default search action
Heiko Niedermayer
Person information
- affiliation: TU Munich, Department of Informatics, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [p2]Michal Aibin, Miroslaw Kantor, Piotr Borylo, Heiko Niedermayer, Piotr Cholda, Torsten Braun:
Resilient SDN, CDN and ICN Technology and Solutions. Guide to Disaster-Resilient Communication Networks 2020: 631-652
2010 – 2019
- 2019
- [c21]Holger Kinkelin, Heiko Niedermayer, Marc Müller, Georg Carle:
Multi-party authorization and conflict mediation for decentralized configuration management processes. IM 2019: 5-8 - [e1]Svetlana S. Bodrunova, Olessia Koltsova, Asbjørn Følstad, Harry Halpin, Polina Kolozaridi, Leonid Yuldashev, Anna S. Smoliarova, Heiko Niedermayer:
Internet Science - INSCI 2018 International Workshops, St. Petersburg, Russia, October 24-26, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11551, Springer 2019, ISBN 978-3-030-17704-1 [contents] - [i3]Holger Kinkelin, Heiko Niedermayer, Marc Müller, Georg Carle:
Multi-party authorization and conflict mediation for decentralized configuration management processes. CoRR abs/1903.08048 (2019) - 2018
- [c20]Michael Mitterer, Heiko Niedermayer, Marcel von Maltitz, Georg Carle:
An Experimental Performance Analysis of the Cryptographic Database ZeroDB. P2DS@EuroSys 2018: 6:1-6:5 - [c19]Fabian Helfert, Heiko Niedermayer, Georg Carle:
Evaluation of algorithms for multipath route selection over the Internet. ICIN 2018: 1-8 - [c18]Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle:
Trustworthy configuration management for networked devices using distributed ledgers. NOMS 2018: 1-5 - [i2]Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle:
Trustworthy Configuration Management for Networked Devices using Distributed Ledgers. CoRR abs/1804.04798 (2018) - 2017
- [j6]Jacek Rak, Dimitri Papadimitriou, Heiko Niedermayer, Pablo Romero:
Information-driven network resilience: Research challenges and perspectives. Opt. Switch. Netw. 23: 156-178 (2017) - [c17]Heiko Niedermayer, Nikolai Schwellnus, Daniel Raumer, Edwin Cordeiro, Georg Carle:
Information Mining from Public Mailing Lists: A Case Study on IETF Mailing Lists. INSCI 2017: 301-309 - 2016
- [j5]Dimitri Papadimitriou, Heiko Niedermayer, Bart Lannoo, Jacek Rak:
Understanding and modeling the inter-play between Sustainability, Resilience, and Robustness in networks. Electron. Notes Discret. Math. 51: 1-6 (2016) - [c16]Heiko Niedermayer, Daniel Raumer, Nikolai Schwellnus, Edwin Cordeiro, Georg Carle:
An Analysis of IETF Activities Using Mailing Lists and Social Media. INSCI 2016: 218-230 - [i1]Cornelius Diekmann, Stephan-Alexander Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle:
Verifying Security Policies using Host Attributes. CoRR abs/1604.00204 (2016) - 2014
- [c15]Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin:
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services. ARES 2014: 317-324 - [c14]Cornelius Diekmann, Stephan-Alexander Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle:
Verifying Security Policies Using Host Attributes. FORTE 2014: 133-148 - [c13]Holger Kinkelin, Marcel von Maltitz, Benedikt Peter, Cornelia Kappler, Heiko Niedermayer, Georg Carle:
Privacy Preserving Energy Management. SocInfo Workshops 2014: 35-42 - 2013
- [c12]Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Georg Carle:
Enabling sustainable smart neighborhoods. SustainIT 2013: 1-6 - 2011
- [j4]Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle:
On Using TPM for Secure Identities in Future Home Networks. Future Internet 3(1): 1-13 (2011) - 2010
- [b1]Heiko Niedermayer:
Architecture and components of secure and anonymous peer-to-peer systems. Technical University Munich, 2010, ISBN 3-937201-13-0, pp. 1-167 - [c11]Ali Fessi, Nathan Evans, Heiko Niedermayer, Ralph Holz:
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM. IPTComm 2010: 134-145
2000 – 2009
- 2009
- [c10]Marc Fouquet, Heiko Niedermayer, Georg Carle:
Cloud computing for the masses. U-NET@CoNEXT 2009: 31-36 - [c9]Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, Georg Carle:
On Using Home Networks and Cloud Computing for a Future Internet of Things. FIS 2009: 70-80 - [c8]Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel Laskov:
CLIO - A Cross-Layer Information Service for Overlay Network Optimization. KiVS 2009: 279-284 - 2008
- [j3]Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle:
Clustering players for load balancing in virtual worlds. Int. J. Adv. Media Commun. 2(4): 351-363 (2008) - [c7]Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle:
Trust-Rated Authentication for Domain-Structured Distributed Systems. EuroPKI 2008: 74-88 - 2007
- [j2]Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle:
CoSIP - a hybrid architecture for reliable and secure SIP services. Prax. Inf.verarb. Kommun. 30(4): 206-212 (2007) - [c6]Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Georg Carle:
Peer-to-Peer-Based Infrastructure Support for Massively Multiplayer Online Games. CCNC 2007: 763-767 - [c5]Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle:
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. GLOBECOM 2007: 64-69 - [c4]Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle:
A cooperative SIP infrastructure for highly reliable telecommunication services. IPTComm 2007: 29-38 - 2006
- [j1]Andreas Klenk, Heiko Niedermayer, Marcus Masekowsky, Georg Carle:
An architecture for autonomic security adaptation. Ann. des Télécommunications 61(9-10): 1066-1082 (2006) - [c3]Heiko Niedermayer, Andreas Klenk, Georg Carle:
The networking perspective of security performance - A measurement study. MMB 2006: 119-136 - 2005
- [c2]Heiko Niedermayer, Simon Rieche, Klaus Wehrle, Georg Carle:
On the Distribution of Nodes in Distributed Hash Tables. KiVS Kurzbeiträge und Workshop 2005: 193-196 - [p1]Simon Rieche, Heiko Niedermayer, Stefan Götz, Klaus Wehrle:
Reliability and Load Balancing in Distributed Hash Tables. Peer-to-Peer Systems and Applications 2005: 119-135 - 2004
- [c1]Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon Rieche, Klaus Wehrle:
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios. GI Jahrestagung (2) 2004: 239-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint