PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks D Förster, F Kargl, H Löhr Vehicular Networking Conference (VNC), 2014 IEEE, 25-32, 2014 | 70* | 2014 |
PUCA: A Pseudonym Scheme with Strong Privacy Guarantees for Vehicular Ad-Hoc Networks D Förster, F Kargl, H Löhr Ad Hoc Networks 37, 122-132, 2016 | 59 | 2016 |
REWIRE – Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks D Förster, H Löhr, J Zibuschka, F Kargl Trust and Trustworthy Computing, 193-208, 2015 | 25 | 2015 |
An evaluation of pseudonym changes for vehicular networks in large-scale, realistic traffic scenarios D Förster, H Löhr, A Grätz, J Petit, F Kargl IEEE Transactions on Intelligent Transportation Systems 19 (10), 3400-3405, 2017 | 18 | 2017 |
Decentralized enforcement of k-anonymity for location privacy using secret sharing D Förster, H Löhr, F Kargl Vehicular Networking Conference (VNC), 2015 IEEE, 279-286, 2015 | 16 | 2015 |
A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-Hoc Networks D Förster, F Kargl, H Löhr Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 16 | 2015 |
Safety Goals in Vehicle Security Analyses - A Method to Assess Malicious Attacks with Safety Impact D Förster, C Loderhose, T Bruckschlögl, F Wiemer escar Europe 2019, 74-88, 2019 | 6 | 2019 |
Method for excluding a participant from a group having authorized communication H LOEHR, J Zibuschka, D Foerster US Patent US10263976B2, 2016 | 3 | 2016 |
Discussing Different Levels of Privacy Protection in Vehicular Ad-Hoc Networks D Förster Ulmer Informatik-Berichte, 29, 2015 | 3 | 2015 |
Challenges and Directions for Automated Driving Security D Förster, T Bruckschlögl, JL Omer, T Schipper Proceedings of the 6th ACM Computer Science in Cars Symposium, 1-11, 2022 | 2 | 2022 |
Reduction of memory requirement for cryptographic keys D Foerster, J Zibuschka, J Shokrollahi, H Loehr US Patent US10050793B2, 2015 | 2 | 2015 |
Social Key Exchange Network – From Ad-Hoc Key Exchanges to a Dense Key Network D Achenbach, D Förster, C Henrich, D Kraschewski, J Müller-Quade Lecture Notes in Informatics (LNI) 192, 2011 | 2 | 2011 |
Verifiable Privacy Protection for Vehicular Communication Systems D Förster Springer Fachmedien Wiesbaden, 2017 | 1 | 2017 |
Long-Term Software Maintenance - A New Challenge for the Automotive Industry D Förster escar Europe 2022, 70-79, 2022 | | 2022 |
Secure controlling of vehicle components in a telecommunication network J Zibuschka, D Foerster, H LOEHR US Patent App. 15/722,420, 2018 | | 2018 |
Datenschutzfreundliche Authentifizierung in der Car-to-X Kommunikation D Förster, H Kargl, Frank, Löhr 31. VDI/VW-Gemeinschaftstagung Automotive Security (VDI-Berichte 2263), 129-134, 2015 | | 2015 |
SOKEN: Schlüsselaustausch in sozialen Netzwerken D Achenbach, D Förster Tagungsband des 12. Kryptotags. Workshop der Fachgruppe "Angewandte …, 2010 | | 2010 |