default search action
Tobias Heer
Person information
- affiliation: University of Applied Sciences Esslingen, Germany
- affiliation (former): RWTH Aachen University, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Lukas Bechtel, Samuel Müller, Michael Menth, Tobias Heer:
GeNESIS: Generator for Network Evaluation Scenarios of Industrial Systems. ETFA 2024: 1-4 - [c28]Sabrina Kaniewski, Lukas Bechtel, Michael Menth, Tobias Heer:
Monitoring IP- ID Behavior for Spoofed IPv4 Traffic Detection. ETFA 2024: 1-8 - [c27]Lukas Osswald, Steffen Lindner, Lukas Bechtel, Tobias Heer, Michael Menth:
Secure Resource Allocation Protocol (SecRAP) for Time-Sensitive Networking. ETFA 2024: 1-8 - [c26]Julian Mayer, Markus Schramm, Lukas Bechtel, Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer:
I Know Who You Scanned Last Summer: Mapping the Landscape of Internet-Wide Scanners. IFIP Networking 2024: 222-230 - [i5]Sabrina Kaniewski, Dieter Holstein, Fabian Schmidt, Tobias Heer:
Vulnerability Handling of AI-Generated Code - Existing Solutions and Open Challenges. CoRR abs/2408.08549 (2024) - [i4]Balázs Varga, János Farkas, Stephan Kehrer, Tobias Heer:
Deterministic Networking (DetNet): Packet Ordering Function. RFC 9550: 1-11 (2024) - 2022
- [j8]Robin Müller, Julius Ruppert, Katharina Will, Lukas Wüsteney, Tobias Heer:
Analyzing the Software Patch Discipline Across Different Industries and Countries. Datenschutz und Datensicherheit 46(5): 269-275 (2022) - [c25]Lukas Wüsteney, David Hellmanns, Markus Schramm, Lukas Osswald, René Hummen, Michael Menth, Tobias Heer:
Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks. CoNEXT 2022: 91-109 - [c24]Robin Müller, Julius Ruppert, Katharina Will, Lukas Wüsteney, Tobias Heer:
Analyzing the Software Patch Discipline Across Different Industries and Countries. Sicherheit 2022: 159-170 - 2021
- [c23]Lukas Wüsteney, Michael Menth, René Hummen, Tobias Heer:
Impact of Packet Filtering on Time-Sensitive Networking Traffic. WFCS 2021: 59-66
2010 – 2019
- 2016
- [i3]Tobias Heer, Samu Varjonen:
Host Identity Protocol Certificates. RFC 8002: 1-13 (2016) - 2015
- [i2]Robert G. Moskowitz, Tobias Heer, Petri Jokela, Thomas R. Henderson:
Host Identity Protocol Version 2 (HIPv2). RFC 7401: 1-128 (2015) - 2013
- [j7]Tobias Heer:
Direkte Ende-zu-Mitte Authentifizierung in kooperativen Netzen. Prax. Inf.verarb. Kommun. 36(1): 9-15 (2013) - 2012
- [b1]Tobias Heer:
Direct End-to-Middle Authentication in Cooperative Networks. RWTH Aachen University, Reports on Communications and Distributed Systems 3, Shaker 2012, ISBN 978-3-8440-0710-7, pp. 1-240 - [c22]Hanno Wirtz, Tobias Heer, René Hummen, Klaus Wehrle:
Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks. ICC 2012: 653-658 - [c21]Hanno Wirtz, Tobias Heer, Martin Serror, Klaus Wehrle:
DHT-based localized service discovery in wireless mesh networks. MASS 2012: 19-28 - [c20]René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle:
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. TrustCom 2012: 525-532 - 2011
- [j6]René Hummen, Hanno Wirtz, Nicolai Viol, Tobias Heer, Klaus Wehrle:
WiSec 2011 demo: PISA-SA - security and mobility in a collaborative muni-fi. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 35-36 (2011) - [j5]Tobias Heer, Oscar García Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle:
Security Challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61(3): 527-542 (2011) - [c19]Samu Varjonen, Tobias Heer, Ken Rimey, Andrei V. Gurtov:
Secure Resolution of End-Host Identifiers for Mobile Clients. GLOBECOM 2011: 1-6 - [c18]Hanno Wirtz, René Hummen, Nicolai Viol, Tobias Heer, Mónica Alejandra Lora Girón, Klaus Wehrle:
Cooperative Wi-Fi-sharing: Encouraging fair play. Kaleidoscope 2011: 1-8 - [c17]Hanno Wirtz, Tobias Heer, Robert Backhaus, Klaus Wehrle:
Establishing mobile ad-hoc networks in 802.11 infrastructure mode. CHANTS@MobiCom 2011: 49-52 - [c16]Elias Weingärtner, Florian Schmidt, Hendrik vom Lehn, Tobias Heer, Klaus Wehrle:
SliceTime: A Platform for Scalable and Accurate Network Emulation. NSDI 2011 - [p1]Tobias Heer:
Direkte Ende-zu-Mitte Authentifizierung in kooperativen Netzen. Ausgezeichnete Informatikdissertationen 2011: 71-80 - [i1]Tobias Heer, Samu Varjonen:
Host Identity Protocol Certificates. RFC 6253: 1-12 (2011) - 2010
- [c15]Tobias Heer, Thomas Jansen, René Hummen, Stefan Götz, Hanno Wirtz, Elias Weingärtner, Klaus Wehrle:
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing. ICCCN 2010: 1-8 - [c14]Tobias Heer, René Hummen, Nicolai Viol, Hanno Wirtz, Stefan Götz, Klaus Wehrle:
Collaborative municipal Wi-Fi networks - challenges and opportunities. PerCom Workshops 2010: 588-593
2000 – 2009
- 2009
- [j4]Tobias Heer:
Leichtgewichtige Sicherheitsmechanismen für das Host Identity Protocol. Prax. Inf.verarb. Kommun. 32(1): 48-52 (2009) - [j3]Elias Weingärtner, Florian Schmidt, Tobias Heer, Klaus Wehrle:
Time accurate integration of software prototypes with event-based network simulations. SIGMETRICS Perform. Evaluation Rev. 37(2): 49-50 (2009) - [c13]Tobias Heer, René Hummen, Miika Komu, Stefan Götz, Klaus Wehrle:
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace. ICC 2009: 1-6 - [c12]Tobias Heer:
Abstract: Lightweight Authentication for HIP. KiVS 2009: 323 - [c11]Oscar García Morchon, Thomas Falck, Tobias Heer, Klaus Wehrle:
Security for pervasive medical sensor networks. MobiQuitous 2009: 1-10 - [c10]Oscar García Morchon, Thomas Falck, Tobias Heer, Klaus Wehrle:
Security for pervasive healthcare. MobiQuitous 2009: 1-2 - [c9]Oscar García Morchon, Tobias Heer, Klaus Wehrle:
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks. PODC 2009: 326-327 - 2008
- [j2]Elias Weingärtner, Florian Schmidt, Tobias Heer, Klaus Wehrle:
Synchronized network emulation: matching prototypes with complex simulations. SIGMETRICS Perform. Evaluation Rev. 36(2): 58-63 (2008) - [c8]Tobias Heer, Stefan Götz, Oscar García Morchon, Klaus Wehrle:
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. CoNEXT 2008: 23 - [c7]Tobias Heer, Stefan Götz, Elias Weingärtner, Klaus Wehrle:
Secure Wi-Fi sharing at global scales. ICT 2008: 1-7 - [c6]Stefan Götz, Christian Beckel, Tobias Heer, Klaus Wehrle:
ADAPT: A Semantics-Oriented Protocol Architecture. IWSOS 2008: 287-292 - 2007
- [j1]Olaf Landsiedel, Tobias Heer, Klaus Wehrle:
MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table). it Inf. Technol. 49(5): 298-303 (2007) - [c5]Oscar García Morchon, Heribert Baldus, Tobias Heer, Klaus Wehrle:
Cooperative security in distributed sensor networks. CollaborateCom 2007: 96-105 - [c4]Tobias Heer, Shaohui Li, Klaus Wehrle:
PISA: P2P Wi-Fi Internet Sharing Architecture. Peer-to-Peer Computing 2007: 251-252 - 2006
- [c3]Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle:
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks. PerCom Workshops 2006: 173-178 - 2005
- [c2]Tobias Heer:
Einsatz Verteilter Hash-Tabellen in mobilen Netzen. Informatiktage 2005: 73-76 - 2004
- [c1]Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon Rieche, Klaus Wehrle:
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios. GI Jahrestagung (2) 2004: 239-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint