default search action
Hans-Joachim Hof
Person information
- affiliation: Technical University of Ingolstadt, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Julian Blümke, Kevin Mayer, Hans-Joachim Hof:
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life. ARES 2024: 101:1-101:11 - [c19]Mario Fritz, Christoph Krauß, Hans-Joachim Hof:
CSCS '24 - Cyber Security in CarS Workshop. CCS 2024: 4914-4916 - [c18]Marco Michl, Hans-Joachim Hof, Stefan Katzenbeisser:
Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems. CSCS 2024: 61-75 - [e7]Mario Fritz, Christoph Krauß, Hans-Joachim Hof:
Proceedings of the 2024 on Cyber Security in CarS Workshop, CSCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1232-6 [contents] - 2023
- [j7]Ricardo de Andrade, Max Mauro Dias Santos, João Francisco Justo, Leopoldo Rideki Yoshioka, Hans-Joachim Hof, João Henrique Kleinschmidt:
Security architecture for automotive communication networks with CAN FD. Comput. Secur. 129: 103203 (2023) - [e6]Björn Brücher, Christoph Krauß, Mario Fritz, Hans-Joachim Hof, Oliver Wasenmüller:
Proceedings of the 7th ACM Computer Science in Cars Symposium, CSCS 2023, Darmstadt, Germany, 5 December 2023. ACM 2023 [contents] - 2022
- [c17]Pascal Knierim, Sarah Prange, Sebastian S. Feger, Stefan Schneegaß, M. Angela Sasse, Dominik Bayerl, Hans-Joachim Hof, Florian Alt:
Inclusive Security by Design. MuC (Workshopband) 2022 - [e5]Björn Brücher, Christoph Krauß, Mario Fritz, Hans-Joachim Hof, Oliver Wasenmüller:
Computer Science in Cars Symposium, CSCS 2022, Ingolstadt, Germany, 8 December 2022. ACM 2022, ISBN 978-1-4503-9786-5 [contents] - 2021
- [j6]Kevin Klaus Gomez Buquerin, Christopher Corbett, Hans-Joachim Hof:
A generalized approach to automotive forensics. Digit. Investig. 36 Supplement: 301111 (2021) - [j5]Hans-Joachim Hof, Dominik Bayerl, Kevin Klaus Gomez Buquerin:
Überwachung in modernen Fahrzeugen. Datenschutz und Datensicherheit 45(6): 399-403 (2021) - [c16]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
Presentation of the Programme of the 6th GI/ACM Standardization Workshop on Industrial Automation and Control Systems. GI-Jahrestagung 2021: 1745-1752 - [e4]Björn Brücher, Christoph Krauß, Mario Fritz, Hans-Joachim Hof, Oliver Wasenmüller:
CSCS '21: Computer Science in Cars Symposium, Ingolstadt, Germany, 30 November 2021. ACM 2021, ISBN 978-1-4503-9139-9 [contents] - 2020
- [c15]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
The 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS. GI-Jahrestagung 2020: 283-287 - [e3]Björn Brücher, Oliver Wasenmüller, Mario Fritz, Hans-Joachim Hof, Christoph Krauß:
CSCS '20: Computer Science in Cars Symposium, Feldkirchen, Germany, December 2, 2020. ACM 2020, ISBN 978-1-4503-7621-1 [contents]
2010 – 2019
- 2019
- [c14]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
4th GI/ACMWorkshop on Standardization of I4.0 Automation and Control Systems. GI-Jahrestagung (Workshops) 2019: 241-242 - [e2]Hans-Joachim Hof, Mario Fritz, Christoph Krauß, Oliver Wasenmüller:
ACM Computer Science in Cars Symposium, German Research Center for Artificial Intelligence, Kaiserslautern, Germany, October 8, 2019. ACM 2019, ISBN 978-1-4503-7004-2 [contents] - 2016
- [c13]Smriti Gopinath, Lars Wischhof, Christoph Ponikwar, Hans-Joachim Hof:
Hybrid solutions for data dissemination in vehicular networks. Wireless Days 2016: 1-4 - [c12]Hans-Joachim Hof, Gudrun Socher:
POSTER: Security Design Patterns With Good Usability. WISEC 2016: 227-228 - [e1]Michael Felderer, Felix Piazolo, Wolfgang Ortner, Lars Brehm, Hans-Joachim Hof:
Innovations in Enterprise Information Systems Management and Engineering - 4th International Conference, ERP Future 2015 - Research, Munich, Germany, November 16-17, 2015, Revised Papers. Lecture Notes in Business Information Processing 245, Springer 2016, ISBN 978-3-319-32798-3 [contents] - [i11]Christoph Ponikwar, Hans-Joachim Hof, Smriti Gopinath, Lars Wischhof:
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication. CoRR abs/1607.08277 (2016) - 2015
- [c11]Hans-Joachim Hof, Rainer Schmidt, Lars Brehm:
Enabling Digital Transformation Using Secure Decisions as a Service. ESOCC Workshops 2015: 289-298 - [c10]Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. SEC 2015: 267-280 - [i10]Christoph Pohl, Kathrin Schlierkamp, Hans-Joachim Hof:
BREW: A Breakable Web Application for IT-Security Classroom Use. CoRR abs/1506.03325 (2015) - [i9]Hans-Joachim Hof:
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption. CoRR abs/1506.06987 (2015) - [i8]Alexander Schmidtke, Hans-Joachim Hof:
Fighting Spam by Breaking the Econonmy of Advertisment by Unsolicited Emails. CoRR abs/1506.06990 (2015) - [i7]Rainer Falk, Steffen Fries, Hans-Joachim Hof:
Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility. CoRR abs/1506.06996 (2015) - [i6]Christoph Pohl, Hans-Joachim Hof:
The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications. CoRR abs/1506.07055 (2015) - [i5]Hans-Joachim Hof:
User-Centric IT Security - How to Design Usable Security Mechanisms. CoRR abs/1506.07167 (2015) - [i4]Rainer Falk, Steffen Fries, Hans-Joachim Hof:
ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments. CoRR abs/1507.01706 (2015) - [i3]Christoph Pohl, Hans-Joachim Hof:
Secure Scrum: Development of Secure Software with Scrum. CoRR abs/1507.02992 (2015) - [i2]Christoph Pohl, Michael Meier, Hans-Joachim Hof:
Apate - A Linux Kernel Module for High Interaction Honeypots. CoRR abs/1507.03117 (2015) - [i1]Christoph Ponikwar, Hans-Joachim Hof:
Overview on Security Approaches in Intelligent Transportation Systems. CoRR abs/1509.01552 (2015) - 2014
- [j4]Hans-Joachim Hof:
Practical limitations of technical privacy protection. Datenschutz und Datensicherheit 38(9): 601-605 (2014) - 2010
- [j3]Rainer Falk, Hans-Joachim Hof:
Security Design for Industrial Sensor Networks (Sicherheit für industrielle Sensornetze). it Inf. Technol. 52(6): 331-339 (2010) - [c9]Rainer Falk, Hans-Joachim Hof:
Industrial Sensor Network Security Architecture. SECURWARE 2010: 97-102
2000 – 2009
- 2009
- [j2]Daniel Kraft, Marc Bechler, Hans-Joachim Hof, Frank Pählke, Lars C. Wolf:
Design and evaluation of a security architecture for ad hoc networks. Int. J. Pervasive Comput. Commun. 5(4): 448-475 (2009) - [c8]Rainer Falk, Hans-Joachim Hof:
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. SECURWARE 2009: 191-196 - 2008
- [b1]Hans-Joachim Hof:
Sichere Dienste-Suche in Sensornetzen. Karlsruhe Institute of Technology, 2008 - 2007
- [c7]Hans-Joachim Hof:
Applications of Sensor Networks. Algorithms for Sensor and Ad Hoc Networks 2007: 1-20 - [c6]Michael Conrad, Hans-Joachim Hof:
A Generic, Self-organizing, and Distributed Bootstrap Service for Peer-to-Peer Networks. IWSOS 2007: 59-72 - [c5]Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterbart:
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks. KiVS 2007: 139-150 - 2005
- [j1]Hans-Joachim Hof, Martina Zitterbart:
SCAN: A secure service directory for service-centric wireless sensor networks. Comput. Commun. 28(13): 1517-1522 (2005) - 2004
- [c4]Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart:
Secure Overlay for Service Centric Wireless Sensor Networks. ESAS 2004: 125-138 - [c3]Hans-Joachim Hof, Erik-Oliver Blaß, Thomas Fuhrmann, Martina Zitterbart:
Design of a Secure Distributed Service Directory for Wireless Sensornetworks. EWSN 2004: 276-290 - [c2]Bernhard Hurler, Hans-Joachim Hof, Martina Zitterbart:
A General Architecture for Wireless Sensor Networks: First Steps. ICDCS Workshops 2004: 442-444 - [c1]Marc Bechler, Hans-Joachim Hof, Daniel Kraft, Frank Pählke, Lars C. Wolf:
A Cluster-Based Security Architecture for Ad Hoc Networks. INFOCOM 2004: 2393-2403
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 00:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint