumgärtner, Pablo Graubner, Matthias Hollick, Mira Mezini, Bernd Freisleben:
ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices. Art Sci. Eng. Program. 5(2): 4 (2021) - [j45]Swetank Kumar Saha, Shivang Aggarwal, Hany Assasa, Adrian Loch, Naveen Muralidhar Prakash, Roshan Shyamsunder, Daniel Steinmetzer, Dimitrios Koutsonikolas, Joerg Widmer, Matthias Hollick:
Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware. IEEE Trans. Mob. Comput. 20(4): 1543-1557 (2021) - [c191]Max Maaß, Marc-Pascal Clement, Matthias Hollick:
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet. ARES 2021: 11:1-11:13 - [c190]Max Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick:
Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet. ARES 2021: 90:1-90:10 - [c189]Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen:
Very Pwnable Network: Cisco AnyConnect Security Analysis. CNS 2021: 56-64 - [c188]Steffen Haesler, Ragnar Mogk, Florentin Putz, Kevin T. Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michele Knodt, Matthias Hollick:
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods. CSCW Companion 2021: 62-66 - [c187]Hannah Brunner, Rainer Hofmann, Markus Schuß, Jakob Link, Matthias Hollick, Carlo Alberto Boano, Kay Römer:
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes. DCOSS 2021: 1-9 - [c186]Tobias Kröll, Stephan Kleber, Frank Kargl, Matthias Hollick, Jiska Classen:
ARIstoteles - Dissecting Apple's Baseband Interface. ESORICS (1) 2021: 133-151 - [c185]Florentin Putz, Steffen Schön, Matthias Hollick:
Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions. ETAA 2021: 17-32 - [c184]Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick:
FastZIP: faster and more secure zero-interaction pairing. MobiSys 2021: 440-452 - [c183]Lars Almon, Arno Manfred Krause, Oliver Fietze, Matthias Hollick:
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN. MobiWac 2021: 97-105 - [c182]Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. SIGMETRICS (Abstracts) 2021: 83-84 - [c181]Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker:
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support. USENIX Security Symposium 2021: 2489-2506 - [c180]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. USENIX Security Symposium 2021: 3577-3594 - [c179]Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick:
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. USENIX Security Symposium 2021: 3917-3934 - [c178]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
BEAMWAVE: Cross-Layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks. WiOpt 2021: 145-152 - [c177]Jiska Classen, Matthias Hollick:
Happy MitM: fun and toys in every bluetooth device. WISEC 2021: 72-77 - [c176]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. WISEC 2021: 371-373 - [c175]Alexander Heinrich, Milan Stute, Matthias Hollick:
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. WISEC 2021: 374-376 - [d21]Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick:
Index of Supplementary Files from "Next2You: Robust Copresence Detection Based on Channel State Information". Zenodo, 2021 - [d20]Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick:
Raw data from "Next2You: Robust Copresence Detection Based on Channel State Information". Zenodo, 2021 - [d19]Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick:
Evaluation results from "Next2You: Robust Copresence Detection Based on Channel State Information". Zenodo, 2021 - [d18]Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick:
Evaluation results from "FastZIP: Faster and More Secure Zero-Interaction Pairing". Zenodo, 2021 - [d17]Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick:
Raw data from "FastZIP: Faster and More Secure Zero-Interaction Pairing". Zenodo, 2021 - [d16]Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick:
Index of supplementary files from "FastZIP: Faster and More Secure Zero-Interaction Pairing". Zenodo, 2021 - [d15]Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick:
Myo Keylogging Dataset. Zenodo, 2021 - [d14]Max Maass, Marc-Pascal Clement, Matthias Hollick:
Supplementary Material for "Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet". Zenodo, 2021 - [i48]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. CoRR abs/2103.02282 (2021) - [i47]Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick:
FastZIP: Faster and More Secure Zero-Interaction Pairing. CoRR abs/2106.04907 (2021) - [i46]Max Maass, Marc-Pascal Clement, Matthias Hollick:
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet. CoRR abs/2106.08024 (2021) - [i45]Max Maass, Henning Pridöhl, Dominik Herrmann, Matthias Hollick:
Best Practices for Notification Studies for Security and Privacy Issues on the Internet. CoRR abs/2106.08029 (2021) - [i44]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
BEAMWAVE: Cross-Layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks. CoRR abs/2108.04313 (2021) - [i43]Jiska Classen, Matthias Hollick:
Happy MitM: Fun and Toys in Every Bluetooth Device. CoRR abs/2108.07190 (2021) - [i42]Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick:
Next2You: Robust Copresence Detection Based on Channel State Information. CoRR abs/2111.05224 (2021) - [i41]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs/2111.05313 (2021) - [i40]Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick:
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack. CoRR abs/2112.02382 (2021) - [i39]Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick:
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. CoRR abs/2112.05719 (2021) - [i38]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 481 (2021) - [i37]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 893 (2021) - 2020
- [j44]Milan Stute, Pranay Agarwal, Abhinav Kumar, Arash Asadi, Matthias Hollick:
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. IEEE Internet Things J. 7(8): 6802-6816 (2020) - [j43]Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 44:1-44:31 (2020) - [j42]Nikolaos Athanasios Anagnostopoulos, Saad Ahmad, Tolga Arul, Daniel Steinmetzer, Matthias Hollick, Stefan Katzenbeisser:
Low-cost Security for Next-generation IoT Networks. ACM Trans. Internet Techn. 20(3): 30:1-30:31 (2020) - [j41]Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer, Matthias Hollick:
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. IEEE/ACM Trans. Netw. 28(5): 2188-2202 (2020) - [c174]Nicolás Himmelmann, Dingwen Yuan, Lars Almon, Matthias Hollick:
Concurrent Wireless Cut-Through Forwarding: Ultra-Low Latency Multi-Hop Communication for the Internet of Things. DCOSS 2020: 77-85 - [c173]Michael Spörk, Jiska Classen, Carlo Alberto Boano, Matthias Hollick, Kay Römer:
Improving the Reliability of Bluetooth Low Energy Connections. EWSN 2020: 144-155 - [c172]Hannah Brunner, Rainer Hofmann, Markus Schuß, Jakob Link, Matthias Hollick, Carlo Alberto Boano, Kay Römer:
Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices. EWSN 2020: 176-177 - [c171]Jiska Classen, Michael Spörk, Carlo Alberto Boano, Kay Römer, Matthias Hollick:
Demo: Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices. EWSN 2020: 184-185 - [c170]Luis Fernando Abanto-Leon, Gek Hong (Allyson) Sim, Matthias Hollick, Amnart Boonkajay, Fumiyuki Adachi:
SWAN: Swarm-Based Low-Complexity Scheme for PAPR Reduction. GLOBECOM 2020: 1-7 - [c169]Kay Luis Wallaschek, Robin Klose, Lars Almon, Matthias Hollick:
NEAT-TCP: Generation of TCP Congestion Control through Neuroevolution of Augmenting Topologies. ICC Workshops 2020: 1-6 - [c168]Christian Reuter, Jasmin Haunschild, Matthias Hollick, Max Mühlhäuser, Joachim Vogt, Michael Kreutzer:
Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities. MuC (Workshopband) 2020 - [c167]Bastian Bloessl, Lars Baumgärtner, Matthias Hollick:
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio. WiNTECH 2020: 103-109 - [c166]Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. USENIX Security Symposium 2020: 19-36 - [c165]Dennis Heinze, Jiska Classen, Matthias Hollick:
ToothPicker: Apple Picking in the iOS Bluetooth Stack. WOOT @ USENIX Security Symposium 2020 - [c164]Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick:
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit. WOOT @ USENIX Security Symposium 2020 - [c163]Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick:
Firmware Insider: Bluetooth Randomness is Mostly Random. WOOT @ USENIX Security Symposium 2020 - [c162]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communications. WoWMoM 2020: 98-107 - [c161]Gek Hong Sim, Mahdi Mousavi, Lin Wang, Anja Klein, Matthias Hollick:
Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks. WoWMoM 2020: 127-136 - [d13]Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker:
Supplementary Material for "Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support". Zenodo, 2020 - [i36]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication. CoRR abs/2002.00699 (2020) - [i35]Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick:
Empirical Insights for Designing Information and Communication Technology for International Disaster Response. CoRR abs/2005.04910 (2020) - [i34]Jiska Classen, Matthias Hollick:
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips. CoRR abs/2005.14585 (2020) - [i33]Davide Toldo, Jiska Classen, Matthias Hollick:
DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework. CoRR abs/2005.14606 (2020) - [i32]Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. CoRR abs/2006.09809 (2020) - [i31]Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick:
Firmware Insider: Bluetooth Randomness is Mostly Random. CoRR abs/2006.16921 (2020) - [i30]Alexander Heinrich, Milan Stute, Matthias Hollick:
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. CoRR abs/2007.00349 (2020) - [i29]Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer, Matthias Hollick:
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. CoRR abs/2007.02621 (2020) - [i28]Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick:
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit. CoRR abs/2008.03913 (2020) - [i27]Luis Fernando Abanto-Leon, Gek Hong Sim, Matthias Hollick, Amnart Boonkajay, Fumiyuki Adachi:
SWAN: Swarm-Based Low-Complexity Scheme for PAPR Reduction. CoRR abs/2008.07600 (2020) - [i26]Artur Sterz, Matthias Eichholz, Ragnar Mogk, Lars Baumgärtner, Pablo Graubner, Matthias Hollick, Mira Mezini, Bernd Freisleben:
ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices. CoRR abs/2010.00354 (2020) - [i25]Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker:
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support. CoRR abs/2011.06260 (2020) - [i24]Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong Sim, Matthias Hollick, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. CoRR abs/2011.12644 (2020)
2010 – 2019
- 2019
- [j40]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Perils of Zero-Interaction Security in the Internet of Things. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1): 10:1-10:38 (2019) - [j39]Andrea Ortiz, Arash Asadi, Max Engelhardt, Anja Klein, Matthias Hollick:
CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems. IEEE J. Sel. Areas Commun. 37(10): 2225-2238 (2019) - [j38]Andrea Ortiz, Arash Asadi, Gek Hong Sim, Daniel Steinmetzer, Matthias Hollick:
SCAROS: A Scalable and Robust Self-Backhauling Solution for Highly Dynamic Millimeter-Wave Networks. IEEE J. Sel. Areas Commun. 37(12): 2685-2698 (2019) - [j37]Bastian Alt, Markus Weckesser, Christian Becker, Matthias Hollick, Sounak Kar, Anja Klein, Robin Klose, Roland Kluge, Heinz Koeppl, Boris Koldehofe, Wasiur R. KhudaBukhsh, Manisha Luthra, Mahdi Mousavi, Max Mühlhäuser, Martin Pfannemüller, Amr Rizk, Andy Schürr, Ralf Steinmetz:
Transitions: A Protocol-Independent View of the Future Internet. Proc. IEEE 107(4): 835-846 (2019) - [j36]Milan Stute, David Kreitschmann, Matthias Hollick:
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol. GetMobile Mob. Comput. Commun. 23(1): 30-33 (2019) - [j35]Mikhail Fomichev, Max Maass, Matthias Hollick:
Zero-Interaction Security-Towards Sound Experimental Validation. GetMobile Mob. Comput. Commun. 23(2): 16-21 (2019) - [j34]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing families of incremental topology control algorithms using graph transformation. Softw. Syst. Model. 18(1): 279-319 (2019) - [c160]Max Maass, Stephan Schwär, Matthias Hollick:
Towards Transparency in Email Tracking. APF 2019: 18-27 - [c159]Markus Schuß, Carlo Alberto Boano, Manuel Weber, Matthias Schulz, Matthias Hollick, Kay Römer:
JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi Interference. EWSN 2019: 83-94 - [c158]Richard Meister, Jiska Classen, Muhammad Saad Saud, Marcos Katz, Matthias Hollick:
Practical VLC to WiFi Handover Mechanisms. EWSN 2019: 324-329 - [c157]Flor Álvarez, Lars Almon, Hauke Radtki, Matthias Hollick:
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh. GHTC 2019: 1-8 - [c156]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
Hybrid Precoding for Multi-Group Multicasting in mmWave Systems. GLOBECOM 2019: 1-7 - [c155]Robin Klose, Matthias Hollick:
Riding the Waves: Decoding Asynchronous Multi-User MISO via Time-Variant Zero-Forcing. GLOBECOM 2019: 1-6 - [c154]Lars Almon, Flor Álvarez, Laurenz Kamp, Matthias Hollick:
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments. LCN 2019: 389-397 - [c153]Francesco Gringoli, Matthias Schulz, Jakob Link, Matthias Hollick:
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets. WiNTECH 2019: 21-28 - [c152]Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick:
InternalBlue - Bluetooth Binary Patching and Experimentation Framework. MobiSys 2019: 79-90 - [c151]Flor Álvarez, Lars Almon, Ann-Sophie Hahn, Matthias Hollick:
Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept. SSR 2019: 1-12 - [c150]Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick:
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. USENIX Security Symposium 2019: 37-54 - [c149]Marc-André Kaufhold, Margarita Grinko, Christian Reuter, Marén Schorch, Amanda Langer, Sascha Skudelny, Matthias Hollick:
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland. Wirtschaftsinformatik 2019: 1054-1068 - [c148]Max Maass, Nicolas Walter, Dominik Herrmann, Matthias Hollick:
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market. Wirtschaftsinformatik 2019: 1307-1321 - [c147]Jiska Classen, Matthias Hollick:
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. WiSec 2019: 186-191 - [c146]Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick:
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem. WOOT @ USENIX Security Symposium 2019 - [d12]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Results for scheme by Shrestha et al. from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d11]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Results for scheme by Truong et al. from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d10]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Results for scheme by Miettinen et al. from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d9]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Results for scheme by Schürmann and Sigg from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d8]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Results for scheme by Karapanos et al. from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d7]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Processed data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d6]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Processed data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d5]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Processed data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d4]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Raw data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d3]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Raw data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d2]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Raw data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [d1]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Index of supplementary files from "Perils of Zero-Interaction Security in the Internet of Things". Zenodo, 2019 - [i23]Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick:
Perils of Zero-Interaction Security in the Internet of Things. CoRR abs/1901.07255 (2019) - [i22]Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick:
InternalBlue - Bluetooth Binary Patching and Experimentation Framework. CoRR abs/1905.00631 (2019) - [i21]Jiska Classen, Matthias Hollick:
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices. CoRR abs/1905.00634 (2019) - [i20]Gek Hong Sim, Mahdi Mousavi, Lin Wang, Anja Klein, Matthias Hollick:
Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks. CoRR abs/1907.13085 (2019) - [i19]Luis Fernando Abanto-Leon, Matthias Hollick, Gek Hong Sim:
Hybrid Precoding for Multi-Group Multicasting in mmWave Systems. CoRR abs/1908.02678 (2019) - [i18]Flor Álvarez, Lars Almon, Hauke Radtki, Matthias Hollick:
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh. CoRR abs/1909.08094 (2019) - [i17]Mikhail Fomichev, Max Maass, Matthias Hollick:
Zero-Interaction Security - Towards Sound Experimental Validation. CoRR abs/1911.07486 (2019) - 2018
- [j33]Matthias Schulz, Daniel Wegemer, Matthias Hollick:
The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices. Comput. Commun. 129: 269-285 (2018) - [j32]Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick:
Survey and Systematization of Secure Device Pairing. IEEE Commun. Surv. Tutorials 20(1): 517-550 (2018) - [j31]Jiska Classen, Daniel Wegemer, Paul Patras, Tom Spink, Matthias Hollick:
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 5:1-5:24 (2018) - [j30]Gek Hong Sim, Sabrina Klos, Arash Asadi, Anja Klein, Matthias Hollick:
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications. IEEE/ACM Trans. Netw. 26(6): 2487-2500 (2018) - [c145]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CNS 2018: 1-9 - [c144]Francesco Gringoli, Robin Klose, Matthias Hollick, Nahla M. Ali:
Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions. ICC Workshops 2018: 1-6 - [c143]Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer, Matthias Hollick:
Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. INFOCOM 2018: 1205-1213 - [c142]Arash Asadi, Sabrina Müller, Gek Hong Sim, Anja Klein, Matthias Hollick:
FML: Fast Machine Learning for 5G mmWave Vehicular Communications. INFOCOM 2018: 1961-1969 - [c141]Flor Álvarez, Max Kolhagen, Matthias Hollick:
Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark. LCN 2018: 124-132 - [c140]Flor Álvarez, Lars Almon, Patrick Lieser, Tobias Meuser, Yannick Dylla, Björn Richerzhagen, Matthias Hollick, Ralf Steinmetz:
Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response. CHANTS@MOBICOM 2018: 3-10 - [c139]Daniel Steinmetzer, Saad Ahmad, Nikolaos A. Anagnostopoulos, Matthias Hollick, Stefan Katzenbeisser:
Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks. mmNets 2018: 3-8 - [c138]Joan Palacios, Daniel Steinmetzer, Adrian Loch, Matthias Hollick, Joerg Widmer:
Demo: Channel Estimation and Custom Beamforming on the 60 GHz TP-Link Talon AD7200 Router. WiNTECH 2018: 28-29 - [c137]Daniel Steinmetzer, Milan Stute, Matthias Hollick:
TPy: A Lightweight Framework for Agile Distributed Network Experiments. WiNTECH 2018: 38-45 - [c136]Joan Palacios, Daniel Steinmetzer, Adrian Loch, Matthias Hollick, Joerg Widmer:
Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices. MobiCom 2018: 241-255 - [c135]Milan Stute, David Kreitschmann, Matthias Hollick:
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. MobiCom 2018: 529-543 - [c134]Milan Stute, David Kreitschmann, Matthias Hollick:
Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. MobiCom 2018: 820-822 - [c133]Matthias Schulz, Jakob Link, Francesco Gringoli, Matthias Hollick:
Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi. MobiSys 2018: 256-268 - [c132]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing families of incremental topology control algorithms using graph transformation. Software Engineering 2018: 109-110 - [c131]Swetank Kumar Saha, Hany Assasa, Adrian Loch, Naveen Muralidhar Prakash, Roshan Shyamsunder, Shivang Aggarwal, Daniel Steinmetzer, Dimitrios Koutsonikolas, Joerg Widmer, Matthias Hollick:
Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware. SECON 2018: 244-252 - [c130]Daniel Steinmetzer, Yimin Yuan, Matthias Hollick:
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks. WISEC 2018: 12-22 - [i16]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A Systematic Approach to Constructing Incremental Topology Control Algorithms Using Graph Transformation. CoRR abs/1805.03386 (2018) - [i15]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A Systematic Approach to Constructing Families of Incremental Topology Control Algorithms Using Graph Transformation. CoRR abs/1805.05026 (2018) - [i14]Milan Stute, David Kreitschmann, Matthias Hollick:
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. CoRR abs/1808.03156 (2018) - [i13]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CoRR abs/1808.04581 (2018) - [i12]Flor Álvarez, Max Kolhagen, Matthias Hollick:
Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark. CoRR abs/1808.04671 (2018) - [i11]Flor Álvarez, Paul Gardner-Stephen, Matthias Hollick:
Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises. CoRR abs/1808.04683 (2018) - [i10]Flor Álvarez, Lars Almon, Patrick Lieser, Tobias Meuser, Yannick Dylla, Björn Richerzhagen, Matthias Hollick, Ralf Steinmetz:
Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response. CoRR abs/1808.04684 (2018) - [i9]Max Maass, Nicolas Walter, Dominik Herrmann, Matthias Hollick:
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market. CoRR abs/1811.12775 (2018) - [i8]Milan Stute, David Kreitschmann, Matthias Hollick:
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. CoRR abs/1812.06743 (2018) - 2017
- [j29]Matthias Hollick, Cristina Nita-Rotaru, Panagiotis Papadimitratos, Adrian Perrig, Stefan Schmid:
Toward a Taxonomy and Attacker Model for Secure Routing Protocols. Comput. Commun. Rev. 47(1): 43-48 (2017) - [j28]Dingwen Yuan, Salil S. Kanhere, Matthias Hollick:
Instrumenting Wireless Sensor Networks - A survey on the metrics that matter. Pervasive Mob. Comput. 37: 45-62 (2017) - [j27]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing incremental topology control algorithms using graph transformation. J. Vis. Lang. Comput. 38: 47-83 (2017) - [c129]Adrian Loch, Arash Asadi, Gek Hong Sim, Jörg Widmer, Matthias Hollick:
mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training. COMSNETS 2017: 1-8 - [c128]Gek Hong Sim, Arash Asadi, Adrian Loch, Matthias Hollick, Jörg Widmer:
Opp-relay: Managing directionality and mobility issues of millimeter-wave via D2D communication. COMSNETS 2017: 144-151 - [c127]Daniel Steinmetzer, Daniel Wegemer, Matthias Schulz, Joerg Widmer, Matthias Hollick:
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices. CoNEXT 2017: 414-425 - [c126]Lars Baumgärtner, Stefan Kohlbrecher, Juliane Euler, Tobias Ritter, Milan Stute, Christian Meurisch, Max Mühlhäuser, Matthias Hollick, Oskar von Stryk, Bernd Freisleben:
Emergency communication in challenged environments via unmanned ground and aerial vehicles. GHTC 2017: 1-9 - [c125]Jeremy Lakeman, Matthew Lloyd, Romana Challans, Angus Wallace, Paul Gardner-Stephen, Milan Stute, Matthias Hollick:
A practical and secure social media facility for internet-deprived populations. GHTC 2017: 1-9 - [c124]Patrick Lieser, Flor Álvarez, Paul Gardner-Stephen, Matthias Hollick, Doreen Böhnstedt:
Architecture for responsive emergency communications networks. GHTC 2017: 1-9 - [c123]Pablo Graubner, Markus Sommer, Matthias Hollick, Bernd Freisleben:
Dynamic role assignment in Software-Defined Wireless Networks. ISCC 2017: 760-766 - [c122]Florian Kohnhäuser, Milan Stute, Lars Baumgärtner, Lars Almon, Stefan Katzenbeisser, Matthias Hollick, Bernd Freisleben:
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios. LCN 2017: 195-198 - [c121]Imdad Ullah, Babil Golam Sarwar, Roksana Boreli, Salil S. Kanhere, Stefan Katzenbeisser, Matthias Hollick:
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval. LCN 2017: 347-355 - [c120]Lars Almon, Michael Riecker, Matthias Hollick:
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited. LCN 2017: 444-452 - [c119]Jonas Hochst, Lars Baumgärtner, Matthias Hollick, Bernd Freisleben:
Unsupervised Traffic Flow Classification Using a Neural Autoencoder. LCN 2017: 523-526 - [c118]Daniel Steinmetzer, Adrian Loch, Amanda García-García, Joerg Widmer, Matthias Hollick:
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks. mmNets 2017: 29-34 - [c117]Matthias Schulz, Daniel Wegemer, Matthias Hollick:
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices. WiNTECH 2017: 59-66 - [c116]Matthias Schulz, Fabian Knapp, Efstathios Deligeorgopoulos, Daniel Wegemer, Francesco Gringoli, Matthias Hollick:
Demo: Nexmon in Action: Advanced Applications Powered by the Nexmon Firmware Patching Framework. WiNTECH 2017: 101-102 - [c115]Milan Stute, Max Maass, Tom Schons, Matthias Hollick:
Reverse Engineering Human Mobility in Large-scale Natural Disasters. MSWiM 2017: 219-226 - [c114]Milan Schmittner, Arash Asadi, Matthias Hollick:
SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks. Networking 2017: 1-9 - [c113]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [c112]Joe Chen, Daniel Steinmetzer, Jiska Classen, Edward W. Knightly, Matthias Hollick:
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain. WCNC 2017: 1-6 - [c111]Matthias Schulz, Francesco Gringoli, Daniel Steinmetzer, Michael Koch, Matthias Hollick:
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control. WISEC 2017: 111-121 - [c110]Matthias Schulz, Efstathios Deligeorgopoulos, Matthias Hollick, Francesco Gringoli:
Demonstrating reactive smartphone-based jamming: demo. WISEC 2017: 285-287 - [i7]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - [i6]Milan Schmittner, Max Maass, Tom Schons, Matthias Hollick:
Reverse Engineering Human Mobility in Large-scale Natural Disasters. CoRR abs/1708.02151 (2017) - [i5]Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick:
Survey and Systematization of Secure Device Pairing. CoRR abs/1709.02690 (2017) - [i4]Dingwen Yuan, Hsuan-Yin Lin, Joerg Widmer, Matthias Hollick:
Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. CoRR abs/1712.04059 (2017) - 2016
- [j26]Marius Senftleben, Ana Barroso, Mihai Bucicoiu, Matthias Hollick, Stefan Katzenbeisser, Erik Tews:
On the Privacy and Performance of Mobile Anonymous Microblogging. IEEE Trans. Inf. Forensics Secur. 11(7): 1578-1591 (2016) - [c109]Martin Pfeiffer, Jan-Pascal Kwiotek, Jiska Classen, Robin Klose, Matthias Hollick:
Analyzing TETRA Location Privacy and Network Availability. SPSM@CCS 2016: 117-122 - [c108]Dingwen Yuan, Matthias Hollick:
Competition: Sparkle: Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks. EWSN 2016: 295-296 - [c107]Flor Álvarez, Matthias Hollick, Paul Gardner-Stephen:
Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises. GHTC 2016: 62-70 - [c106]Daniel Steinmetzer, Jiska Classen, Matthias Hollick:
mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing. INFOCOM Workshops 2016: 429-434 - [c105]Daniel Steinmetzer, Jiska Classen, Matthias Hollick:
Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace. INFOCOM Workshops 2016: 1093-1094 - [c104]Jiska Classen, Daniel Steinmetzer, Matthias Hollick:
Opportunities and pitfalls in securing visible light communication on the physical layer. VLCS@MobiCom 2016: 19-24 - [c103]Marc Werner, Johannes Schwandke, Matthias Hollick, Oliver Hohlfeld, Torsten Zimmermann, Klaus Wehrle:
STEAN: A storage and transformation engine for advanced networking context. Networking 2016: 91-99 - [c102]Yao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou, Matthias Hollick:
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding. WISEC 2016: 21-30 - [c101]Matthias Schulz, Patrick Klapper, Matthias Hollick, Erik Tews, Stefan Katzenbeisser:
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. WISEC 2016: 43-48 - [c100]Matthias Schulz, Adrian Loch, Matthias Hollick:
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. WISEC 2016: 201-203 - [c99]Tobias Schultes, Markus Grau, Daniel Steinmetzer, Matthias Hollick:
DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices. WISEC 2016: 205-207 - [c98]Matthias Schulz, Daniel Wegemer, Matthias Hollick:
DEMO: Using NexMon, the C-based WiFi firmware modification framework. WISEC 2016: 213-215 - [c97]Milan Schmittner, Matthias Hollick:
Xcastor: Secure and scalable group communication in ad hoc networks. WoWMoM 2016: 1-6 - [e1]Matthias Hollick, Panos Papadimitratos, William Enck:
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016. ACM 2016, ISBN 978-1-4503-4270-4 [contents] - [i3]Matthias Schulz, Daniel Wegemer, Matthias Hollick:
NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode. CoRR abs/1601.07077 (2016) - 2015
- [j25]Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani, Matthias Hollick:
Lightweight energy consumption-based intrusion detection system for wireless sensor networks. Int. J. Inf. Sec. 14(2): 155-167 (2015) - [j24]Adrian Loch, Matthias Hollick, Alexander Kuehne, Anja Klein:
OFDMA for wireless multihop networks: From theory to practice. Pervasive Mob. Comput. 23: 104-121 (2015) - [j23]Yao Zheng, Matthias Schulz, Wenjing Lou, Yiwei Thomas Hou, Matthias Hollick:
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security. IEEE Wirel. Commun. Lett. 4(1): 34-37 (2015) - [c96]Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. ACSAC 2015: 131-140 - [c95]Jiska Classen, Matthias Schulz, Matthias Hollick:
Practical covert channels for WiFi systems. CNS 2015: 209-217 - [c94]Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward W. Knightly, Matthias Hollick:
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves. CNS 2015: 335-343 - [c93]Fabian Hohmann, Alexander Kuehne, Anja Klein, Adrian Loch, Matthias Hollick:
Corridor-based routing: Constructing and maintaining stable support-structures for wireless multihop transmissions. ISWCS 2015: 631-635 - [c92]Matthias Schulz, Denny Stohr, Stefan Wilk, Benedikt Rudolph, Wolfgang Effelsberg, Matthias Hollick:
APP and PHY in Harmony: A framework enabling flexible physical layer processing to address application requirements. NetSys 2015: 1-8 - [c91]Ana Barroso, Matthias Hollick:
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication. LCN 2015: 474-477 - [c90]Jiska Classen, Joe Chen, Daniel Steinmetzer, Matthias Hollick, Edward W. Knightly:
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications. VLCS@MobiCom 2015: 9-14 - [c89]Delphine Reinhardt, Franziska Engelmann, Matthias Hollick:
Can I Help You Setting Your Privacy? A Survey-based Exploration of Users' Attitudes towards Privacy Suggestions. MoMM 2015: 347-356 - [c88]Delphine Reinhardt, Franziska Engelmann, Andrey Moerov, Matthias Hollick:
Show me your phone, I will tell you who your friends are: analyzing smartphone data to identify social relationships. MUM 2015: 75-83 - [c87]Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann, Max Mühlhäuser:
A Distributed Reputation System for Certification Authority Trust Management. TrustCom/BigDataSE/ISPA (1) 2015: 1349-1356 - [c86]Daniel Steinmetzer, Matthias Schulz, Matthias Hollick:
Lockpicking physical layer key exchange: weak adversary models invite the thief. WISEC 2015: 1:1-1:11 - [c85]Denny Stohr, Matthias Schulz, Matthias Hollick, Wolfgang Effelsberg:
APP and PHY in harmony: Demonstrating scalable video streaming supported by flexible physical layer control. WOWMOM 2015: 1-3 - [c84]Dingwen Yuan, Matthias Hollick:
Ripple: High-throughput, reliable and energy-efficient network flooding in wireless sensor networks. WOWMOM 2015: 1-9 - [i2]Jiska Classen, Matthias Schulz, Matthias Hollick:
Practical Covert Channels for WiFi Systems. CoRR abs/1505.01081 (2015) - [i1]Amir Herzberg, Matthias Hollick, Adrian Perrig:
Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Reports 5(3): 28-40 (2015) - 2014
- [j22]Adrian Loch, Hannes Frey, Matthias Hollick:
Curve-based planar graph routing with guaranteed delivery in multihop wireless networks. Pervasive Mob. Comput. 11: 70-85 (2014) - [c83]Dingwen Yuan, Michael Riecker, Matthias Hollick:
Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-Low Latency Communication in Wireless Control Networks. EWSN 2014: 133-149 - [c82]Delphine Christin, Daniel Rodriguez Pons-Sorolla, Matthias Hollick, Salil S. Kanhere:
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications. ISSNIP 2014: 1-6 - [c81]Alexander Kuehne, Adrian Loch, Thomas Nitsche, Joerg Widmer, Matthias Hollick, Anja Klein:
BER enhancements for practical interference alignment in the frequency domain. ISWCS 2014: 44-48 - [c80]Adrian Loch, Matthias Hollick, Alexander Kühne, Anja Klein:
Practical OFDMA for corridor-based routing in Wireless Multihop Networks. LCN 2014: 1-9 - [c79]Adrian Loch, Wei-Chih Hong, Matthias Hollick:
Dynamic curve adaptation for geographic routing in Wireless Multihop Networks. LCN 2014: 37-45 - [c78]Michael Riecker, Daniel Thies, Matthias Hollick:
Measuring the impact of denial-of-service attacks on wireless sensor networks. LCN 2014: 296-304 - [c77]Rodrigo do Carmo, Justus Hoffmann, Volker Willert, Matthias Hollick:
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection. LCN 2014: 345-353 - [c76]Adrian Loch, Pablo Quesada, Matthias Hollick, Alexander Kuehne, Anja Klein:
Building Cross-Layer Corridors in Wireless Multihop Networks. MASS 2014: 425-433 - [c75]Michael Riecker, Dingwen Yuan, Rachid El Bansarkhani, Matthias Hollick:
Patrolling wireless sensor networks: randomized intrusion detection. Q2SWinet 2014: 61-69 - [c74]Michael Noisternig, Matthias Hollick:
Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks. MSWiM 2014: 177-185 - [c73]Matthias Schulz, Adrian Loch, Matthias Hollick:
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. NDSS 2014 - [c72]Adrian Loch, Matthias Schulz, Matthias Hollick:
Demo: WARP drive - accelerating wireless multi-hop cross-layer experimentation on SDRs. SRIF@SIGCOMM 2014: 31-36 - [c71]Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz, Matthias Hollick:
Short paper: gathering tamper evidence in wi-fi networks based on channel state information. WISEC 2014: 183-188 - [c70]Delphine Christin, Franziska Engelmann, Matthias Hollick:
Usable Privacy for Mobile Sensing Applications. WISTP 2014: 92-107 - [c69]Rodrigo do Carmo, Matthias Hollick:
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks. WONS 2014: 77-80 - [c68]Adrian Loch, Matthias Hollick, Alexander Kuehne, Anja Klein:
Corridor-based routing: Opening doors to PHY-layer advances for Wireless Multihop Networks. WoWMoM 2014: 1-3 - [c67]Adrian Loch, David Meier, Matthias Hollick:
How did you get here? PHY-layer path signatures. WoWMoM 2014: 1-3 - [c66]Adrian Loch, Thomas Nitsche, Alexander Kuehne, Matthias Hollick, Joerg Widmer, Anja Klein:
Practical Interference alignment in the frequency domain for OFDM-based wireless access networks. WoWMoM 2014: 1-9 - 2013
- [j21]Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer:
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Inf. Secur. Tech. Rep. 17(3): 105-116 (2013) - [j20]Delphine Christin, Christian Roßkopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere:
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications. Pervasive Mob. Comput. 9(3): 353-371 (2013) - [j19]Delphine Christin, Christian Roßkopf, Matthias Hollick:
uSafe: A privacy-aware and participative mobile application for citizen safety in urban environments. Pervasive Mob. Comput. 9(5): 695-707 (2013) - [c65]Adrian Loch, Matthias Hollick:
Face the Enemy: Attack Detection for Planar Graph Routing. NetSys 2013: 76-83 - [c64]Dingwen Yuan, Matthias Hollick:
Let's talk together: Understanding concurrent transmission in wireless sensor networks. LCN 2013: 219-227 - [c63]Delphine Christin, Andreas Reinhardt, Matthias Hollick:
On the efficiency of privacy-preserving path hiding for mobile sensing applications. LCN 2013: 818-826 - [c62]Delphine Christin, Martin Michalak, Matthias Hollick:
Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings. MoMM 2013: 445 - [c61]Michael Riecker, Sebastian Biedermann, Matthias Hollick:
Lightweight energy consumption based intrusion detection system for wireless sensor networks. SAC 2013: 1784-1791 - [c60]Robin Klose, Adrian Loch, Matthias Hollick:
A rapid prototyping framework for practical OFDMA systems using Software Defined Radios. SECON 2013: 433-441 - [c59]Robin Klose, Adrian Loch, Matthias Hollick:
Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs. SRIF@SIGCOMM 2013: 17-24 - [c58]Thomas Nitsche, Jörg Widmer, Adrian Loch, Matthias Hollick:
EVM and RSSI link quality measurements in frequency selective fading channels. SPAWC 2013: 525-529 - [c57]Adrian Loch, Matthias Hollick, Thomas Nitsche, Jörg Widmer, Alexander Kühne, Anja Klein:
CSI feedback in OFDMA wireless networks with multiple transmitter-receiver pairs. SPAWC 2013: 530-534 - [c56]Alexander Kuehne, Adrian Loch, Matthias Hollick, Anja Klein:
Node selection for corridor-based routing in OFDMA multihop networks. WCNC 2013: 2040-2045 - [c55]Adrian Loch, Robin Klose, Matthias Hollick, Alexander Kuehne, Anja Klein:
Practical OFDMA in wireless networks with multiple transmitter-receiver pairs. WOWMOM 2013: 1-3 - [c54]Marc Werner, Jörg Kaiser, Matthias Hollick, Elias Weingärtner, Klaus Wehrle:
A blueprint for switching between secure routing protocols in wireless multihop networks. WOWMOM 2013: 1-6 - [c53]Alexander Kuehne, Adrian Loch, Matthias Hollick, Anja Klein:
Spatial reuse in OFDMA multi-hop networks applying corridor-based routing. WSA 2013: 1-6 - [p1]Delphine Christin, Matthias Hollick:
Roadmap for Privacy Protection in Mobile Sensing Applications. European Data Protection 2013: 203-222 - 2012
- [j18]Andres Garcia-Saavedra, Pablo Serrano, Albert Banchs, Matthias Hollick:
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs. Pervasive Mob. Comput. 8(5): 631-645 (2012) - [c52]Stanislaus Stelle, Mark Manulis, Matthias Hollick:
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. ARES 2012: 28-37 - [c51]Michael Riecker, Ana Barroso, Matthias Hollick, Sebastian Biedermann:
On Data-Centric Intrusion Detection in Wireless Sensor Networks. GreenCom 2012: 325-334 - [c50]Andreas Reinhardt, P. Baumann, Daniel Burgstahler, Matthias Hollick, H. Chonov, Marc Werner, Ralf Steinmetz:
On the accuracy of appliance identification based on distributed load metering data. SustainIT 2012: 1-9 - [c49]Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick:
A secure monitoring and control system for Wireless Sensor Networks. LCN 2012: 164-167 - [c48]Andreas Reinhardt, Daniel Seither, André König, Ralf Steinmetz, Matthias Hollick:
Protecting IEEE 802.11s wireless mesh networks against insider attacks. LCN 2012: 224-227 - [c47]Dingwen Yuan, Michael Riecker, Matthias Hollick:
HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks. LCN 2012: 635-642 - [c46]Rodrigo do Carmo, Marc Werner, Matthias Hollick:
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks. Q2SWinet 2012: 47-54 - [c45]Delphine Christin, Andreas Reinhardt, Matthias Hollick, Kai Trumpold:
Exploring user preferences for privacy interfaces in mobile sensing applications. MUM 2012: 14 - [c44]Delphine Christin, Christian Rosskopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere:
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications. PerCom 2012: 135-143 - [c43]Alexander Kuehne, Anja Klein, Adrian Loch, Matthias Hollick:
Corridor-based routing using opportunistic forwarding in OFDMA multihop networks. PIMRC 2012: 1330-1335 - [c42]Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer:
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. WISTP 2012: 71-86 - [c41]Hannes Frey, Matthias Hollick, Adrian Loch:
Curve-based planar graph routing with guaranteed delivery in multihop wireless networks. WOWMOM 2012: 1-9 - [c40]Dingwen Yuan, Matthias Hollick:
Tree-based multi-channel convergecast in Wireless Sensor Networks. WOWMOM 2012: 1-9 - [c39]Zhiliang Chen, Alexander Kühne, Anja Klein, Adrian Loch, Matthias Hollick, Jörg Widmer:
Two-way relaying for multiple applications in wireless sensor networks. WSA 2012: 318-324 - 2011
- [j17]Delphine Christin, Andreas Reinhardt, Salil S. Kanhere, Matthias Hollick:
A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 84(11): 1928-1946 (2011) - [j16]Hakim Adhari, Matthias Hollick, Erwin P. Rathgeb:
Neue Herausforderungen in der Netzsicherheit. Prax. Inf.verarb. Kommun. 34(4): 165-167 (2011) - [j15]Daniel Seither, André König, Matthias Hollick:
Bedrohungsanalyse des IEEE 802.11s Standards für drahtlose Mesh-Netze und ausgewählte Sicherheitsmechanismen zur Bedrohungsabwehr. Prax. Inf.verarb. Kommun. 34(4): 203-208 (2011) - [j14]Parag S. Mogre, Nico d'Heureuse, Matthias Hollick, Ralf Steinmetz:
CORE: centrally optimized routing extensions for efficient bandwidth management and network coding in the IEEE 802.16 MeSH mode. Wirel. Commun. Mob. Comput. 11(3): 338-356 (2011) - [j13]Parag S. Mogre, Kalman Graffi, Matthias Hollick, Ralf Steinmetz:
A security framework for wireless mesh networks. Wirel. Commun. Mob. Comput. 11(3): 371-391 (2011) - [c38]Daniel Seither, André König, Matthias Hollick:
Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced. LCN 2011: 897-904 - [c37]Hannes Frey, Matthias Hollick, Adrian Loch:
Curve-Based Planar Graph Routing in Multihop Wireless Networks. MASS 2011: 149-151 - [c36]Delphine Christin, Julien Guillemet, Andreas Reinhardt, Matthias Hollick, Salil S. Kanhere:
Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications. MASS 2011: 341-350 - [c35]Andres Garcia-Saavedra, Pablo Serrano, Albert Banchs, Matthias Hollick:
Energy-efficient fair channel access for IEEE 802.11 WLANs. WOWMOM 2011: 1-9 - 2010
- [j12]Delphine Christin, Parag S. Mogre, Matthias Hollick:
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives. Future Internet 2(2): 96-125 (2010) - [j11]Pablo Serrano, Matthias Hollick, Albert Banchs:
On the trade-off between throughput maximization and energy consumption minimization in IEEE 802.11 WLANs. J. Commun. Networks 12(2): 150-157 (2010) - [j10]Matthias Hollick:
Vorstellung "neuer" KUVS-naher Fachgebiete. Fachgebiet Sichere Mobile Netze, Fachbereich Informatik, Technische Universität Darmstadt. Prax. Inf.verarb. Kommun. 33(3): 239-240 (2010) - [c34]Andreas Reinhardt, Delphine Christin, Matthias Hollick, Johannes Schmitt, Parag S. Mogre, Ralf Steinmetz:
Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks. EWSN 2010: 33-48 - [c33]Delphine Christin, Matthias Hollick, Mark Manulis:
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks. ICCCN 2010: 1-6 - [c32]Christian Gottron, Pedro Larbig, André König, Matthias Hollick, Ralf Steinmetz:
The rise and fall of the AODV protocol: A testbed study on practical routing attacks. LCN 2010: 316-319
2000 – 2009
- 2009
- [j9]André König, Matthias Hollick, Tronje Krop, Ralf Steinmetz:
GeoSec: quarantine zones for mobile ad hoc networks. Secur. Commun. Networks 2(3): 271-288 (2009) - [c31]André König, Daniel Seither, Ralf Steinmetz, Matthias Hollick:
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks. GLOBECOM 2009: 1-6 - [c30]André König, Matthias Hollick, Ralf Steinmetz:
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems. ICC 2009: 1-5 - [c29]André König, Matthias Hollick, Ralf Steinmetz:
On the Implications of Adaptive Transmission Power for Assisting MANET Security. ICDCS Workshops 2009: 537-544 - [c28]Parag S. Mogre, Matthias Hollick, Ralf Steinmetz, V. Dadia, S. Sengupta:
Distributed bandwidth reservation strategies to support efficient bandwidth utilization and QoS on a per-link basis in IEEE 802.16 Mesh Networks. LCN 2009: 301-304 - [c27]Parag S. Mogre, Matthias Hollick, Stefan Dimitrov, Ralf Steinmetz:
Incorporating spatial reuse into algorithms for bandwidth management and scheduling in IEEE 802.16j relay networks. LCN 2009: 384-391 - [c26]Andreas Reinhardt, Delphine Christin, Matthias Hollick, Ralf Steinmetz:
On the energy efficiency of lossless data compression in wireless sensor networks. LCN 2009: 873-880 - [c25]Pablo Serrano, Albert Banchs, Luca Vollero, Matthias Hollick:
Throughput and Energy Efficiency in IEEE 802.11 WLANs: Friends or Foes?. QSHINE 2009: 451-462 - [c24]Parag S. Mogre, Matthias Hollick, Jesús Díaz Gandía, Ralf Steinmetz:
A Proportionally Fair Centralized Scheduler Supporting Spatial Minislot Reuse for IEEE 802.16 Mesh Networks. QSHINE 2009: 556-566 - [c23]Andreas Reinhardt, Matthias Hollick, Ralf Steinmetz:
Stream-oriented Lossless Packet Compression in Wireless Sensor Networks. SECON 2009: 1-9 - [c22]Christian Gottron, André König, Matthias Hollick, Sonja Bergsträßer, Tomas Hildebrandt, Ralf Steinmetz:
Quality of experience of voice communication in large-scale mobile ad hoc networks. Wireless Days 2009: 1-6 - 2008
- [j8]Johannes Schmitt, Matthias Hollick, Christoph Roos, Ralf Steinmetz:
Adapting the User Context in Realtime: Tailoring Online Machine Learning Algorithms to Ambient Computing. Mob. Networks Appl. 13(6): 583-598 (2008) - [j7]Matthias Hollick, Hermann de Meer, Jens B. Schmitt, Patrick Wüchner:
Modeling of Self-Organizing Systems. Prax. Inf.verarb. Kommun. 31(1): 2-3 (2008) - [c21]Parag S. Mogre, Nico d'Heureuse, Matthias Hollick, Ralf Steinmetz:
CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode. LCN 2008: 58-65 - [c20]Andreas Reinhardt, Matthias Kropff, Matthias Hollick, Ralf Steinmetz:
Designing a sensor network testbed for smart heterogeneous applications. LCN 2008: 715-722 - [c19]André König, Christian Gottron, Matthias Hollick, Ralf Steinmetz:
Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes. MASS 2008: 886-891 - [c18]Long H. Vu, Klara Nahrstedt, Matthias Hollick:
Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks. MobiQuitous 2008 - 2007
- [j6]Johannes Schmitt, Matthias Hollick, Ralf Steinmetz:
Der Assistent im Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer. Prax. Inf.verarb. Kommun. 30(2): 100-105 (2007) - [j5]Georg Carle, Jürgen Quittek, Matthias Hollick, Ralf Steinmetz:
Internet-Telefonie - Voice over IP. Prax. Inf.verarb. Kommun. 30(4): 182-183 (2007) - [j4]Johannes Schmitt, Thomas Hecker, Matthias Hollick, Ralf Steinmetz:
Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation. Prax. Inf.verarb. Kommun. 30(4): 191-198 (2007) - [c17]Kalman Graffi, Parag S. Mogre, Matthias Hollick, Ralf Steinmetz:
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks. GLOBECOM 2007: 5097-5101 - [c16]Matthias Hollick, Parag S. Mogre, Christian Schott, Ralf Steinmetz:
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16. IWQoS 2007: 126-134 - [c15]Parag S. Mogre, Kalman Graffi, Matthias Hollick, Ralf Steinmetz:
AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. LCN 2007: 539-547 - [c14]Parag S. Mogre, Nico d'Heureuse, Matthias Hollick, Ralf Steinmetz:
A Case for Joint Routing, Scheduling, and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach. MASS 2007: 1-3 - [c13]Tronje Krop, Michael Bredel, Matthias Hollick, Ralf Steinmetz:
JiST/MobNet: combined simulation, emulation, and real-world testbed for ad hoc networks. WiNTECH 2007: 27-34 - 2006
- [j3]Xavier Masip-Bruin, Marcelo Yannuzzi, Jordi Domingo-Pascual, Alexandre Fonte, Marília Curado, Edmundo Monteiro, Fernando A. Kuipers, Piet Van Mieghem, Stefano Avallone, Giorgio Ventre, Pedro A. Aranda-Gutiérrez, Matthias Hollick, Ralf Steinmetz, Luigi Iannone, Kavé Salamatian:
Research challenges in QoS routing. Comput. Commun. 29(5): 563-581 (2006) - [j2]Tronje Krop, Matthias Hollick, Frederik Krist, Parag S. Mogre, Ralf Steinmetz:
Modeling static and dynamic behavior of routes in mobile ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 10(4): 24-25 (2006) - [c12]Matthias Kropff, Tronje Krop, Matthias Hollick, Parag S. Mogre, Ralf Steinmetz:
A survey on realworld and emulation testbeds for mobile ad hoc networks. TRIDENTCOM 2006 - [c11]Christian Schwingenschlögl, Volker Dastis, Parag S. Mogre, Matthias Hollick, Ralf Steinmetz:
Performance Analysis of the Real-time Capabilities of Coordinated Centralized Scheduling in 802.16 Mesh Mode. VTC Spring 2006: 1241-1245 - 2005
- [b1]Matthias Hollick:
Dependable Routing for Cellular and Ad hoc Networks. TU Darmstadt, Germany, 2005 - [c10]Tronje Krop, Martin Kappes, Matthias Hollick:
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription. KiVS Kurzbeiträge und Workshop 2005: 207-210 - [c9]Matthias Hollick, Parag S. Mogre, Tronje Krop, Hans-Peter Huth, Jens B. Schmitt, Ralf Steinmetz:
M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks. LCN 2005: 366-373 - 2004
- [j1]Matthias Hollick, Tronje Krop, Jens B. Schmitt, Hans-Peter Huth, Ralf Steinmetz:
Modeling mobility and workload for wireless metropolitan area networks. Comput. Commun. 27(8): 751-761 (2004) - [c8]Matthias Hollick, Ivan Martinovic, Tronje Krop, Ivica Rimac:
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks. EUROMICRO 2004: 495-502 - [c7]Matthias Hollick, Jens B. Schmitt, Christian Seipl, Ralf Steinmetz:
On the effect of node misbehavior in ad hoc networks. ICC 2004: 3759-3763 - [c6]Matthias Hollick, Jens B. Schmitt, Christian Seipl, Ralf Steinmetz:
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process. WWIC 2004: 201-212 - 2003
- [c5]Jens B. Schmitt, Paul Hurley, Matthias Hollick, Ralf Steinmetz:
Per-flow guarantees under class-based priority queueing. GLOBECOM 2003: 4169-4174 - [c4]Matthias Hollick, Tronje Krop, Jens B. Schmitt, Hans-Peter Huth, Ralf Steinmetz:
Comparative Analysis of Quality of Service Routing in Wireless Metropolitan Area Networks. LCN 2003: 470-479 - 2001
- [c3]Matthias Hollick:
Secure Service Centered Networking for Nomadic Usage. Communications and Multimedia Security 2001 - [c2]Matthias Hollick, Wolf Rosenow, Thomas Bormuth, Ralf Steinmetz:
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000. DFN Arbeitstagung über Kommunikationsnetze 2001: 101-111 - [c1]Matthias Hollick:
Security awareness in service discovery for multimedia collaboration. MM&Sec 2001: 60-63
Coauthor Index
aka: Luis Fernando Abanto-Leon
aka: Alexander Kuehne
aka: Max Maass
aka: Delphine Christin
aka: Milan Schmittner
aka: Joerg Widmer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint