default search action
Silke Holtmanns
Person information
- affiliation: Bell Labs, Nokia, Finland
- affiliation: Nokia Research Center, Finland
- affiliation: Ericsson Eurolab Deutschland GmbH, Herzogenrath, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Bruno Dzogovic, Silke Holtmanns:
Securing 5G Communication in Joint Operations Between NATO Partners. CyCon 2024: 29-46 - 2021
- [j8]German Peinado Gomez, Jordi Mongay Batalla, Yoan Miche, Silke Holtmanns, Constandinos X. Mavromoustakis, George Mastorakis, Noman Haider:
Security policies definition and enforcement utilizing policy control function framework in 5G. Comput. Commun. 172: 226-237 (2021) - 2020
- [i1]Siddharth Prakash Rao, Silke Holtmanns, Tuomas Aura:
Threat modeling framework for mobile communication systems. CoRR abs/2005.05110 (2020)
2010 – 2019
- 2019
- [j7]Yoan Miche, Wei Ren, Ian Oliver, Silke Holtmanns, Amaury Lendasse:
A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning. Cogn. Comput. 11(2): 241-261 (2019) - 2018
- [j6]Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns, Amaury Lendasse:
Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space. Cogn. Comput. 10(5): 848-863 (2018) - [j5]Silke Holtmanns, Ian Oliver, Yoan Miche:
Mobile Subscriber Profile Data Privacy Breach via 4G Diameter Interconnection. J. ICT Stand. 6(3): 245-262 (2018) - [j4]Ian Oliver, Silke Holtmanns, Shankar Lal:
Experiences in Trusted Cloud Computing. J. ICT Stand. 6(3): 263-278 (2018) - [c22]Ian Oliver, Aapo Kalliola, Silke Holtmanns, Yoan Miche, Gabriela Limonta, Borger Vigmostad, Kiti Müller:
A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment. SAFECOMP Workshops 2018: 87-98 - [c21]Isha Singh, Silke Holtmanns, Raimo Kantola:
Roaming Interface Signaling Security for LTE Networks. SecITC 2018: 204-217 - 2017
- [c20]Wei Ren, Yoan Miche, Ian Oliver, Silke Holtmanns, Kaj-Mikael Björk, Amaury Lendasse:
On Distance Mapping from non-Euclidean Spaces to Euclidean Spaces. CD-MAKE 2017: 3-13 - [c19]Yoan Miche, Ian Oliver, Wei Ren, Silke Holtmanns, Anton Akusok, Amaury Lendasse:
Practical Estimation of Mutual Information on Non-Euclidean Spaces. CD-MAKE 2017: 123-136 - [c18]Silke Holtmanns, Ian Oliver:
SMS and one-time-password interception in LTE networks. ICC 2017: 1-6 - [c17]Ian Oliver, Silke Holtmanns:
Providing for privacy in a network infrastructure protection context. ICIN 2017: 79-86 - [c16]Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Silke Holtmanns:
Testbed for security orchestration in a network function virtualization environment. NFV-SDN 2017: 1-4 - [c15]Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas:
Experiences in Trusted Cloud Computing. NSS 2017: 19-30 - [c14]Silke Holtmanns, Yoan Miche, Ian Oliver:
Subscriber Profile Extraction and Modification via Diameter Interconnection. NSS 2017: 585-594 - 2016
- [j3]Silke Holtmanns:
Interconnection Security Standards - We Are All Connected. J. ICT Stand. 4(1): 1-18 (2016) - [c13]Yoan Miché, Ian Oliver, Silke Holtmanns, Aapo Kalliola, Anton Akusok, Amaury Lendasse, Kaj-Mikael Björk:
Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health Data. CD-ARES 2016: 193-203 - [c12]Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura:
We know where you are! CyCon 2016: 277-293 - [c11]Linas Laibinis, Elena Troubitsyna, Inna Pereverzeva, Ian Oliver, Silke Holtmanns:
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks. ICFEM 2016: 141-158 - [c10]Siddharth Prakash Rao, Bhanu Teja Kotte, Silke Holtmanns:
Privacy in LTE networks. MobiMedia 2016: 176-183 - [c9]Silke Holtmanns, Siddharth Prakash Rao, Ian Oliver:
User location tracking attacks for LTE networks using the interworking functionality. Networking 2016: 315-322 - 2015
- [c8]Dare Abodunrin, Yoan Miche, Silke Holtmanns:
Some dangers from 2G networks legacy support and a possible mitigation. CNS 2015: 585-593 - [c7]Ian Oliver, Silke Holtmanns:
Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection. TrustCom/BigDataSE/ISPA (1) 2015: 547-554 - [c6]Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura:
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access. TrustCom/BigDataSE/ISPA (1) 2015: 1171-1176
2000 – 2009
- 2007
- [c5]Silke Holtmanns, Son Phan-Anh:
Access Authentication to IMS Systems in Next Generation Networks. ICN 2007: 74 - 2006
- [j2]T. Perlines Hormann, Konrad S. Wrona, Silke Holtmanns:
Evaluation of certificate validation mechanisms. Comput. Commun. 29(3): 291-305 (2006) - 2004
- [c4]Silke Holtmanns, Frank Hartung:
Privacy Rights Management for Mobile Phones. Wireless Information Systems 2004: 12-17 - 2003
- [j1]Silke Holtmanns, Marcin Toczydlowski:
Confidential mobile mail retrieval. Comput. Commun. 26(11): 1219-1224 (2003) - 2002
- [c3]Silke Holtmanns:
Privacy in a Mobile Environment. DEXA Workshops 2002: 493-497 - [c2]Silke Holtmanns, Marcin Toczydlowski:
Private Mail Retrieval Search on Encrypted Data. Wireless Information Systems 2002: 34-45 - 2001
- [c1]Martin Gerdes, Silke Holtmanns:
Mobile Payment Solutions. I3E 2001: 629-642
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint