default search action
Michael Roßberg
Person information
- affiliation: TU Ilmenau, Institute of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Friedrich Altheide, Simon Buttgereit, Michael Rossberg:
Increasing Resilience of SD-WAN by Distributing the Control Plane [Extended Version]. IEEE Trans. Netw. Serv. Manag. 21(3): 2569-2581 (2024) - 2023
- [c39]David Schatz, Michael Rossberg, Guenter Schaefer:
Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls. ARES 2023: 22:1-22:10 - [c38]Friedrich Altheide, Simon Buttgereit, Michael Rossberg, Guenter Schaefer:
Increasing Resilience of SD-WAN by Distributing the Control Plane. NoF 2023: 10-18 - [c37]David Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer:
Virtual Private Networks in the Quantum Era: A Security in Depth Approach. SECRYPT 2023: 486-494 - 2022
- [j6]David Schatz, Michael Rossberg, Guenter Schaefer:
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice Calls. SN Comput. Sci. 3(5): 341 (2022) - 2021
- [c36]David Schatz, Michael Rossberg, Guenter Schaefer:
Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls. ARES 2021: 12:1-12:10 - [c35]Simon Buttgereit, Michael Rossberg, Michael Pfeiffer, Guenter Schaefer:
Demo: Leveraging SDN in Critical Infrastructures. ICIN 2021: 86-88 - [c34]David Schatz, Michael Rossberg, Guenter Schaefer:
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing. ICISSP 2021: 191-203 - [c33]Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Towards a Realistic Maximum Flow Model in Hybrid Multi-Channel Wireless Mesh Networks. WD 2021: 1-8 - 2020
- [c32]Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer:
Vector packet encapsulation: the case for a scalable IPsec encryption protocol. ARES 2020: 11:1-11:10 - [c31]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks. Networking 2020: 637-639 - [c30]Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations. Networking 2020: 675-676 - [c29]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Improving Network-Assisted Roaming for Controller-Less Wi-Fi. PIMRC 2020: 1-7 - [c28]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Robustness and Scalability Improvements for Distance Vector Routing in Large WMNs. WiMob 2020: 1-6
2010 – 2019
- 2019
- [c27]Michael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer:
Strong Tenant Separation in Cloud Computing Platforms. ARES 2019: 15:1-15:10 - [c26]Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Towards a Security Architecture for Hybrid WMNs. ARES 2019: 107:1-107:10 - [c25]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Robust and Scalable Routing in Wireless Mesh Networks Using Interference-Disjoint Backup Paths. WMNC 2019: 103-110 - 2018
- [c24]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer, David Sukiennik:
A Comprehensive Framework to Evaluate Wireless Networks in Simulation and Real Systems. DS-RT 2018: 29-36 - [c23]Michael Grey, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications. GIIS 2018: 1-5 - [c22]Martin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards a Flexible User-Space Architecture for High-Performance IEEE 802.11 Processing. WiMob 2018: 1-9 - 2017
- [c21]Michael Rossberg, Markus Theil:
Secure Enrollment of Certificates Using Short PINs. ARES 2017: 10:1-10:9 - [c20]Martin Byrenheid, Michael Rossberg, Guenter Schaefer, Robert Dorn:
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks. ICC 2017: 1-7 - [c19]David Schatz, Michael Rossberg, Guenter Schaefer:
Reducing call blocking rates for anonymous voice over IP communications. ICUMT 2017: 382-390 - 2016
- [c18]Markus Trapp, Michael Rossberg, Günter Schäfer:
Automatic source code decomposition for privilege separation. SoftCOM 2016: 1-6 - 2015
- [j5]Franz Girlich, Michael Rossberg, Guenter Schaefer:
On the resistance of overlay networks against bandwidth exhaustion attacks. Telecommun. Syst. 60(4): 539-552 (2015) - [c17]Michael Grey, Markus Theil, Michael Rossberg, Guenter Schaefer:
Towards a model for global-scale backbone networks. ICC 2015: 6086-6091 - [c16]Markus Trapp, Michael Rossberg, Guenter Schaefer:
Program partitioning based on static call graph analysis for privilege separation. ISCC 2015: 613-618 - [c15]Ralf Rothenberger, Sascha Grau, Michael Rossberg:
Dominating an s-t-Cut in a Network. SOFSEM 2015: 401-411 - 2014
- [c14]Michael Grey, David Schatz, Michael Rossberg, Günter Schäfer:
Towards distributed geolocation by employing a delay-based optimization scheme. ISCC 2014: 1-7 - 2013
- [j4]Michael Rossberg, Michael Grey, Markus Trapp, Franz Girlich, Guenter Schaefer:
Automatic VPN-Configuration with SOLID. Prax. Inf.verarb. Kommun. 36(1): 42 (2013) - [c13]Sander Wozniak, Michael Rossberg, Sascha Grau, Ali Alshawish, Guenter Schaefer:
Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes. CCSW 2013: 89-100 - [c12]Michael Grey, Michael Rossberg, Martin Backhaus, Guenter Schaefer:
On distributed geolocation by employing spring-mass systems. GIIS 2013: 1-7 - [c11]Sander Wozniak, Michael Rossberg, Franz Girlich, Guenter Schaefer:
Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks. ICC 2013: 2016-2021 - [c10]Michael Rossberg, Michael Grey, Markus Trapp, Franz Girlich, Guenter Schaefer:
Distributed monitoring of self-configuring Virtual Private Networks. IM 2013: 1080-1081 - [c9]Markus Trapp, Michael Rossberg, Günter Schäfer:
Scalable Multipath Exploration in Ad-Hoc Networks. NetSys 2013: 9-18 - [c8]Franz Girlich, Michael Rossberg, Guenter Schaefer, Thomas Böhme, Jens Schreyer:
Bounds for the Security of the Vivaldi Network Coordinate System. NetSys 2013: 66-75 - [c7]Sander Wozniak, Michael Rossberg, Guenter Schaefer:
Towards trustworthy mobile social networking services for disaster response. PerCom Workshops 2013: 528-533 - 2012
- [c6]Michael Rossberg, Rene Golembewski, Günter Schäfer:
Attack-Resistant Distributed Time Synchronization for Virtual Private Networks. ICCCN 2012: 1-8 - [c5]Michael Rossberg, Franz Girlich, Guenter Schaefer:
Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks. ICUMT 2012: 779-785 - [c4]Michael Grey, Michael Rossberg, Guenter Schaefer:
Automatic creation of VPN backup paths for improved resilience against BGP-attackers. SAC 2012: 613-620 - [i2]Sander Wozniak, Michael Rossberg, Franz Girlich, Guenter Schaefer:
Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks. CoRR abs/1210.0061 (2012) - [i1]Sander Wozniak, Michael Rossberg, Guenter Schaefer:
Towards Trustworthy Mobile Social Networking Services for Disaster Response. CoRR abs/1212.4989 (2012) - 2011
- [b1]Michael Roßberg:
Skalierbare Autokonfiguration sabotageresistenter virtueller privater Netze. Technische Universität Ilmenau, Germany, 2011, ISBN 978-3-86955-775-5, pp. 1-217 - [j3]Michael Rossberg, Guenter Schaefer:
A survey on automatic configuration of virtual private networks. Comput. Networks 55(8): 1684-1699 (2011) - 2010
- [j2]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Distributed Automatic Configuration of Complex IPsec-Infrastructures. J. Netw. Syst. Manag. 18(3): 300-326 (2010) - [c3]Michael Rossberg, Günter Schäfer, Kai Martius:
Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management. ISSE 2010: 334-342
2000 – 2009
- 2009
- [c2]Michael Brinkmeier, Michael Rossberg, Guenter Schaefer:
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays. ICC 2009: 1-6 - 2008
- [j1]Marcel Henseler, Michael Rossberg, Guenter Schaefer:
Credential Management for Automatic Identification Solutions in Supply Chain Management. IEEE Trans. Ind. Informatics 4(4): 303-314 (2008) - 2007
- [c1]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Using recurring costs for reputation management in peer-to-peer streaming systems. SecureComm 2007: 283-292
Coauthor Index
aka: Guenter Schaefer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint