default search action
Hans Löhr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Hans Löhr:
Privacy-preserving protocols and applications for trusted platforms. Bochum University, Germany, 2012
Journal Articles
- 2018
- [j4]David Förster, Hans Löhr, Anne Gratz, Jonathan Petit, Frank Kargl:
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios. IEEE Trans. Intell. Transp. Syst. 19(10): 3400-3405 (2018) - 2016
- [j3]David Förster, Frank Kargl, Hans Löhr:
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks. Ad Hoc Networks 37: 122-132 (2016) - 2014
- [j2]Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A trusted versioning file system for passive mobile storage devices. J. Netw. Comput. Appl. 38: 65-75 (2014) - 2010
- [j1]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010)
Conference and Workshop Papers
- 2023
- [c25]Jonas Tzschoppe, Hans Löhr:
Browser-in-the-Middle - Evaluation of a modern approach to phishing. EuroSec@EUROSYS 2023: 15-20 - 2020
- [c24]Steffen Lindner, Marco Häberle, Florian Heimgaertner, Naresh Nayak, Sebastian Schildt, Dennis Grewe, Hans Löhr, Michael Menth:
P4 In-Network Source Protection for Sensor Failover. Networking 2020: 791-796 - [c23]Marco Häberle, Florian Heimgaertner, Hans Löhr, Naresh Nayak, Dennis Grewe, Sebastian Schildt, Michael Menth:
Softwarization of Automotive E/E Architectures: A Software-Defined Networking Approach. VNC 2020: 1-8 - 2015
- [c22]David Förster, Hans Löhr, Jan Zibuschka, Frank Kargl:
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks. TRUST 2015: 193-208 - [c21]David Förster, Hans Löhr, Frank Kargl:
Decentralized enforcement of k-anonymity for location privacy using secret sharing. VNC 2015: 279-286 - [c20]David Förster, Frank Kargl, Hans Löhr:
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. WISEC 2015: 19:1-19:6 - 2014
- [c19]David Förster, Frank Kargl, Hans Löhr:
PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). VNC 2014: 25-32 - 2012
- [c18]Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Flexible patient-controlled security for electronic health records. IHI 2012: 727-732 - 2011
- [c17]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A Security Architecture for Accessing Health Records on Mobile Phones. HEALTHINF 2011: 87-96 - [c16]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the Access to Electronic Health Records on Mobile Phones. BIOSTEC (Selected Papers) 2011: 365-379 - 2010
- [c15]Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Patterns for Secure Boot and Secure Storage in Computer Systems. ARES 2010: 569-573 - [c14]Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy:
Trusted virtual domains on OpenSolaris: usable secure desktop environments. STC@CCS 2010: 91-96 - [c13]Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the e-health cloud. IHI 2010: 220-229 - [c12]Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ISC 2010: 84-98 - [c11]Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi:
Anonymous Authentication with TLS and DAA. TRUST 2010: 47-62 - 2009
- [c10]Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWallet: trustworthy and migratable wallet-based web authentication. STC 2009: 19-28 - [c9]Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407 - [c8]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - [c7]Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy:
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62 - 2008
- [c6]Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ISPEC 2008: 29-44 - [c5]Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 - 2007
- [c4]Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 - [c3]Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 - [c2]Alberto N. Escalante, Hans Löhr, Ahmad-Reza Sadeghi:
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. GI Jahrestagung (2) 2007: 184-188 - 2006
- [c1]Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble:
A protocol for property-based attestation. STC 2006: 7-16
Parts in Books or Collections
- 2015
- [p1]Hendrik Fuchs, Frank Hofmann, Hans Löhr, Gunther Schaaf:
Car-2-X. Handbuch Fahrerassistenzsysteme 2015: 525-540
Informal and Other Publications
- 2011
- [i1]Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 101 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint