WARNING: This information is likely out-of-date and will not be updated!
Last modified on 2020-08-19
Communication and Distributed Systems
RWTH Aachen University
Ahornstr. 55
52074 Aachen, Germany
E-Mail: martin.henze[[at]]comsys.rwth-aachen.de
Phone: +49 241 80-21459
Office: Building E3, Room 9209 (how to get to COMSYS)
I left RWTH Aachen University and joined Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE. I am still closely cooperating with COMSYS. The information below will not be updated, please find current contact information on my personal website.
I worked as researcher and head of security and privacy at the Chair of Communication and Distributed Systems at RWTH Aachen University. After having finished my Diploma studies (equiv. M.Sc.) of Computer Science at RWTH Aachen University in 2011, I interned at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the University of Luxembourg where I worked on website fingerprinting in anonymization networks. In early 2012 I returned to RWTH Aachen University.
My research focuses on security and privacy in large-scale communication systems and especially the cloud. I worked within the TRINICS project to create transparency on the usage of cloud services and within the SSICLOPS project on the privacy-aware handling of data in the cloud. Previously, I worked on security and privacy challenges of outsourcing sensor data to the cloud in the context of the SensorCloud and IPACS projects. In my spare time I am volunteering as chairman of the alumni club of the students representation for Mathematics, Physics and Computer Science at RWTH Aachen University (VAMPIR e.V.). In 2011, I received the award of the Computer Science Department at RWTH Aachen University for outstanding achievements as students representative within the Computer Science Department and RWTH Aachen University.
We organize a weekly security and privacy lunch at RWTH Aachen University for everyone who is interested.
Technical Program Committee Member
CLaw (2018), FiCloud (2015), IEEE Symposium on Security and Privacy (Student PC, 2017)
Reviewer for Conferences
HICSS (2019), IEEE LCN (2012), IEEE CloudCom (2015), PETS (2018)
Reviewer for Journals
Business & Information Systems Engineering (2018), Computer Communications (2019), Future Generation Computer Systems (2015), IEEE Internet Computing (2015), IEEE Internet of Things Journal (2017), IEEE Software (2017), IEEE Transactions on Parallel and Distributed Systems (2017), Journal of Supercomputing (2016), Pervasive and Mobile Computing (2018)
Reviewer for Book Chapters
Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley, 2017), Trusted Cloud Computing (Springer, 2014)
The publication list below will not be updated anymore, please consult my full publication list as well as Google Scholar and DBLP.
2019 |
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom, page 27-38.
Publisher: ACM,
November
2019
ISBN: 978-1-4503-6831-5/19/11
|
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9
|
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, page 197-205.
Publisher: ACM,
May
2019
ISBN: 978-1-4503-6675-5/19/05
|
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW, page 31-37.
Publisher: IEEE,
May
2019
ISBN: 978-1-5386-8500-6/19
|
ITG-news,
02/2019:7-8
April
2019
|
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA, page 7252-7261.
Publisher: University of Hawai'i at Manoa / AIS,
January
2019
ISBN: 978-0-9981331-2-6
|
2018 |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2018
ISBN: 978-3-8440-6389-9
|
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Publisher: IEEE,
October
2018
ISBN: 978-1-5386-4413-3
|
Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany
Publisher: ACM,
August
2018
ISBN: 978-1-4503-6448-5
|
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
2017 |
Pervasive and Mobile Computing,
42:58-76
December
2017
ISSN: 1574-1192
|
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
Publisher: ACM,
October
2017
ISBN: 978-1-4503-5175-1
|
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9
|
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland
Publisher: IEEE / IFIP,
June
2017
ISBN: 978-3-901882-95-1
|
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
2016 |
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.
Publisher: IEEE,
December
2016
ISBN: 978-1-5090-1445-3
|
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1766-1768.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.
Publisher: IEEE,
April
2016
ISBN: 978-1-5090-3684-4
|
Future Generation Computer Systems,
56:701-718
March
2016
ISSN: 0167-739X
|
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 978-1-891562-41-9
|
2015 |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
2014 |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain, page 191-196.
Publisher: IEEE,
August
2014
ISBN: 978-1-4799-4357-9
|
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
Publisher: IEEE,
June
2014
|
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, page 1-8.
Publisher: IEEE,
January
2014
ISBN: 978-1-4799-3635-9
|
2013 |
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, page 266-269.
Publisher: IEEE,
December
2013
ISBN: 978-0-7695-5095-4
|
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
2012 |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
2019 |
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom, page 27-38.
Publisher: ACM,
November
2019
ISBN: 978-1-4503-6831-5/19/11
|
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9
|
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, page 197-205.
Publisher: ACM,
May
2019
ISBN: 978-1-4503-6675-5/19/05
|
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW, page 31-37.
Publisher: IEEE,
May
2019
ISBN: 978-1-5386-8500-6/19
|
ITG-news,
02/2019:7-8
April
2019
|
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA, page 7252-7261.
Publisher: University of Hawai'i at Manoa / AIS,
January
2019
ISBN: 978-0-9981331-2-6
|
2018 |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2018
ISBN: 978-3-8440-6389-9
|
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Publisher: IEEE,
October
2018
ISBN: 978-1-5386-4413-3
|
Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany
Publisher: ACM,
August
2018
ISBN: 978-1-4503-6448-5
|
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
2017 |
Pervasive and Mobile Computing,
42:58-76
December
2017
ISSN: 1574-1192
|
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
Publisher: ACM,
October
2017
ISBN: 978-1-4503-5175-1
|
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9
|
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland
Publisher: IEEE / IFIP,
June
2017
ISBN: 978-3-901882-95-1
|
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
2016 |
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.
Publisher: IEEE,
December
2016
ISBN: 978-1-5090-1445-3
|
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1766-1768.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.
Publisher: IEEE,
April
2016
ISBN: 978-1-5090-3684-4
|
Future Generation Computer Systems,
56:701-718
March
2016
ISSN: 0167-739X
|
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 978-1-891562-41-9
|
2015 |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
2014 |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain, page 191-196.
Publisher: IEEE,
August
2014
ISBN: 978-1-4799-4357-9
|
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
Publisher: IEEE,
June
2014
|
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, page 1-8.
Publisher: IEEE,
January
2014
ISBN: 978-1-4799-3635-9
|
2013 |
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, page 266-269.
Publisher: IEEE,
December
2013
ISBN: 978-0-7695-5095-4
|
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
2012 |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
Below you find a list of all submitted student theses that I have (co-)advised. The supervisor for all these theses was Klaus Wehrle.
Julian Filter
Application Layer Traffic Splitting for Mitigating Website Fingerprinting in Tor
Bachelor's Thesis, RWTH Aachen University, October 2017
co-advised with Andriy Panchenko and Asya Mitseva
Patrick Marx
Behavioural Nudging through Privacy-Preserving Comparisons
Master's Thesis, RWTH Aachen University, November 2016
co-advised with Jan Henrik Ziegeldorf
Arthur Drichel
Large Scale Analysis of the Cloud Usage of Smartphone Applications
Bachelor's Thesis, RWTH Aachen University, September 2016
Nikola Velinov
Secure Random Walks in DHTs
Master's Thesis, RWTH Aachen University, April 2016
co-advised with Andriy Panchenko
Daniel Forster
Pitchfork: Design and Implementation and Evaluation of Traffic Splitting to thwart Traffic Analysis in Tor
Master's Thesis, RWTH Aachen University, February 2016
co-advised with Andriy Panchenko
Sascha Schmerling
A Space and Processing Efficient Cloud Privacy Policy Language
Master's Thesis, RWTH Aachen University, December 2015
co-advised with Jens Hiller
Asya Mitseva
Fingerprinting Tor Hidden Services
Master's Thesis, RWTH Aachen University, November 2015
co-advised with Andriy Panchenko
Robert Echelmeyer
Practical Limits of Website Fingerprinting Attacks
Master's Thesis, RWTH Aachen University, August 2015
co-advised with Andriy Panchenko
Annika Seufert
Load Balancing for Data Handling-aware Distributed Databases
Bachelor's Thesis, RWTH Aachen University, June 2015
David Hellmanns
Making Individual Cloud Usage of Smartphone Users Transparent
Bachelor's Thesis, RWTH Aachen University, May 2015
Fritz Alder
Distributed Storage for Secure Peer-to-Peer Clouds
Bachelor's Thesis, RWTH Aachen University, April 2015
Johannes van der Giet
Data Annotation Handling in a Highly Scalable Distributed Database System
Master's Thesis, RWTH Aachen University, October 2014
Erik Mühmer
Analyzing Cloud Usage by Observing Network Traffic
Bachelor's Thesis, RWTH Aachen University, September 2014
Jens Hiller
PriverCloud - A Peer-to-Peer Cloud for Secure Service Operation
Master's Thesis, RWTH Aachen University, September 2014
Jan Pennekamp
Evaluating Website Fingerprinting Attacks in Real-World Settings
Bachelor's Thesis, RWTH Aachen University, August 2014
co-advised with Andriy Panchenko
Benedikt Wolters
Distributed Authorization Management for Secure Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with René Hummen
Sebastian Bereda
Flexible Configuration and Service Abstraction for Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with René Hummen
Aivar Kripsaar
Access Control for Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, January 2014
co-advised with René Hummen
Norbert Landa
Thwarting Traffic Analysis in Onion Routing
Master's Thesis, RWTH Aachen University, November 2013
co-advised with Andriy Panchenko
Devran Ölcer
Efficient Signature Schemes for Sensor Data in the Cloud
Master's Thesis, RWTH Aachen University, November 2013
co-advised with René Hummen
Marcel Großfengels
Machine-readable Data Handling Annotations for the Cloud
Bachelor's Thesis, RWTH Aachen University, October 2013
Maik Koprowski
Realizing Data Handling Annotation Support in the Cloud Stack with Customized Data Distribution
Bachelor's Thesis, RWTH Aachen University, September 2013
Kevin Möllering
DARAS - A Distributed Accountable Resource Allocation System for Peer-to-Peer Networks
Master's Thesis, RWTH Aachen University, July 2013
co-advised with René Hummen
David Schunke
Network-based Localization of Wi-Fi Devices
Bachelor's Thesis, RWTH Aachen University, May 2013
co-advised with Nicolai Viol
Marc Seebold
Privacy-aware Operations on Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with René Hummen
Roman Matzutt
User-controlled Utilization of Sensor Data for Cloud Computing
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with René Hummen
Julian Poschmann
Real-Time Feedback on the Privacy Leakage of Web Usage
Diploma Thesis, RWTH Aachen University, February 2013
Andreas Kirmse
Analyzing the Privacy Leakage of Web Usage
Bachelor's Thesis, RWTH Aachen University, March 2012
co-advised with Hendrik vom Lehn and René Hummen
e