default search action
Elke Franz 0001
Person information
- affiliation: TU Dresden, Faculty of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c50]Sebastian Jaster, Julian Haase, Diana Göhringer, Elke Franz:
Improving Reliability in Network-on-Chip with Trust-based Adaptive Routing Approaches. NorCAS 2024: 1-7 - 2023
- [c49]Julian Haase, Sebastian Jaster, Elke Franz, Diana Göhringer:
Enhancing Robustness and Reliability of Networks-on-Chip with Network Coding. NorCAS 2023: 1-7 - [c48]Elke Franz, Anita Grützner:
Trust-Based Adaptive Routing for NoCs. SAMOS 2023: 296-310 - 2022
- [c47]Julian Haase, Sebastian Jaster, Elke Franz, Diana Göhringer:
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism. ASAP 2022: 156-160 - 2020
- [c46]Niklas Förster, Juan A. Cabrera, Elke Franz, Stefan Pfennig, Frank H. P. Fitzek:
Efficient Confidentiality for Network Coded Distributed Storage. GLOBECOM 2020: 1-6 - [c45]Tao Li, Christoph Hofmann, Elke Franz:
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT. LCN 2020: 365-368
2010 – 2019
- 2019
- [c44]Julian Harttung, Elke Franz, Sadia Moriam, Paul Walther:
Lightweight Authenticated Encryption for Network-on-Chip Communications. ACM Great Lakes Symposium on VLSI 2019: 33-38 - [c43]Paul Walther, Elke Franz, Thorsten Strufe:
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation. LCN 2019: 76-83 - 2018
- [c42]Sadia Moriam, Elke Franz, Paul Walther, Akash Kumar, Thorsten Strufe, Gerhard P. Fettweis:
Protecting Communication in Many-Core Systems against Active Attackers. ACM Great Lakes Symposium on VLSI 2018: 45-50 - [c41]Paul Walther, Carsten Rudolf Janda, Elke Franz, Mathias Pelka, Horst Hellbrück, Thorsten Strufe, Eduard A. Jorswieck:
Improving Quantization for Channel Reciprocity based Key Generation. LCN 2018: 545-552 - 2017
- [c40]Stefan Pfennig, Elke Franz:
Security aspects of confidential network coding. ICC 2017: 1-6 - [c39]Bho Matthiesen, Stefan Pfennig, Mario Bielert, Thomas Ilsche, Andrew Lonnstrom, Tao Li, Juan A. Cabrera, Christian Scheunert, Elke Franz, Silvia Santini, Thorsten Strufe, Eduard A. Jorswieck, Wolfgang E. Nagel, Giang T. Nguyen, Frank H. P. Fitzek:
Secure and energy-efficient interconnects for board-to-board communication. ICUWB 2017: 1-7 - 2016
- [c38]Stefan Pfennig, Elke Franz:
eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency. GLOBECOM Workshops 2016: 1-6 - [c37]Stefan Pfennig, Kim Feldhoff, Florina M. Ciorba, Elke Franz, Tobias Reiher, Mario Bielert, Thomas Ilsche, Wolfgang E. Nagel:
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer. SpringSim (HPS) 2016: 6 - 2015
- [c36]Elke Franz, Stefan Pfennig, Bho Matthiesen, Christian Scheunert, Eduard A. Jorswieck:
Energy Models for Communication of Future Computing Platforms. ICUWB 2015: 1-5 - [c35]Stefan Pfennig, Elke Franz, Johannes Richter, Christian Scheunert, Eduard A. Jorswieck:
Confidential Network Coding: Physical Layer vs. Network Layer. ICUWB 2015: 1-5 - [c34]Christoph Hofmann, Elke Franz, Silvia Santini:
A Metric for Adaptive Routing on Trustworthy Paths. iNetSeC 2015: 11-25 - [c33]Sadia Moriam, Yexin Yan, Erik Fischer, Elke Franz, Gerhard P. Fettweis:
Resilient and efficient communication in many-core systems using network coding. IPCCC 2015: 1-8 - 2014
- [c32]Florina M. Ciorba, Thomas Ilsche, Elke Franz, Stefan Pfennig, Christian Scheunert, Ulf Markwardt, Joseph Schuchart, Daniel Hackenberg, Robert Schöne, Andreas Knüpfer, Wolfgang E. Nagel, Eduard A. Jorswieck, Matthias S. Müller:
Analysis of Parallel Applications on a High Performance-Low Energy Computer. Euro-Par Workshops (2) 2014: 474-485 - [c31]Stefan Pfennig, Elke Franz, Florina M. Ciorba, Thomas Ilsche, Wolfgang E. Nagel:
Modeling communication delays for network coding and routing for error-prone transmission. FGCT 2014: 19-24 - [c30]Stefan Pfennig, Elke Franz:
Adjustable redundancy for secure network coding in a unicast scenario. NetCod 2014: 1-6 - 2013
- [c29]Stefan Pfennig, Elke Franz:
Comparison of different secure network coding paradigms concerning transmission efficiency. CAMAD 2013: 18-22 - [c28]Johannes Richter, Elke Franz, Sabrina Engelmann, Stefan Pfennig, Eduard A. Jorswieck:
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? CAMAD 2013: 164-168 - [c27]Anna Biselli, Elke Franz, Maurílio Pereira Coutinho:
Protection of consumer data in the smart grid compliant with the German smart metering guideline. SEGS@CCS 2013: 41-52 - [c26]Stefan Pfennig, Elke Franz:
Secure network coding: Dependency of efficiency on network topology. ICC 2013: 2100-2105 - [c25]Stephen Mburu, Elke Franz, Thomas Springer:
