Simulative performance evaluation of a mobile peer-to-peer file-sharing system T Hopfeld, K Tutschku, FU Andersen, H De Meer, JO Oberender Next Generation Internet Networks, 2005, 281-287, 2005 | 57 | 2005 |
An architecture concept for mobile p2p file sharing services FU Andersen, H Meer, I Dedinski, C Kappler, A Mäder, JO Oberender, ... Gesellschaft für Informatik eV, 2004 | 53 | 2004 |
Enabling mobile peer-to-peer networking JO Oberender, FU Andersen, H de Meer, I Dedinski, T Hoßfeld, C Kappler, ... Wireless Systems and Mobility in Next Generation Internet: First …, 2005 | 45 | 2005 |
Method for allowing peer-to-peer data transmission FU Andersen, H De Meer, I Dedinski, T Hossfeld, C Kappler, A Maeder, ... US Patent App. 11/324,161, 2006 | 14 | 2006 |
Misbehavior scenarios in cognitive radio networks S Arkoulis, GF Marias, PA Frangoudis, J Oberender, A Popescu, M Fiedler, ... Future Internet 2 (3), 212-237, 2010 | 9 | 2010 |
Towards efficient simulation of large scale p2p networks T Hoßfeld, A Binzenhöfer, D Schlosser, K Eger, J Oberender, I Dedinski, ... University of Würzburg, Tech. Rep 371, 2005 | 9 | 2005 |
Mobile P2P Applications in Infrastructure-based Mobile Networks. K Tutschku, T Hoßfeld, A Berl, H De Meer, J Oberender University of Würzburg, 2007 | 4 | 2007 |
An architecture concept for mobile P2P file sharing services T Hoßfeld, A Mäder, K Tutschku, FU Andersen, C Kappler, H de Meer, ... Workshop of Information, 2004 | 4 | 2004 |
ASPECTS: Agile spectrum security GC Polyzos, GF Marias, S Arkoulis, PA Frangoudis, M Fiedler, A Popescu, ... 2011 7th EURO-NGI Conference on Next Generation Internet Networks, 1-2, 2011 | 3 | 2011 |
Widerstandsfähige Anonymisierungsnetze JO Oberender Universität Passau, 2009 | 3 | 2009 |
Denial-of-service flooding detection in anonymity networks JO Oberender, M Volkamer, H de Meer IEEE Workshop on Monitoring, Attack Detection and Mitigation, 2007 | 3 | 2007 |
P2P Replication Revisited: Mobile Infrastructures JO Oberender, H Meer Gesellschaft für Informatik eV, 2005 | 2 | 2005 |
Embedded UICC: Späte Personalisierung auf Basis verteilter Erbringung von Sicherheitsleistungen JO Oberender Datenschutz und Datensicherheit-DuD 39 (4), 240-245, 2015 | 1 | 2015 |
On the design dilemma in dining cryptographer networks JO Oberender, H de Meer International Conference on Trust, Privacy and Security in Digital Business …, 2008 | 1 | 2008 |
Method for transferring a queue position FU Andersen, H De Meer, I Dedinksi, T Hossfeld, C Kappler, A Maeder, ... US Patent App. 11/117,735, 2006 | | 2006 |
Method for ascertaining an address for a communication terminal FU Andersen, H Meer, I Dedinksi, T Hossfeld, C Kappler, A Maeder, ... US Patent App. 11/117,630, 2005 | | 2005 |
Method for making contact between a peer communication terminal and an index server FU Andersen, H De Meer, I Dedinksi, T Hossfeld, C Kappler, A Maeder, ... US Patent App. 11/117,700, 2005 | | 2005 |
Enabling Mobile Peer-to-Peer Networking K Tutschku, J Oberender, FU Andersen, H Meer, I Dedinski, T Hoßfeld, ... | | 2005 |
Simulative Performance Evaluation of a Mobile Peer-to-Peer File-Sharing System K Tutschku, T Hoßfeld, H Meer, J Oberender, FU Andersen Dagstuhl Seminar Proceedings, 2005 | | 2005 |
An Architecture Concept for Mobile P2P File Sharing Services K Tutschku, H Meer, I Dedinski, C Kappler, J Oberender University of Würzburg, 2004 | | 2004 |