default search action
Volker Fusenig
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c17]Christoph Krauß, Volker Fusenig:
Using Trusted Platform Modules for Location Assurance in Cloud Networking. NSS 2013: 109-121 - 2012
- [c16]Paul Murray, Azimeh Sefidcon, Rebecca Steinert, Volker Fusenig, Jorge Carapinha:
Cloud networking: An infrastructure service architecture for the wide area. Future Network & Mobile Summit 2012: 1-8 - [c15]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. ICACCI 2012: 952-960 - [c14]Volker Fusenig, Ayush Sharma:
Security architecture for cloud networking. ICNC 2012: 45-49 - 2011
- [c13]Thorsten Ries, Volker Fusenig, Christian Vilbois, Thomas Engel:
Verification of Data Location in Cloud Networking. UCC 2011: 439-444 - 2010
- [c12]Peter Schoo, Volker Fusenig, Victor Souza, Márcio Melo, Paul Murray, Hervé Debar, Houssem Medhioub, Djamal Zeghlache:
Challenges for Cloud Networking Security. MONAMI 2010: 298-313
2000 – 2009
- 2009
- [b1]Volker Fusenig:
Anonymity and Unlinkability in Electronic Communications. University of Luxembourg, 2009 - [c11]Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel:
Slotted Packet Counting Attacks on Anonymity Protocols. AISC 2009: 53-59 - [c10]Martin Rehák, Eugen Staab, Volker Fusenig, Jan Stiborek, Martin Grill, Karel Bartos, Michal Pechoucek, Thomas Engel:
Threat-model-driven runtime adaptation and evaluation of intrusion detection system. ICAC 2009: 65-66 - [c9]Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel:
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. RAID 2009: 61-80 - 2008
- [j1]Volker Fusenig, Dagmara Spiewak, Thomas Engel:
Anonymous Communication in Multi Hop Wireless Networks. J. Res. Pract. Inf. Technol. 40(3): 207-228 (2008) - [c8]Volker Fusenig, Dagmara Spiewak, Thomas Engel:
Acimn: A protocol for Anonymous Communication In Multi hop wireless networks. AISC 2008: 107-114 - [c7]Eugen Staab, Volker Fusenig, Thomas Engel:
Towards Trust-Based Acquisition of Unverifiable Information. CIA 2008: 41-54 - [c6]Eugen Staab, Volker Fusenig, Thomas Engel:
Trust-Aided Acquisition Of Unverifiable Information. ECAI 2008: 869-870 - [c5]Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel:
Unlinkable Communication. PST 2008: 51-55 - 2007
- [c4]Volker Fusenig, Dagmara Spiewak, Thomas Engel:
Acimn protocol: A protocol for anonymous communication in multi hop wireless networks. WTS 2007: 1 - [c3]Dagmara Spiewak, Volker Fusenig, Thomas Engel:
Mobility diversifies Trust: Introducing TrustRings. WTS 2007: 1 - 2006
- [c2]Uwe Roth, Volker Fusenig:
How Certain is Recommended Trust-Information. MTW 2006 - [c1]Uwe Roth, Volker Fusenig:
Trust-decisions on the base of maximal information of recommended direct-trust. SAC 2006: 1898-1901
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint