Search Results for author: Frank Kargl

Found 4 papers, 2 papers with code

PeQES: A Platform for Privacy-enhanced Quantitative Empirical Studies

1 code implementation9 Mar 2021 Dominik Meißner, Felix Engelmann, Frank Kargl, Benjamin Erb

Empirical sciences and in particular psychology suffer a methodological crisis due to the non-reproducibility of results, and in rare cases, questionable research practices.

Cryptography and Security Computers and Society

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

1 code implementation9 Feb 2020 Stephan Kleber, Rens Wouter van der Heijden, Frank Kargl

Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages.

Networking and Internet Architecture Cryptography and Security

Multi-Source Fusion Operations in Subjective Logic

no code implementations3 May 2018 Rens Wouter van der Heijden, Henning Kopp, Frank Kargl

The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors.

valid

Formal Analysis of V2X Revocation Protocols

no code implementations24 Apr 2017 Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer

This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials.

Cryptography and Security D.2.4; D.4.6

Cannot find the paper you are looking for? You can Submit a new open access paper.