Options
Hogrefe, Dieter
Loading...
Preferred name
Hogrefe, Dieter
Official Name
Hogrefe, Dieter
Alternative Name
Hogrefe, D.
Hogrefe, D
Main Affiliation
Now showing 1 - 10 of 31
2005Journal Article [["dc.bibliographiccitation.firstpage","6"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","WIRTSCHAFTSINFORMATIK"],["dc.bibliographiccitation.lastpage","16"],["dc.bibliographiccitation.volume","47"],["dc.contributor.author","Hess, T."],["dc.contributor.author","Figge, S."],["dc.contributor.author","Hanekop, H."],["dc.contributor.author","Hochstatter, I."],["dc.contributor.author","Hogrefe, D."],["dc.contributor.author","Kaspar, C."],["dc.contributor.author","Rauscher, B."],["dc.contributor.author","Richter, M."],["dc.contributor.author","Riedel, A."],["dc.contributor.author","Zibull, M."],["dc.date.accessioned","2018-11-07T08:49:15Z"],["dc.date.available","2018-11-07T08:49:15Z"],["dc.date.issued","2005"],["dc.description.abstract","Mobile data communication applications, referred to in this paper as mobile applications, were one of the technological innovation and investment targets in recent years. From the past it became obvious that mono-disciplinary approaches to investigate mobile applications have shortcomings when it comes to successful innovation and investment decisions as interdepencies are insufficiently addressed. The paper therefore aims at structuring the scientific contributions of computer science, business economics and sociology in the context of mobile applications to approximate a holistic understanding comprising technological feasibility, economic opportunities and human needs."],["dc.identifier.isi","000227643900002"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/21413"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Vieweg"],["dc.relation.issn","0937-6429"],["dc.title","Mobile applications - An interdisciplinary challenge"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]Details WOS2006Journal Article [["dc.bibliographiccitation.firstpage","3416"],["dc.bibliographiccitation.issue","17"],["dc.bibliographiccitation.journal","Computer Networks"],["dc.bibliographiccitation.lastpage","3433"],["dc.bibliographiccitation.volume","50"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Tschofenig, Hannes"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2017-09-07T11:44:50Z"],["dc.date.available","2017-09-07T11:44:50Z"],["dc.date.issued","2006"],["dc.identifier.doi","10.1016/j.comnet.2006.01.006"],["dc.identifier.gro","3148992"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5631"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","1389-1286"],["dc.title","Beyond QoS signaling: A new generic IP signaling framework"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI2010Journal Article [["dc.bibliographiccitation.firstpage","1191"],["dc.bibliographiccitation.issue","10"],["dc.bibliographiccitation.journal","Computer Communications"],["dc.bibliographiccitation.lastpage","1201"],["dc.bibliographiccitation.volume","33"],["dc.contributor.author","Lei, Jun"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2017-09-07T11:44:55Z"],["dc.date.available","2017-09-07T11:44:55Z"],["dc.date.issued","2010"],["dc.identifier.doi","10.1016/j.comcom.2010.03.018"],["dc.identifier.gro","3149021"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5663"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","0140-3664"],["dc.title","D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI2018Journal Article [["dc.bibliographiccitation.firstpage","27629"],["dc.bibliographiccitation.journal","IEEE Access"],["dc.bibliographiccitation.lastpage","27636"],["dc.bibliographiccitation.volume","6"],["dc.contributor.author","Yuan, Yali"],["dc.contributor.author","Huo, Liuwei"],["dc.contributor.author","Wang, Zhixiao"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2020-12-10T18:26:13Z"],["dc.date.available","2020-12-10T18:26:13Z"],["dc.date.issued","2018"],["dc.identifier.doi","10.1109/ACCESS.2018.2836898"],["dc.identifier.eissn","2169-3536"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/75998"],["dc.notes.intern","DOI Import GROB-354"],["dc.title","Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2018Book Chapter [["dc.bibliographiccitation.firstpage","358"],["dc.bibliographiccitation.lastpage","374"],["dc.bibliographiccitation.volume","254"],["dc.contributor.author","Bochem, Arne"],["dc.contributor.author","Leiding, Benjamin"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.editor","Beyah, R."],["dc.contributor.editor","Chang, B."],["dc.contributor.editor","Li, Y."],["dc.contributor.editor","Zhu, S."],["dc.date.accessioned","2019-07-29T13:44:44Z"],["dc.date.available","2019-07-29T13:44:44Z"],["dc.date.issued","2018"],["dc.description.abstract","As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies."],["dc.identifier.doi","10.1007/978-3-030-01701-9_20"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62150"],["dc.language.iso","en"],["dc.publisher","Springer"],["dc.publisher.place","Cham"],["dc.relation.crisseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"],["dc.relation.isbn","978-3-030-01700-2"],["dc.relation.isbn","978-3-030-01701-9"],["dc.relation.ispartof","Security and Privacy in Communication Networks"],["dc.relation.ispartofseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;"],["dc.relation.issn","1867-8211"],["dc.relation.issn","1867-822X"],["dc.title","Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks"],["dc.type","book_chapter"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2005Conference Paper [["dc.bibliographiccitation.firstpage","289"],["dc.bibliographiccitation.lastpage","302"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.editor","Boutaba, Raouf"],["dc.date.accessioned","2018-11-07T08:44:12Z"],["dc.date.available","2018-11-07T08:44:12Z"],["dc.date.issued","2005"],["dc.description.abstract","Soft state provides new services to packet-switching networks by introducing a type of