Options
Hogrefe, Dieter
Loading...
Preferred name
Hogrefe, Dieter
Official Name
Hogrefe, Dieter
Alternative Name
Hogrefe, D.
Hogrefe, D
Main Affiliation
Now showing 1 - 10 of 28
2005Journal Article [["dc.bibliographiccitation.firstpage","6"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","WIRTSCHAFTSINFORMATIK"],["dc.bibliographiccitation.lastpage","16"],["dc.bibliographiccitation.volume","47"],["dc.contributor.author","Hess, T."],["dc.contributor.author","Figge, S."],["dc.contributor.author","Hanekop, H."],["dc.contributor.author","Hochstatter, I."],["dc.contributor.author","Hogrefe, D."],["dc.contributor.author","Kaspar, C."],["dc.contributor.author","Rauscher, B."],["dc.contributor.author","Richter, M."],["dc.contributor.author","Riedel, A."],["dc.contributor.author","Zibull, M."],["dc.date.accessioned","2018-11-07T08:49:15Z"],["dc.date.available","2018-11-07T08:49:15Z"],["dc.date.issued","2005"],["dc.description.abstract","Mobile data communication applications, referred to in this paper as mobile applications, were one of the technological innovation and investment targets in recent years. From the past it became obvious that mono-disciplinary approaches to investigate mobile applications have shortcomings when it comes to successful innovation and investment decisions as interdepencies are insufficiently addressed. The paper therefore aims at structuring the scientific contributions of computer science, business economics and sociology in the context of mobile applications to approximate a holistic understanding comprising technological feasibility, economic opportunities and human needs."],["dc.identifier.isi","000227643900002"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/21413"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Vieweg"],["dc.relation.issn","0937-6429"],["dc.title","Mobile applications - An interdisciplinary challenge"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]Details WOS2006Journal Article [["dc.bibliographiccitation.firstpage","3416"],["dc.bibliographiccitation.issue","17"],["dc.bibliographiccitation.journal","Computer Networks"],["dc.bibliographiccitation.lastpage","3433"],["dc.bibliographiccitation.volume","50"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Tschofenig, Hannes"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2017-09-07T11:44:50Z"],["dc.date.available","2017-09-07T11:44:50Z"],["dc.date.issued","2006"],["dc.identifier.doi","10.1016/j.comnet.2006.01.006"],["dc.identifier.gro","3148992"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5631"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","1389-1286"],["dc.title","Beyond QoS signaling: A new generic IP signaling framework"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI2010Journal Article [["dc.bibliographiccitation.firstpage","1191"],["dc.bibliographiccitation.issue","10"],["dc.bibliographiccitation.journal","Computer Communications"],["dc.bibliographiccitation.lastpage","1201"],["dc.bibliographiccitation.volume","33"],["dc.contributor.author","Lei, Jun"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2017-09-07T11:44:55Z"],["dc.date.available","2017-09-07T11:44:55Z"],["dc.date.issued","2010"],["dc.identifier.doi","10.1016/j.comcom.2010.03.018"],["dc.identifier.gro","3149021"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5663"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","0140-3664"],["dc.title","D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI2018Journal Article [["dc.bibliographiccitation.firstpage","27629"],["dc.bibliographiccitation.journal","IEEE Access"],["dc.bibliographiccitation.lastpage","27636"],["dc.bibliographiccitation.volume","6"],["dc.contributor.author","Yuan, Yali"],["dc.contributor.author","Huo, Liuwei"],["dc.contributor.author","Wang, Zhixiao"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2020-12-10T18:26:13Z"],["dc.date.available","2020-12-10T18:26:13Z"],["dc.date.issued","2018"],["dc.identifier.doi","10.1109/ACCESS.2018.2836898"],["dc.identifier.eissn","2169-3536"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/75998"],["dc.notes.intern","DOI Import GROB-354"],["dc.title","Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2018Book Chapter [["dc.bibliographiccitation.firstpage","358"],["dc.bibliographiccitation.lastpage","374"],["dc.bibliographiccitation.volume","254"],["dc.contributor.author","Bochem, Arne"],["dc.contributor.author","Leiding, Benjamin"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.editor","Beyah, R."],["dc.contributor.editor","Chang, B."],["dc.contributor.editor","Li, Y."],["dc.contributor.editor","Zhu, S."],["dc.date.accessioned","2019-07-29T13:44:44Z"],["dc.date.available","2019-07-29T13:44:44Z"],["dc.date.issued","2018"],["dc.description.abstract","As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies."],["dc.identifier.doi","10.1007/978-3-030-01701-9_20"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62150"],["dc.language.iso","en"],["dc.publisher","Springer"],["dc.publisher.place","Cham"],["dc.relation.crisseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"],["dc.relation.isbn","978-3-030-01700-2"],["dc.relation.isbn","978-3-030-01701-9"],["dc.relation.ispartof","Security and Privacy in Communication Networks"],["dc.relation.ispartofseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;"],["dc.relation.issn","1867-8211"],["dc.relation.issn","1867-822X"],["dc.title","Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks"],["dc.type","book_chapter"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2005Conference Paper [["dc.bibliographiccitation.firstpage","289"],["dc.bibliographiccitation.lastpage","302"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.editor","Boutaba, Raouf"],["dc.date.accessioned","2018-11-07T08:44:12Z"],["dc.date.available","2018-11-07T08:44:12Z"],["dc.date.issued","2005"],["dc.description.abstract","Soft state provides new services to packet-switching networks by introducing a type of state in the network nodes which is refreshed by periodical messages and otherwise expires. The operations of soft state protocols, which are being designed with ever greater complexity, need to be error-free and deadlock-free to avoid misusing network resources. Thus, verification, formal analysis and validation of these protocols become a vital task. In this paper we utilize formal techniques, specifically, Specification and Description Language (SDL) and Message Sequence Charts (MSCs), for modeling, analysis and validation of various soft state protocols. We propose a general architecture for state management systems and find employing these techniques can help identify and correct possible design errors, which may be caused by informal specifications."],["dc.identifier.doi","10.1007/11422778_24"],["dc.identifier.isi","000230113900024"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/20146"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.notes.submitter","Najko"],["dc.publisher","Springer"],["dc.publisher.place","Berlin"],["dc.relation.conference","4th International IFIP-TC6 Networking Conference"],["dc.relation.doi","10.1007/b13609"],["dc.relation.eventend","2005-05-06"],["dc.relation.eventlocation","Waterloo, CANADA"],["dc.relation.eventstart","2005-05-02"],["dc.relation.isbn","3-540-25809-4"],["dc.relation.isbn","978-3-540-25809-4"],["dc.relation.ispartof","Networking 2005: Networking technologies, services, and protocols, performance of computer and communication networks, mobile and wireless communications systems"],["dc.relation.issn","0302-9743"],["dc.title","Modeling soft state protocols with SDL"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dspace.entity.type","Publication"]]Details DOI WOS2022Journal Article [["dc.bibliographiccitation.firstpage","15685"],["dc.bibliographiccitation.issue","17"],["dc.bibliographiccitation.journal","IEEE Internet of Things Journal"],["dc.bibliographiccitation.lastpage","15696"],["dc.bibliographiccitation.volume","9"],["dc.contributor.author","Yuan, Yachao"],["dc.contributor.author","Yuan, Yali"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Baker, Thar"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2022-10-04T10:22:13Z"],["dc.date.available","2022-10-04T10:22:13Z"],["dc.date.issued","2022"],["dc.identifier.doi","10.1109/JIOT.2022.3153271"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/114614"],["dc.notes.intern","DOI-Import GROB-600"],["dc.relation.eissn","2327-4662"],["dc.relation.eissn","2372-2541"],["dc.title","LbSP: Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2007Journal Article [["dc.bibliographiccitation.firstpage","401"],["dc.bibliographiccitation.issue","5"],["dc.bibliographiccitation.journal","Computers & Security"],["dc.bibliographiccitation.lastpage","409"],["dc.bibliographiccitation.volume","26"],["dc.contributor.author","Lei, Jun"],["dc.contributor.author","Fu, Xiaoming"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.author","Tan, Jianrong"],["dc.date.accessioned","2017-09-07T11:44:53Z"],["dc.date.available","2017-09-07T11:44:53Z"],["dc.date.issued","2007"],["dc.identifier.doi","10.1016/j.cose.2007.01.001"],["dc.identifier.gro","3149008"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/5649"],["dc.notes.intern","Fu Crossref Import"],["dc.notes.status","final"],["dc.notes.submitter","chake"],["dc.publisher","Elsevier BV"],["dc.relation.issn","0167-4048"],["dc.title","Comparative studies on authentication and key exchange methods for 802.11 wireless LAN"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dc.type.peerReviewed","no"],["dspace.entity.type","Publication"]]Details DOI2012Journal Article [["dc.bibliographiccitation.firstpage","385"],["dc.bibliographiccitation.issue","4"],["dc.bibliographiccitation.journal","Journal of Communications and Networks"],["dc.bibliographiccitation.lastpage","395"],["dc.bibliographiccitation.volume","14"],["dc.contributor.author","Shehadeh, Youssef El Hajj"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2018-11-07T09:07:32Z"],["dc.date.available","2018-11-07T09:07:32Z"],["dc.date.issued","2012"],["dc.description.abstract","This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels."],["dc.identifier.isi","000308463100005"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/25819"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Korean Inst Communications Sciences (k I C S)"],["dc.relation.issn","1229-2370"],["dc.title","Towards Robust Key Extraction from Multipath Wireless Channels"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]Details WOS2011Conference Paper [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.lastpage","6"],["dc.contributor.author","Al-shadly, Saleh"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Brosenne, Henrik"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2019-07-29T12:45:25Z"],["dc.date.available","2019-07-29T12:45:25Z"],["dc.date.issued","2011"],["dc.description.abstract","This paper presents a formal analysis of an authentication handover framework. The framework provides a fast re-authentication mechanism to authenticate a mobile node that moves through different domains without the need to communicate with the home domain. We model the protocol using the high level protocol specification language (HLPSL) and we verify our model using the AVISPA model checking tool. Two main security properties are checked: authenticity and secrecy. We consider different scenarios in order to verify the protocol. Our results show that the protocol fulfills its requirements in almost all tested scenarios."],["dc.identifier.doi","10.1109/ICCCN.2011.6005785"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62142"],["dc.language.iso","en"],["dc.relation.conference","20th International Conference on Computer Communications and Networks (ICCCN)"],["dc.relation.eventend","2011-08-04"],["dc.relation.eventlocation","Maui, HI, USA"],["dc.relation.eventstart","2011-07-31"],["dc.relation.isbn","978-1-4577-0637-0"],["dc.relation.ispartof","2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],["dc.title","Security Verification of Trust-Based Authentication Handover in IP Networks"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI
- «
- 1 (current)
- 2
- 3
- »