Login / Signup
Hans Löhr
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 5
Top Topics
Secret Sharing
Privacy Guarantees
Data Integrity
Storage Devices
Top Venues
VNC
Ad Hoc Networks
WISEC
Networking
</>
Publications
</>
Jonas Tzschoppe
,
Hans Löhr
Browser-in-the-Middle - Evaluation of a modern approach to phishing.
EuroSec@EUROSYS
(2023)
Marco Häberle
,
Florian Heimgaertner
,
Hans Löhr
,
Naresh Nayak
,
Dennis Grewe
,
Sebastian Schildt
,
Michael Menth
Softwarization of Automotive E/E Architectures: A Software-Defined Networking Approach.
VNC
(2020)
Steffen Lindner
,
Marco Häberle
,
Florian Heimgaertner
,
Naresh Nayak
,
Sebastian Schildt
,
Dennis Grewe
,
Hans Löhr
,
Michael Menth
P4 In-Network Source Protection for Sensor Failover.
Networking
(2020)
David Förster
,
Hans Löhr
,
Anne Gratz
,
Jonathan Petit
,
Frank Kargl
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intell. Transp. Syst.
19 (10) (2018)
David Förster
,
Frank Kargl
,
Hans Löhr
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.
Ad Hoc Networks
37 (2016)
David Förster
,
Hans Löhr
,
Jan Zibuschka
,
Frank Kargl
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
TRUST
(2015)
David Förster
,
Hans Löhr
,
Frank Kargl
Decentralized enforcement of k-anonymity for location privacy using secret sharing.
VNC
(2015)
David Förster
,
Frank Kargl
,
Hans Löhr
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks.
WISEC
(2015)
David Förster
,
Frank Kargl
,
Hans Löhr
PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).
VNC
(2014)
Luigi Catuogno
,
Hans Löhr
,
Marcel Winandy
,
Ahmad-Reza Sadeghi
A trusted versioning file system for passive mobile storage devices.
J. Netw. Comput. Appl.
38 (2014)
Thomas Hupperich
,
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Flexible patient-controlled security for electronic health records.
IHI
(2012)
Alexandra Dmitrienko
,
Zecir Hadzic
,
Hans Löhr
,
Marcel Winandy
,
Ahmad-Reza Sadeghi
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF
(2011)
Alexandra Dmitrienko
,
Zecir Hadzic
,
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Securing the Access to Electronic Health Records on Mobile Phones.
BIOSTEC (Selected Papers)
(2011)
Liqun Chen
,
Kurt Dietrich
,
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Christian Wachsmann
,
Johannes Winter
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch.
2011 (2011)
Luigi Catuogno
,
Hans Löhr
,
Mark Manulis
,
Ahmad-Reza Sadeghi
,
Christian Stüble
,
Marcel Winandy
Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit
34 (5) (2010)
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Securing the e-health cloud.
IHI
(2010)
Hans Löhr
,
Thomas Pöppelmann
,
Johannes Rave
,
Martin Steegmanns
,
Marcel Winandy
Trusted virtual domains on OpenSolaris: usable secure desktop environments.
STC@CCS
(2010)
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Patterns for Secure Boot and Secure Storage in Computer Systems.
ARES
(2010)
Emanuele Cesena
,
Hans Löhr
,
Gianluca Ramunno
,
Ahmad-Reza Sadeghi
,
Davide Vernizzi
Anonymous Authentication with TLS and DAA.
TRUST
(2010)
Christian Wachsmann
,
Liqun Chen
,
Kurt Dietrich
,
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Johannes Winter
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
ISC
(2010)
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Claire Vishik
,
Marcel Winandy
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
ISPEC
(2009)
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Christian Stüble
,
Marion Weber
,
Marcel Winandy
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
TRUST
(2009)
Sebastian Gajek
,
Hans Löhr
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
TruWallet: trustworthy and migratable wallet-based web authentication.
STC
(2009)
Luigi Catuogno
,
Hans Löhr
,
Mark Manulis
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Transparent Mobile Storage Protection in Trusted Virtual Domains.
LISA
(2009)
Liqun Chen
,
Hans Löhr
,
Mark Manulis
,
Ahmad-Reza Sadeghi
Property-Based Attestation without a Trusted Third Party.
ISC
(2008)
Frederik Armknecht
,
Alberto N. Escalante
,
Hans Löhr
,
Mark Manulis
,
Ahmad-Reza Sadeghi
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
ISPEC
(2008)
Hans Löhr
,
HariGovind V. Ramasamy
,
Ahmad-Reza Sadeghi
,
Stefan Schulz
,
Matthias Schunter
,
Christian Stüble
Enhancing Grid Security Using Trusted Virtualization.
ATC
(2007)
Liqun Chen
,
Alberto N. Escalante
,
Hans Löhr
,
Mark Manulis
,
Ahmad-Reza Sadeghi
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Financial Cryptography
(2007)
Alberto N. Escalante
,
Hans Löhr
,
Ahmad-Reza Sadeghi
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme.
GI Jahrestagung (2)
(2007)
Liqun Chen
,
Rainer Landfermann
,
Hans Löhr
,
Markus Rohe
,
Ahmad-Reza Sadeghi
,
Christian Stüble
A protocol for property-based attestation.
STC
(2006)