This paper presents a sentry-based approach to power management in wireless sensor networks for applications such as intruder detection and tracking. To minimize average power cons...
Neither of the two anonymisation services Tor and AN.ON clearly outperforms the other one. AN.ON’s user-perceived QoS is generally more consistent over time than Tor’s. While A...
Rolf Wendolsky, Dominik Herrmann, Hannes Federrath
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...