state in the network nodes which is refreshed by periodical messages and otherwise expires. The operations of soft state protocols, which are being designed with ever greater complexity, need to be error-free and deadlock-free to avoid misusing network resources. Thus, verification, formal analysis and validation of these protocols become a vital task. In this paper we utilize formal techniques, specifically, Specification and Description Language (SDL) and Message Sequence Charts (MSCs), for modeling, analysis and validation of various soft state protocols. We propose a general architecture for state management systems and find employing these techniques can help identify and correct possible design errors, which may be caused by informal specifications."],["dc.identifier.doi","10.1007/11422778_24"],["dc.identifier.isi","000230113900024"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/20146"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.notes.submitter","Najko"],["dc.publisher","Springer"],["dc.publisher.place","Berlin"],["dc.relation.conference","4th International IFIP-TC6 Networking Conference"],["dc.relation.doi","10.1007/b13609"],["dc.relation.eventend","2005-05-06"],["dc.relation.eventlocation","Waterloo, CANADA"],["dc.relation.eventstart","2005-05-02"],["dc.relation.isbn","3-540-25809-4"],["dc.relation.isbn","978-3-540-25809-4"],["dc.relation.ispartof","Networking 2005: Networking technologies, services, and protocols, performance of computer and communication networks, mobile and wireless communications systems"],["dc.relation.issn","0302-9743"],["dc.title","Modeling soft state protocols with SDL"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dspace.entity.type","Publication"]]Details DOI WOS2015Journal Article [["dc.bibliographiccitation.firstpage","19560"],["dc.bibliographiccitation.issue","8"],["dc.bibliographiccitation.journal","Sensors"],["dc.bibliographiccitation.lastpage","19582"],["dc.bibliographiccitation.volume","15"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Bochem, Arne"],["dc.contributor.author","Kellner, Ansgar"],["dc.contributor.author","Goege, Christian"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2018-11-07T09:53:38Z"],["dc.date.available","2018-11-07T09:53:38Z"],["dc.date.issued","2015"],["dc.description.abstract","Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes."],["dc.identifier.doi","10.3390/s150819560"],["dc.identifier.isi","000360906500089"],["dc.identifier.pmid","26266413"],["dc.identifier.purl","https://resolver.sub.uni-goettingen.de/purl?gs-1/12146"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/36367"],["dc.notes.intern","Merged from goescholar"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Mdpi Ag"],["dc.relation.issn","1424-8220"],["dc.rights","CC BY 4.0"],["dc.rights.uri","https://creativecommons.org/licenses/by/4.0/"],["dc.title","Secure and Authenticated Data Communication in Wireless Sensor Networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dc.type.version","published_version"],["dspace.entity.type","Publication"]]Details DOI PMID PMC WOS2010Journal Article [["dc.bibliographiccitation.firstpage","669"],["dc.bibliographiccitation.issue","3"],["dc.bibliographiccitation.journal","Wireless Personal Communications"],["dc.bibliographiccitation.lastpage","692"],["dc.bibliographiccitation.volume","52"],["dc.contributor.author","Le, Deguang"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2017-09-07T11:44:54Z"],["dc.date.available","2017-09-07T11:44:54Z"],["dc.date.issued","2010"],["dc.identifier.doi","10.1007/s11277-008-9624-9"],["dc.identifier.gro","3149010"],["dc.identifier.purl","https://resolver.sub.uni-goettingen.de/purl?goescholar/4048"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5651"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.intern","Merged from goescholar"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Springer Nature"],["dc.relation.issn","0929-6212"],["dc.rights","Goescholar"],["dc.rights.uri","https://goescholar.uni-goettingen.de/licenses"],["dc.title","A Cross-Layer Approach for Improving TCP Performance in Mobile Environments"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dc.type.version","published_version"],["dspace.entity.type","Publication"]]Details DOI2022Journal Article [["dc.bibliographiccitation.firstpage","15685"],["dc.bibliographiccitation.issue","17"],["dc.bibliographiccitation.journal","IEEE Internet of Things Journal"],["dc.bibliographiccitation.lastpage","15696"],["dc.bibliographiccitation.volume","9"],["dc.contributor.author","Yuan, Yachao"],["dc.contributor.author","Yuan, Yali"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Baker, Thar"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2022-10-04T10:22:13Z"],["dc.date.available","2022-10-04T10:22:13Z"],["dc.date.issued","2022"],["dc.identifier.doi","10.1109/JIOT.2022.3153271"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/114614"],["dc.notes.intern","DOI-Import GROB-600"],["dc.relation.eissn","2327-4662"],["dc.relation.eissn","2372-2541"],["dc.title","LbSP: Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2007Journal Article [["dc.bibliographiccitation.firstpage","401"],["dc.bibliographiccitation.issue","5"],["dc.bibliographiccitation.journal","Computers & Security"],["dc.bibliographiccitation.lastpage","409"],["dc.bibliographiccitation.volume","26"],["dc.contributor.author","Lei, Jun"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.author","Tan, Jianrong"],["dc.date.accessioned","2017-09-07T11:44:53Z"],["dc.date.available","2017-09-07T11:44:53Z"],["dc.date.issued","2007"],["dc.identifier.doi","10.1016/j.cose.2007.01.001"],["dc.identifier.gro","3149008"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5649"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","0167-4048"],["dc.title","Comparative studies on authentication and key exchange methods for 802.11 wireless LAN"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI