Jan Henrik Ziegeldorf
Jan Henrik Ziegeldorf
aedifion GmbH, formerly RWTH Aachen
Verified email at comsys.rwth-aachen.de - Homepage
Cited by
Cited by
Privacy in the Internet of Things: threats and challenges
JH Ziegeldorf, OG Morchon, K Wehrle
Security and Communication Networks 7 (12), 2728-2742, 2014
A quantitative analysis of the impact of arbitrary blockchain content on bitcoin
R Matzutt, J Hiller, M Henze, JH Ziegeldorf, D Müllmann, O Hohlfeld, ...
International Conference on Financial Cryptography and Data Security, 420-438, 2018
Towards viable certificate-based authentication for the internet of things
R Hummen, JH Ziegeldorf, H Shafagh, S Raza, K Wehrle
Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013
Coinparty: Secure multi-party mixing of bitcoins
JH Ziegeldorf, F Grossmann, M Henze, N Inden, K Wehrle
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Securing the IP-based internet of things with HIP and DTLS
O Garcia-Morchon, SL Keoh, S Kumar, P Moreno-Sanchez, F Vidal-Meca, ...
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Secure and anonymous decentralized Bitcoin mixing
JH Ziegeldorf, R Matzutt, M Henze, F Grossmann, K Wehrle
Future Generation Computer Systems 80, 448-466, 2018
Tailoring end-to-end IP security protocols to the Internet of Things
R Hummen, H Wirtz, JH Ziegeldorf, J Hiller, K Wehrle
2013 21st IEEE International Conference on Network Protocols (ICNP), 1-10, 2013
HIP security architecture for the IP-based internet of things
FV Meca, JH Ziegeldorf, PM Sanchez, OG Morchon, SS Kumar, SL Keoh
2013 27th International Conference on Advanced Information Networking and …, 2013
Thwarting unwanted blockchain content insertion
R Matzutt, M Henze, JH Ziegeldorf, J Hiller, K Wehrle
2018 IEEE International Conference on Cloud Engineering (IC2E), 364-370, 2018
BLOOM: BLoom filter based oblivious outsourced matchings
JH Ziegeldorf, J Pennekamp, D Hellmanns, F Schwinger, I Kunze, ...
BMC Medical Genomics 10 (2), 29-42, 2017
Cppl: Compact privacy policy language
M Henze, J Hiller, S Schmerling, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Like us on Facebook!–Analyzing user preferences regarding privacy settings in Germany
S Kowalewski, M Ziefle, H Ziegeldorf, K Wehrle
Procedia Manufacturing 3, 815-822, 2015
Poster: I don't want that content! on the risks of exploiting bitcoin's blockchain as a content store
R Matzutt, O Hohlfeld, M Henze, R Rawiel, JH Ziegeldorf, K Wehrle
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Network Security and Privacy for Cyber-Physical Systems
M Henze, J Hiller, R Hummen, R Matzutt, K Wehrle, JH Ziegeldorf
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and …, 2017
Comparison-based privacy: nudging privacy in social media (position paper)
JH Ziegeldorf, M Henze, R Hummen, K Wehrle
Data Privacy Management, and Security Assurance, 226-234, 2015
Practical data compliance for cloud storage
M Henze, R Matzutt, J Hiller, E Mühmer, JH Ziegeldorf, J Van Der Giet, ...
2017 IEEE international conference on cloud engineering (IC2E), 252-258, 2017
Poster: Privacy-preserving indoor localization
JH Ziegeldorf, N Viol, M Henze, K Wehrle
arXiv preprint arXiv:1410.3270, 2014
Cloudanalyzer: Uncovering the cloud usage of mobile apps
M Henze, J Pennekamp, D Hellmanns, E Mühmer, JH Ziegeldorf, ...
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
Choose wisely: a comparison of secure two-party computation frameworks
JH Ziegeldorf, J Metzke, M Henze, K Wehrle
2015 IEEE Security and Privacy Workshops, 198-205, 2015
myneData: Towards a trusted and user-controlled ecosystem for sharing personal data
R Matzutt, D Müllmann, EM Zeissig, C Horst, K Kasugai, S Lidynia, ...
INFORMATIK 2017, 2017
The system can't perform the operation now. Try again later.
Articles 1–20