Follow
Stefan Pfennig
Stefan Pfennig
Privacy and Data Security, TU Dresden
Verified email at tu-dresden.de
Title
Cited by
Cited by
Year
Unexpected artefacts in PRNU-based camera identification: a'Dresden Image Database'case-study
T Gloe, S Pfennig, M Kirchner
Proceedings of the on Multimedia and security, 109-114, 2012
772012
Spectral methods to determine the exact scaling factor of resampled digital images
S Pfennig, M Kirchner
2012 5th International Symposium on Communications, Control and Signal …, 2012
362012
eSPOC: Enhanced secure practical network coding for better efficiency and lower latency
S Pfennig, E Franz
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
92016
Adjustable redundancy for secure network coding in a unicast scenario
S Pfennig, E Franz
2014 International Symposium on Network Coding (NetCod), 1-6, 2014
92014
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
J Richter, E Franz, S Engelmann, S Pfennig, EA Jorswieck
2013 IEEE 18th International Workshop on Computer Aided Modeling and Design …, 2013
92013
Secure and energy-efficient interconnects for board-to-board communication
B Matthiesen, S Pfennig, M Bielert, T Ilsche, A Lonnstrom, T Li, ...
2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband …, 2017
82017
Efficiency of secure network coding schemes
E Franz, S Pfennig, A Fischer
Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International …, 2012
82012
End-to-end key establishment with physical layer key generation and specific attacker models
S Pfennig, E Franz, S Engelmann, A Wolf
Physical and Data-Link Security Techniques for Future Communication Systems …, 2016
72016
Modeling communication delays for network coding and routing for error-prone transmission
S Pfennig, E Franz, FM Ciorba, T Ilsche, WE Nagel
Third International Conference on Future Generation Communication …, 2014
72014
Security aspects of confidential network coding
S Pfennig, E Franz
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
62017
Secure network coding: Dependency of efficiency on network topology
S Pfennig, E Franz
2013 IEEE International Conference on Communications (ICC), 2100-2105, 2013
52013
Energy models for communication of future computing platforms
E Franz, S Pfennig, B Matthiesen, C Scheunert, EA Jorswieck
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), 1-5, 2015
42015
Communication overhead of network coding schemes secure against pollution attacks
E Franz, DIS Pfennig, DIA Fischer
42012
Sichere und effiziente Netzwerkcodierung
IS Pfennig
32019
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer
S Pfennig, K Feldhoff, FM Ciorba, E Franz, T Reiher, M Bielert, T Ilsche, ...
Proceedings of the 24th High Performance Computing Symposium, 1-8, 2016
32016
Confidential Network Coding: Physical Layer vs. Network Layer
S Pfennig, E Franz, J Richter, C Scheunert, EA Jorswieck
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), 1-5, 2015
32015
Analysis of parallel applications on a high performance–low energy computer
FM Ciorba, T Ilsche, E Franz, S Pfennig, C Scheunert, U Markwardt, ...
Euro-Par 2014: Parallel Processing Workshops: Euro-Par 2014 International …, 2014
32014
Comparison of different secure network coding paradigms concerning transmission efficiency
S Pfennig, E Franz
2013 IEEE 18th International Workshop on Computer Aided Modeling and Design …, 2013
22013
Robust secret sharing for end-to-end key establishment with physical layer keys under active attacks
S Pfennig, S Engelmann, E Franz, A Wolf
Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018
12018
Verification of Resilient Communication Models for the Simulation of a Highly Adaptive Energy-Efficient Computer
M Bielert, K Feldhoff, FM Ciorba, S Pfennig, E Franz, T Ilsche, WE Nagel
27th ACM/IEEE International Conference for High Performance Computing …, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20