L. Völker. Automatisierte Wahl von Kommunikationsprotokollen für das heutige und zukünftige Internet. Dissertation, ISBN 978-3-86644-916-9, KIT Scientific Publishing, 2012 |
L. Völker, T. Gamer, C. Schwingenschlögl, M. Bahr. Verfahren zur Bereitstellung von Sicherheitsmechanismen in drahtlosen Mesh-Netzwerken. PCT/EP2009/007707, Oktober 2009 |
L. Völker, M. Noe, O. Waldhorst, C. Werle, C. Sorge. Can Internet users protect themselves? Challenges and Techniques of Automated Protection of HTTP Communication. In: Computer Communications, Vol. 34, No. 3, pp. 457-467, März 2011 |
D. Martin, L. Völker, M. Zitterbart. A Flexible Framework for Future Internet Design, Assessment, and Operation. In: Computer Networks, Vol. 55, No. 4, ISSN 1389-1286, pp. 910-918, Februar 2011 |
T. Gamer, L. Völker, M. Zitterbart. Differentiated Security in Wireless Mesh Networks. In: Security and Communication Networks - Special Issue on Security for QoS Assured Wireless and Mobile Networks, Vol. 4, No. 3, Wiley, ISSN 1939-0122, pp. 257-266, September 2010 |
C. Werle, L. Völker, R. Bless. Attachment of End Users to Virtual Networks. 4th GI/ITG KuVS Workshop on The Future Internet, Zurich, Switzerland, November 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. Selecting Concurrent Network Architectures at Runtime. Proceedings of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, Juni 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. A Node Architecture for 1000 Future Networks. Proceedings of the International Workshop on the Network of the Future 2009, Dresden, Germany, Juni 2009 |
L. Völker, D. Martin, T. Rohrberg, H. Backhaus, P. Baumung, H. Wippel, M. Zitterbart. Design Process and Development Tools for Concurrent Future Networks. 3rd GI/ITG KuVS Workshop on The Future Internet, Munich, Germany, Mai 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. An Architecture for Concurrent Future Networks. 2nd GI/ITG KuVS Workshop on The Future Internet, Karlsruhe, Germany, November 2008 |
L. Völker, C. Werle, M. Zitterbart. Decision Process for Automated Selection of Security Protocols. 33rd IEEE Conference on Local Computer Networks (LCN 2008), pp. 223-229, Montreal, Canada, Oktober 2008 |
L. Völker, S. Schuhmann. Combining Passive Autoconfiguration and Anomaly-based Intrusion Detection in Ad-hoc Networks. 8th International Workshop on Applications and Services in Wireless Networks (ASWN2008), 87-95, Kassel, Germany, Oktober 2008 |
L. Völker, M. Schöller, M. Zitterbart. Introducing QoS mechanisms into the IPsec packet processing. 32nd IEEE Conference on Local Computer Networks (LCN 2007), pp. 360-367, Dublin, Ireland, Oktober 2007 |
L. Völker, M. Schöller. SecureTLS: Preventing DoS Attacks with Lower Layer Authentication. Kommunikation in Verteilten Systemen (KiVS) 2007, 235-248, Bern, Switzerland, Februar 2007 |
D. Martin, H. Backhaus, L. Völker, H. Wippel, P. Baumung, B. Behringer, M. Zitterbart. Designing and Running Concurrent Future Networks (Poster+Demo). The 34th IEEE Conference on Local Computer Networks (LCN 2009), Zurich, Switzerland, Oktober 2009 |
L. Völker, C. Werle, M. Noe, B. Behringer. Auto-Configuration for Communication Security (Poster+Demo). März 2009 |
T. Gamer, L. Völker, M. Zitterbart. Differentiated Security in Wireless Mesh Networks. Proceedings of the 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet), pp. 111-112, Vancouver, British Columbia, Canada, Oktober 2008 |
C. Werle, L. Völker. Network Access Challenges in a Future Internet. 4. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Essen, Germany, April 2010 |
L. Völker. Architecture and Development Process for Application-Tailored Future Networks. Munich, Germany, Juni 2009 |
L. Völker, C. Werle. Security in the Future Internet: Assessment, problems, and first solutions. Meeting of the Network Security working group of the ITG, VDE, Heidelberg, Germany, Juni 2009 |
L. Völker, C. Werle, M. Zitterbart. Choosing the right Security Protocol: A flexible automated approach. 3. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Essen, Germany, April 2008 |
L. Völker, D. Dudek, T. Breitling. Generating IDS Detectors based on Protocol Specifications. Essen, Germany, April 2008 |
L. Völker. Eine Architektur für selbstkonfigurierende sichere Kommunikation. Essen, Germany, November 2007 |
D. Dudek, S. Krause, L. Völker, C. Werle, M. Zitterbart. Netzsicherheit und Hackerabwehr. Seminarband WS08/09. Technischer Bericht TM-2009-2, KIT Scientific Publishing, März 2009 |
D. Dudek, S. Krause, C. Sorge, L. Völker, M. Zitterbart. Netzsicherheit und Hackerabwehr. Seminarband WS07/08. Technischer Bericht TM-2008-3, Institute of Telematics, Karlsruhe Institute of Technology, März 2008 |
H. Hof, S. Krause, L. Völker, U. Walter. Hacking und Hackerabwehr. Seminarband WS06/07.. Technischer Bericht TM-2007-1, Institute of Telematics, Karlsruhe Institute of Technology, März 2007 |
L. Völker. Analyse und Weiterentwicklung des IPsec-Standards und dessen Protokollmechanismen. März 2004 |
L. Völker. Integration of QoS into the IPseCK framework. Juni 2003 |