A conceptual framework for designing mHealth solutions for developing countries. MobileHealth@MobiHoc 2013: 31-36 - 2012
- [c24]Elke Franz, Stefan Pfennig, André Fischer:
Efficiency of Secure Network Coding Schemes. Communications and Multimedia Security 2012: 145-159 - [c23]Elke Franz, Thomas Springer, Norbert Harder:
Enhancing privacy in social applications with the notion of group context. ICITST 2012: 112-118 - 2011
- [p2]Katja Liesebach, Elke Franz, Anne-Katrin Stange, Andreas Juschka, Katrin Borcea-Pfitzmann, Alexander Böttcher, Hagen Wahrig:
Collaborative E-Learning. Digital Privacy - PRIME 2011: 657-677
2000 – 2009
- 2009
- [c22]Elke Franz, Stefan Rönisch, Robert Bartel:
Improved embedding based on a set of cover images. MM&Sec 2009: 141-150 - [c21]Elke Franz, Katja Liesebach:
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. TrustBus 2009: 22-31 - 2008
- [c20]Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann:
A Comprehensive Approach for Context-dependent Privacy Management. ARES 2008: 903-910 - [c19]Elke Franz:
Embedding considering dependencies between pixels. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68191D - 2007
- [c18]Thomas Gloe, Elke Franz, Antje Winkler:
Forensics for flatbed scanners. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051I - 2006
- [c17]Elke Franz, Katrin Borcea-Pfitzmann:
Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. ARES 2006: 872-878 - [c16]Elke Franz, Hagen Wahrig, Alexander Böttcher, Katrin Borcea-Pfitzmann:
Access Control in a Privacy-Aware eLearning Environment. ARES 2006: 879-886 - [c15]Elke Franz, Katja Liesebach, Katrin Borcea-Pfitzmann:
Privacy-aware user interfaces within collaborative environments. CAI 2006: 45-48 - 2005
- [j4]Jana Dittmann, Elke Franz, Antje Schneidewind:
Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. Inform. Spektrum 28(6): 453-461 (2005) - [c14]Elke Franz, Ute Wappler:
Tailored Responsibility Within Component-Based Systems. CBSE 2005: 203-218 - [c13]Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitzmann:
Usable presentation of secure pseudonyms. Digital Identity Management 2005: 70-76 - [c12]Elke Franz, Antje Schneidewind:
Pre-processing for Adding Noise Steganography. Information Hiding 2005: 189-203 - [c11]Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, Hagen Wahrig:
Towards Privacy-Aware eLearning. Privacy Enhancing Technologies 2005: 167-178 - 2004
- [c10]Henrik Eichenhardt, Elke Franz, Simone Röttger, Ute Wappler:
Adapting Component Models to Support Responsibility. ISoLA (Preliminary proceedings) 2004: 191-193 - [c9]Elke Franz, Antje Schneidewind:
Adaptive steganography based on dithering. MM&Sec 2004: 56-62 - 2003
- [j3]Ronald Aigner, Henrike Berthold, Elke Franz, Steffen Göbel, Hermann Härtig, Heinrich Hußmann, Klaus Meißner, Klaus Meyer-Wegener, Marcus Meyerhöfer, Andreas Pfitzmann, Simone Röttger, Alexander Schill, Thomas Springer, Frank Wehner:
COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit. Inform. Forsch. Entwickl. 18(1): 39-40 (2003) - 2002
- [b1]Elke Franz:
Steganographie durch Nachbildung plausibler Änderungen. Dresden University of Technology, Germany, 2002, pp. 1-195 - [c8]Elke Franz:
Steganography Preserving Statistical Properties. Information Hiding 2002: 278-294 - 2001
- [c7]Elke Franz:
Steganographie unter Erhalt statistischer Merkmale. VIS 2001: 225-240
1990 – 1999
- 1999
- [j2]Elke Franz, Dagmar Schönfeld:
Geschäftsmodelle für Watermarking. Datenschutz und Datensicherheit 23(12) (1999) - [c6]Elke Franz, Andreas Pfitzmann:
Steganography Secure against Cover-Stego-Attacks. Information Hiding 1999: 29-46 - 1998
- [j1]Elke Franz, Andreas Pfitzmann:
Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas. Inform. Spektrum 21(4): 183-193 (1998) - [c5]Elke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann:
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. ACISP 1998: 111-122 - [c4]Elke Franz, Anja Jerichow:
A Mix-Mediated Anonymity Service and Its Payment. ESORICS 1998: 313-327 - [c3]Elke Franz, Anja Jerichow, Guntram Wicke:
A Payment Scheme for Mixes Providing Anonymity. Trends in Distributed Systems for Electronic Commerce 1998: 94-108 - 1997
- [c2]Hannes Federrath, Elke Franz, Anja Jerichow, Jan Müller, Andreas Pfitzmann:
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen. Kommunikation in Verteilten Systemen 1997: 77-91 - [p1]Elke Franz, Anja Jerichow, Andreas Pfitzmann:
Systematisierung und Modellierung von Mixen. Verläßliche IT-Systeme 1997: 171-190 - 1996
- [c1]Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand:
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. Information Hiding 1996: 7-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint