default search action
Thomas Hupperich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Henry Hosseini, Christine Utz, Martin Degeling, Thomas Hupperich:
A Bilingual Longitudinal Analysis of Privacy Policies Measuring the Impacts of the GDPR and the CCPA/CPRA. Proc. Priv. Enhancing Technol. 2024(2): 434-463 (2024) - 2023
- [j6]Lukas Schmidt, Henry Hosseini, Thomas Hupperich:
Assessing the Security and Privacy of Baby Monitor Apps. J. Cybersecur. Priv. 3(3): 303-326 (2023) - [c17]Thomas Hupperich:
On DDoS Attacks as an Expression of Digital Protest in the Russo-Ukrainian War 2022. ISNCC 2023: 1-8 - 2022
- [j5]Samaneh Rashidibajgan, Thomas Hupperich:
Improving the Performance of Opportunistic Networks in Real-World Applications Using Machine Learning Techniques. J. Sens. Actuator Networks 11(4): 61 (2022) - [j4]Benedikt Kluss, Samaneh Rashidibajgan, Thomas Hupperich:
Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks. J. Sens. Actuator Networks 11(4): 75 (2022) - [c16]Tamara Gunkel, Thomas Hupperich:
Discovering Vulnerabilities and Patches for Open Source Security. ICSOFT 2022: 641-648 - [c15]Henry Hosseini, Julian Rengstorf, Thomas Hupperich:
Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned? ICSOFT 2022: 649-656 - [c14]Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Tristan Dhellemmes, Abhilasha Ravichander, Peter Story, Jasmine Mangat, Rex Chen, Martin Degeling, Thomas B. Norton, Thomas Hupperich, Shomir Wilson, Norman M. Sadeh:
A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus. LREC 2022: 5460-5472 - 2021
- [j3]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Anna Förster:
Secure and privacy-preserving structure in opportunistic networks. Comput. Secur. 104: 102208 (2021) - [j2]Henry Hosseini, Martin Degeling, Christine Utz, Thomas Hupperich:
Unifying Privacy Policy Detection. Proc. Priv. Enhancing Technol. 2021(4): 480-499 (2021) - 2020
- [c13]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705 - [c12]Thomas Hupperich, Katharina Dassel:
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security. TrustCom 2020: 1646-1654 - [c11]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. TrustCom 2020: 1672-1679
2010 – 2019
- 2018
- [c10]Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz:
An Empirical Study on Online Price Differentiation. CODASPY 2018: 76-83 - 2017
- [b1]Thomas Hupperich:
On the feasibility and impact of digital fingerprinting for system recognition. Ruhr University Bochum, Germany, 2017 - [j1]Katharina Krombholz, Thomas Hupperich, Thorsten Holz:
May the Force Be with You: The Future of Force-Sensitive Authentication. IEEE Internet Comput. 21(3): 64-69 (2017) - [i1]Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz:
An Empirical Study on Price Differentiation Based on System Fingerprints. CoRR abs/1712.03031 (2017) - 2016
- [c9]Thomas Hupperich, Henry Hosseini, Thorsten Holz:
Leveraging Sensor Fingerprinting for Mobile Device Authentication. DIMVA 2016: 377-396 - [c8]Katharina Krombholz, Thomas Hupperich, Thorsten Holz:
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. SOUPS 2016: 207-219 - [c7]Thomas Hupperich, Katharina Krombholz, Thorsten Holz:
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. TRUST 2016: 40-59 - 2015
- [c6]Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? ACSAC 2015: 191-200 - [c5]Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz:
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. Financial Cryptography 2015: 237-253 - [c4]Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz:
Going Wild: Large-Scale Classification of Open DNS Resolvers. Internet Measurement Conference 2015: 355-368 - 2014
- [c3]Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. USENIX Security Symposium 2014: 111-125 - [c2]Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. WOOT 2014 - 2012
- [c1]Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Flexible patient-controlled security for electronic health records. IHI 2012: 727-732
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint