default search action
Hossein Shafagh
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Lukas Burkhalter, Nicolas Küchler, Alexander Viand, Hossein Shafagh, Anwar Hithnawi:
Zeph: Cryptographic Enforcement of End-to-End Data Privacy. OSDI 2021: 387-404 - [i4]Lukas Burkhalter, Nicolas Küchler, Alexander Viand, Hossein Shafagh, Anwar Hithnawi:
Zeph: Cryptographic Enforcement of End-to-End Data Privacy. CoRR abs/2107.03726 (2021) - 2020
- [c21]Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, Sylvia Ratnasamy:
TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control. NSDI 2020: 835-850 - [c20]Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi:
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. USENIX Security Symposium 2020: 2469-2486
2010 – 2019
- 2018
- [b1]Hossein Shafagh:
Retaining Data Ownership in the Internet of Things. ETH Zurich, Zürich, Switzerland, 2018 - [j2]Jun Young Kim, Wen Hu, Hossein Shafagh, Sanjay Jha:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 15(6): 1041-1054 (2018) - [c19]Alexander Viand, Hossein Shafagh:
Marble: Making Fully Homomorphic Encryption Accessible to All. WAHC@CCS 2018: 49-60 - [i3]Hossein Shafagh, Lukas Burkhalter, Simon Duquennoy, Anwar Hithnawi, Sylvia Ratnasamy:
Droplet: Decentralized Authorization for IoT Data Streams. CoRR abs/1806.02057 (2018) - [i2]Lukas Burkhalter, Hossein Shafagh, Anwar Hithnawi, Sylvia Ratnasamy:
TimeCrypt: A Scalable Private Time Series Data Store. CoRR abs/1811.03457 (2018) - 2017
- [c18]Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Simon Duquennoy:
Towards Blockchain-based Auditable Storage and Sharing of IoT Data. CCSW 2017: 45-50 - [c17]Hossein Shafagh, Anwar Hithnawi, Lukas Burkhalter, Pascal Fischli, Simon Duquennoy:
Secure Sharing of Partially Homomorphic Encrypted IoT Data. SenSys 2017: 29:1-29:14 - [c16]Hossein Shafagh, Anwar Hithnawi:
Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data. MobiArch 2017: 25-30 - [i1]Hossein Shafagh, Anwar Hithnawi, Simon Duquennoy:
Towards Blockchain-based Auditable Storage and Sharing of IoT Data. CoRR abs/1705.08230 (2017) - 2016
- [c15]Anwar Hithnawi, Su Li, Hossein Shafagh, James Gross, Simon Duquennoy:
CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks. IPSN 2016: 10:1-10:12 - [c14]Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi:
Talos a Platform for Processing Encrypted IoT Data: Demo Abstract. SenSys 2016: 308-309 - 2015
- [j1]Hossein Shafagh:
Toward computing over encrypted data in IoT systems. XRDS 22(2): 48-52 (2015) - [c13]Laurynas Riliskis, Hossein Shafagh, Philip Alexander Levis:
POSTER: Computations on Encrypted Data in the Internet of Things Applications. CCS 2015: 1668-1670 - [c12]Anwar Hithnawi, Hossein Shafagh, Simon Duquennoy:
TIIM: technology-independent interference mitigation for low-power wireless networks. IPSN 2015: 1-12 - [c11]Anwar Hithnawi, Vaibhav Kulkarni, Su Li, Hossein Shafagh:
Controlled Interference Generation for Wireless Coexistence Research. SRIF@MobiCom 2015: 19-24 - [c10]Hossein Shafagh, Anwar Hithnawi, Andreas Droescher, Simon Duquennoy, Wen Hu:
Poster: Towards Encrypted Query Processing for the Internet of Things. MobiCom 2015: 251-253 - [c9]Hossein Shafagh, Anwar Hithnawi, Andreas Droescher, Simon Duquennoy, Wen Hu:
Talos: Encrypted Query Processing for the Internet of Things. SenSys 2015: 197-210 - [c8]Jun Young Kim, Sanjay Jha, Wen Hu, Hossein Shafagh, Mohamed Ali Kâafar:
Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things. SenSys 2015: 425-426 - [c7]Anwar Hithnawi, Su Li, Hossein Shafagh, Simon Duquennoy, James Gross:
Poster: Cross-Layer Optimization for Low-power Wireless Coexistence. SenSys 2015: 443-444 - 2014
- [c6]Hossein Shafagh, Anwar Hithnawi:
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things. DCOSS 2014: 135-136 - [c5]Anwar Hithnawi, Hossein Shafagh, Simon Duquennoy:
Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog. DCOSS 2014: 137-138 - [c4]Anwar Hithnawi, Hossein Shafagh, Simon Duquennoy:
Understanding the impact of cross technology interference on IEEE 802.15.4. WiNTECH 2014: 49-56 - [c3]Hossein Shafagh, Anwar Hithnawi:
Poster: come closer: proximity-based authentication for the internet of things. MobiCom 2014: 421-424 - [c2]René Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voigt, Klaus Wehrle:
Delegation-based authentication and authorization for the IP-based Internet of Things. SECON 2014: 284-292 - 2013
- [c1]René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle:
6LoWPAN fragmentation attacks and mitigation mechanisms. WISEC 2013: 55-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint