default search action
Mathias Fischer 0001
Person information
- affiliation: University Hamburg, Department of Informatics, Germany
- affiliation: TU Darmstadt, CASED, Germany
- affiliation: TU Ilmenau, Germany
Other persons with the same name
- Mathias Fischer 0002 — ETH Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c76]Georg T. Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin:
SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ARES 2024: 144:1-144:9 - [c75]Majd Latah, Mathias Fischer:
DTN-Core: Towards a Framework for Designing and Operating Digital Twin Networks. CNSM 2024: 1-7 - [c74]Richard August See, Kevin Röbert, Mathias Fischer:
Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation. RAID 2024: 166-180 - [c73]Denise-Phi Khuu, Michael Sober, Dominik Kaaser, Mathias Fischer, Stefan Schulte:
Data Poisoning Detection in Federated Learning. SAC 2024: 1549-1558 - [c72]August See, Adrian Westphal, Cornelius Weber, Mathias Fischer:
Detecting Web Bots via Keystroke Dynamics. SEC 2024: 423-436 - [i18]Tatjana Wingarz, Anne Lauscher, Janick Edinger, Dominik Kaaser, Stefan Schulte, Mathias Fischer:
SoK: Towards Security and Safety of Edge AI. CoRR abs/2410.05349 (2024) - [i17]Jan Kadel, August See, Ritwik Sinha, Mathias Fischer:
BOTracle: A framework for Discriminating Bots and Humans. CoRR abs/2412.02266 (2024) - 2023
- [c71]Richard August See, Maximilian Gehring, Mathias Fischer, Shankar Karuppayah:
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. ACSAC 2023: 594-608 - [c70]Kevin Röbert, Heiko Bornholdt, Mathias Fischer, Janick Edinger:
Latency-Aware Scheduling for Real-Time Application Support in Edge Computing. EdgeSys@EuroSys 2023: 13-18 - [c69]Nurefsan Sertbas Bülbül, Mathias Fischer:
Preemptive DoS attacks on Time Sensitive Networks. GLOBECOM 2023: 4289-4294 - [c68]Heiko Bornholdt, Kevin Röbert, Mathias Fischer:
Low-Latency TLS 1.3-Aware Hole Punching. ICC 2023: 1481-1486 - [c67]Felix Welter, Florian Wilkens, Mathias Fischer:
Tell Me More: Black Box Explainability for APT Detection on System Provenance Graphs. ICC 2023: 3817-3823 - [c66]Doganalp Ergenc, Florian Schneider, Peter Kling, Mathias Fischer:
Moving Target Defense for Service-Oriented Mission-Critical Networks. ICCCN 2023: 1-10 - [c65]Doganalp Ergenç, Cornelia Brülhart, Mathias Fischer:
Towards Developing Resilient and Service-oriented Mission-critical Systems. NetSoft 2023: 317-319 - [c64]Nurefsan Sertbas Bülbül, Joshua Jannis Krüger, Mathias Fischer:
TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filtering. IFIP Networking 2023: 1-8 - [c63]Doganalp Ergenç, Robin Schenderlein, Mathias Fischer:
TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking. IFIP Networking 2023: 1-6 - [c62]Heiko Bornholdt, Kevin Röbert, Martin Breitbach, Mathias Fischer, Janick Edinger:
Measuring the Edge: A Performance Evaluation of Edge Offloading. PerCom Workshops 2023: 212-218 - [c61]August See, Tatjana Wingarz, Matz Radloff, Mathias Fischer:
Detecting Web Bots via Mouse Dynamics and Communication Metadata. SEC 2023: 73-86 - [c60]Sehrish Shafeeq, Mathias Fischer:
SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme. SECRYPT 2023: 369-376 - [e3]Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings. Lecture Notes in Computer Science 13959, Springer 2023, ISBN 978-3-031-35503-5 [contents] - [i16]Doganalp Ergenç, Florian Schneider, Peter Kling, Mathias Fischer:
Moving Target Defense for Service-oriented Mission-critical Networks. CoRR abs/2303.09893 (2023) - [i15]Doganalp Ergenç, Robin Schenderlein, Mathias Fischer:
TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking. CoRR abs/2303.11492 (2023) - [i14]Doganalp Ergenç, Cornelia Brülhart, Mathias Fischer:
Towards Developing Resilient and Service-oriented Mission-critical Systems. CoRR abs/2304.00128 (2023) - [i13]Doganalp Ergenç, Nurefsan Sertbas Bülbül, Lisa Maile, Anna Arestova, Mathias Fischer:
Towards Synthesizing Datasets for IEEE 802.1 Time-sensitive Networking. CoRR abs/2308.10255 (2023) - 2022
- [j14]Sanaz Afzali, Asanga Udugama, Anna Förster, Mathias Fischer:
On the Resilience of Opportunistic Networks against DoS Attacks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j13]Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Sehrish Shafeeq, Winfried Lamersdorf, Thomas C. Schmidt, Mathias Fischer:
Smart Urban Data Space for Citizen Science. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j12]Mathias Fischer, Winfried Lamersdorf:
Preface and Table of Contents. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j11]Mathias Fischer, Winfried Lamersdorf, Jörg Liebeherr, Max Mühlhäuser:
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems. ACM Trans. Internet Techn. 22(4): 93:1-93:3 (2022) - [c59]August See, Leon Fritz, Mathias Fischer:
Polymorphic Protocols at the Example of Mitigating Web Bots. ESORICS (3) 2022: 106-124 - [c58]Doganalp Ergenc, David Sorejevic, Mathias Fischer:
Distributed Bio-inspired Configuration of Virtualized Mission-critical Networks. GLOBECOM 2022: 988-993 - [c57]Nurefsan Sertbas Bülbül, Mathias Fischer:
Reinforcement Learning assisted Routing for Time Sensitive Networks. GLOBECOM 2022: 3863-3868 - [c56]Philip Gawehn, Doganalp Ergenc, Mathias Fischer:
Deep Learning-based Multi-PLC Anomaly Detection in Industrial Control Systems. GLOBECOM 2022: 4878-4884 - [c55]Tatjana Wingarz, Marta Gomez-Barrero, Christoph Busch, Mathias Fischer:
Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption. IWBF 2022: 1-6 - [c54]Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
Towards SDN-based Dynamic Path Reconfiguration for Time Sensitive Networking. NOMS 2022: 1-9 - [c53]Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer:
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. SEC 2022: 87-105 - 2021
- [j10]Doganalp Ergenç, Jacek Rak, Mathias Fischer:
Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks. IEEE Trans. Netw. Serv. Manag. 18(3): 2687-2701 (2021) - [c52]Pascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer:
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic. ARES 2021: 56:1-56:9 - [c51]Moritz Mönnich, Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
Mitigation of IPv6 Router Spoofing Attacks with P4. ANCS 2021: 144-150 - [c50]Florian Wilkens, Felix Ortmann, Steffen Haas, Matthias Vallentin, Mathias Fischer:
Multi-Stage Attack Detection via Kill Chain State Machines. CYSARM@CCS 2021: 13-24 - [c49]Christian Burkert, Johanna Ansohn McDougall, Hannes Federrath, Mathias Fischer:
Analysing Leakage during VPN Establishment in Public Wi-Fi Networks. ICC 2021: 1-6 - [c48]Doganalp Ergenç, Mathias Fischer:
Implementation and Orchestration of IEEE 802.1CB FRER in OMNeT++. ICC Workshops 2021: 1-6 - [c47]Doganalp Ergenç, Cornelia Brülhart, Jens Neumann, Leo Krüger, Mathias Fischer:
On the Security of IEEE 802.1 Time-Sensitive Networking. ICC Workshops 2021: 1-6 - [c46]Doganalp Ergenç, Mathias Fischer:
On the Reliability of IEEE 802.1CB FRER. INFOCOM 2021: 1-10 - [c45]Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
SDN-based Self-Configuration for Time-Sensitive IoT Networks. LCN 2021: 73-80 - [i12]Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
SDN-based Self-Configuration for Time-Sensitive IoT Networks. CoRR abs/2103.01282 (2021) - [i11]Florian Wilkens, Felix Ortmann, Steffen Haas, Matthias Vallentin, Mathias Fischer:
Multi-Stage Attack Detection via Kill Chain State Machines. CoRR abs/2103.14628 (2021) - [i10]Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer:
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. CoRR abs/2104.09828 (2021) - [i9]August See, Maximilian Gehring, Max Mühlhäuser, Mathias Fischer, Shankar Karuppayah:
Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons. CoRR abs/2109.04065 (2021) - 2020
- [j9]Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer:
Enhanced Performance and Privacy for TLS over TCP Fast Open. Proc. Priv. Enhancing Technol. 2020(2): 271-287 (2020) - [c44]Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:
Enhanced performance for the encrypted web through TLS resumption across hostnames. ARES 2020: 16:1-16:10 - [c43]Florian Wilkens, Mathias Fischer:
Towards Data-Driven Characterization of Brute-Force Attackers. CNS 2020: 1-9 - [c42]Doganalp Ergenc, Jacek Rak, Mathias Fischer:
Service-Based Resilience for Embedded IoT Networks. DSN 2020: 540-551 - [c41]Nurefsan Sertbas Bülbül, Mathias Fischer:
SDN/NFV-based DDoS Mitigation via Pushback. ICC 2020: 1-6 - [c40]David Jost, Mathias Fischer:
Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing. ICISSP 2020: 561-568 - [c39]Steffen Haas, Florian Wilkens, Mathias Fischer:
Scan Correlation - Revealing distributed scan campaigns. NOMS 2020: 1-6 - [c38]Steffen Haas, Robin Sommer, Mathias Fischer:
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. SEC 2020: 248-262 - [e2]Delphine Reinhardt, Hanno Langweg, Bernhard C. Witt, Mathias Fischer:
Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 17.-20. März 2020, Göttingen. LNI P-301, Gesellschaft für Informatik e.V. 2020, ISBN 978-3-88579-695-4 [contents] - [i8]Steffen Haas, Robin Sommer, Mathias Fischer:
zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. CoRR abs/2002.04547 (2020) - [i7]Steffen Haas, Florian Wilkens, Mathias Fischer:
Scan Correlation - Revealing distributed scan campaigns. CoRR abs/2003.05188 (2020) - [i6]Florian Wilkens, Samuel Botzler, Julia Curts, Skadi Dinter, Malte Hamann, Vincent Hubbe, Aleksandra Kornivetc, Nurefsan Sertbas Bülbül, Mathias Fischer:
Towards Flexible Security Testing of OT Devices. CoRR abs/2008.10538 (2020)
2010 – 2019
- 2019
- [j8]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
A QUIC Look at Web Tracking. Proc. Priv. Enhancing Technol. 2019(3): 255-266 (2019) - [c37]Florian Wilkens, Steffen Haas, Dominik Kaaser, Peter Kling, Mathias Fischer:
Towards Efficient Reconstruction of Attacker Lateral Movement. ARES 2019: 14:1-14:9 - [c36]Malte Hamann, Mathias Fischer:
Path-Based Optimization of NFV-Resource Allocation in SDN Networks. ICC 2019: 1-6 - [c35]Amr Osman, Pascal Bruckner, Hani Salah, Frank H. P. Fitzek, Thorsten Strufe, Mathias Fischer:
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures. ICC 2019: 1-7 - [c34]Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Dirk Bade, Winfried Lamersdorf, Thomas C. Schmidt, Mathias Fischer:
SANE: Smart Networks for Urban Citizen Participation. ICT 2019: 496-500 - [c33]Steffen Haas, Florian Wilkens, Mathias Fischer:
Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs. IPCCC 2019: 1-11 - [c32]Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer:
QUICker Connection Establishment with Out-Of-Band Validation Tokens. LCN 2019: 105-108 - [i5]Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:
Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames. CoRR abs/1902.02531 (2019) - [i4]Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer:
QUICker connection establishment with out-of-band validation tokens. CoRR abs/1904.06228 (2019) - [i3]Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer:
Enhanced Performance and Privacy for TLS over TCP Fast Open. CoRR abs/1905.03518 (2019) - [i2]Steffen Haas, Florian Wilkens, Mathias Fischer:
Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs. CoRR abs/1905.06685 (2019) - 2018
- [c31]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. ACSAC 2018: 289-299 - [c30]Jens Lindemann, Mathias Fischer:
A memory-deduplication side-channel attack to detect applications in co-resident virtual machines. SAC 2018: 183-192 - [c29]Steffen Haas, Mathias Fischer:
GAC: graph-based alert correlation for the detection of distributed multi-step attacks. SAC 2018: 979-988 - [c28]Jens Lindemann, Mathias Fischer:
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel. SEC 2018: 245-259 - [e1]Sebastian Doerr, Mathias Fischer, Sebastian Schrittwieser, Dominik Herrmann:
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. ACM 2018, ISBN 978-1-4503-6448-5 [contents] - [i1]Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. CoRR abs/1810.07304 (2018) - 2017
- [j7]Michael Stein, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser:
A Classification of Locality in Network Research. ACM Comput. Surv. 50(4): 53:1-53:37 (2017) - [j6]Mathias Fischer, Marcus Brunner, Ashutosh Dutta, Toktam Mahmoodi:
Guest Editorial Emerging Technologies in Software- Driven Communication. IEEE J. Sel. Areas Commun. 35(11): 2429-2430 (2017) - [c27]Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. ARES 2017: 34:1-34:6 - 2016
- [j5]Jörg Daubert, Mathias Fischer, Tim Grube, Stefan Schiffner, Panayotis Kikiras, Max Mühlhäuser:
AnonPubSub: Anonymous publish-subscribe overlays. Comput. Commun. 76: 42-53 (2016) - [c26]Niklas Büscher, Stefan Schiffner, Mathias Fischer:
Consumer Privacy on Distributed Energy Markets. APF 2016: 96-114 - [c25]Jörg Daubert, Tim Grube, Max Mühlhäuser, Mathias Fischer:
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks. CCNC 2016: 738-744 - [c24]Steffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
On the resilience of P2P-based botnet graphs. CNS 2016: 225-233 - [c23]Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, Max Mühlhäuser, Mathias Fischer:
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets. ICC 2016: 1-7 - [c22]Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer:
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. PST 2016: 317-324 - 2015
- [j4]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
Taxonomy and Survey of Collaborative Intrusion Detection. ACM Comput. Surv. 47(4): 55:1-55:33 (2015) - [c21]Leon Bock, Shankar Karuppayah, Tim Grube, Max Mühlhäuser, Mathias Fischer:
Hide and seek: Detecting sensors in P2P botnets. CNS 2015: 731-732 - [c20]Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer:
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. ICDCS 2015: 619-629 - [c19]Emmanouil Vasilomanolakis, Matthias Krugl, Carlos Garcia Cordero, Max Mühlhäuser, Mathias Fischer:
SkipMon: A locality-aware Collaborative Intrusion Detection System. IPCCC 2015: 1-8 - [c18]Jörg Daubert, Tim Grube, Max Mühlhäuser, Mathias Fischer:
Internal attacks in anonymous publish-subscribe P2P overlays. NetSys 2015: 1-8 - [c17]Giang Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. LCN 2015: 261-269 - [c16]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer:
Community-Based Collaborative Intrusion Detection. SecureComm 2015: 665-681 - 2014
- [j3]Mathias Fischer, Sascha Grau, Giang T. Nguyen, Guenter Schaefer:
Resilient and underlay-aware P2P live-streaming. Comput. Networks 59: 122-136 (2014) - [c15]Jörg Daubert, Leon Bock, Panayotis Kikiras, Max Mühlhäuser, Mathias Fischer:
Twitterize: Anonymous Micro-blogging. AICCSA 2014: 817-823 - [c14]Shankar Karuppayah, Mathias Fischer, Christian Rossow, Max Mühlhäuser:
On advanced monitoring in resilient and unstructured P2P botnets. ICC 2014: 871-877 - [c13]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
HosTaGe: a Mobile Honeypot for Collaborative Defense. SIN 2014: 330 - [c12]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks. SSS 2014: 33-47 - 2013
- [c11]Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer:
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices. SPSM@CCS 2013: 43-48 - [c10]Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser:
Distributed and Anonymous Publish-Subscribe. NSS 2013: 685-691 - [c9]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
OSSim: a generic simulation framework for overlay streaming. SummerSim 2013: 30 - 2012
- [b1]Mathias Fischer:
Construction of attack-resilient and efficient overlay topologies for large-scale P2P-based IPTV infrastructures. Technische Universität Ilmenau, Germany, Cuvillier 2012, ISBN 978-3-95404-208-1, pp. 1-217 - 2011
- [j2]Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer:
On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies. IEEE Trans. Dependable Secur. Comput. 8(2): 270-281 (2011) - [c8]Sascha Grau, Mathias Fischer, Guenter Schaefer:
On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies. ICDCS 2011: 121-130 - [c7]Mathias Fischer, Sascha Grau, Sebastian Kehr, Guenter Schaefer:
Attack-resilient and multiple-tree-based P2P-IPTV distribution. ICUMT 2011: 1-8 - [c6]Mathias Fischer, Sebastian Delling, Sascha Grau, Guenter Schaefer:
Underlay-robust application layer multicast. IPCCC 2011: 1-2 - [c5]Mathias Fischer, Michael Kissmann, Sascha Grau, Guenter Schaefer:
On virtualization-based network support for peer-assisted live-streaming applications. NOF 2011: 25-30 - 2010
- [c4]Markus Trapp, Mathias Fischer, Guenter Schaefer:
Mobility-aware peer-to-peer live-streaming. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [j1]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Günter Schäfer, Thorsten Strufe:
Methods for Improving Resilience in Communication Networks and P2P Overlays. Prax. Inf.verarb. Kommun. 32(1): 64-78 (2009) - [c3]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Guenter Schaefer:
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems. KiVS 2009: 193-204 - 2008
- [c2]Mathias Fischer, Frank-Uwe Andersen, Andreas Köpsel, Günter Schäfer, Morten Schläger:
A Distributed IP Mobility Approach for 3G SAE. PIMRC 2008: 1-6 - [c1]Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe:
A Key Management Solution for Overlay-Live-Streaming. SecureComm 2008
Coauthor Index
aka: Doganalp Ergenc
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint