Publications
-
Transactions on Privacy and Security, 29(2):1-30PDF Cite ACM DL Code arXiv
@article{2026-acmtops-wagner-seldom, author = {Wagner, Eric and Matzutt, Roman and Henze, Martin}, title = {{Seldom: An Anonymity Network with Selective Deanonymization}}, journal = {Transactions on Privacy and Security}, publisher = {ACM}, year = {2026}, volume = {29}, number = {2}, month = {3}, pages = {1--30}, keywords = {Tor, Exceptional Access, Translucent Ledger, Threshold Encryption}, issn = {}, doi = {10.1145/3794848}, } -
Author version availablePDF Cite ResearchGate
@misc{2025-researchgate-kong-rl4llm, author = {Kong, Lingxiao and Ramadan, Qusai and Zoubia, Oussama and Polash, Jahid Hasan and Elwes, Mayra and Akbari Gurabi, Mehdi and Jin, Lu and Kutafina, Ekaterina and Matzutt, Roman and Wang, Yuanbin and Xu, Junqi and Beyan, Oya Deniz and Yang, Cong and Boukhers, Zeyd}, title = {{Reinforcement Learning for Large Language Model Fine-Tuning: A Systematic Literature Review}}, year = {2025}, } -
, Workshop paperAcceptedPDF Cite arXiv
@inproceedings{2025-secai-akbari-gurabi-cyberguard, author = {Akbari Gurabi, Mehdi and Nitz, Lasse and Castravet, Radu-Mihai and Matzutt, Roman and Mandal, Avikarsha and Decker, Stefan}, title = {{From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format}}, booktitle = {}, publisher = {Springer}, year = {2025}, pages = {}, keywords = {Incident Response Playbooks, Large Language Models, Prompt Engineering}, isbn = {}, doi = {}, } -
PDF Cite IEEE Xplore
@inproceedings{2024-buildsec-lohmoeller-dataspace-tee, author = {Lohm{\"o}ller, Johannes and Matzutt, Roman and Loos, Joscha and Vlad, Eduard and Pennekamp, Jan and Wehrle, Klaus}, title = {{Complementing Organizational Security in Data Ecosystems with Technical Guarantees}}, booktitle = {}, publisher = {IEEE}, year = {2024}, pages = {}, keywords = {}, isbn = {}, doi = {10.1109/BuildSEC64048.2024.00016}, } -
Cite Springer Link Fraunhofer Publica
@inproceedings{2024-secitc-akbari-gurabi-explainable-phishing-detection, author = {Akbari Gurabi, Mehdi and Mansoor, Muhammad Usman and Matzutt, Roman and Mandal, Avikarsha and Decker, Stefan}, title = {{A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling}}, booktitle = {}, publisher = {Springer}, year = {2024}, pages = {18--35}, keywords = {Incident Handling, Human-machine Teaming, Incident Response}, isbn = {978-3-031-87760-5}, doi = {10.1007/978-3-031-87760-5_3}, } -
, Workshop paperPDF Cite GI DL
@inproceedings{2024-graniteejea-hermsen-dataspace-rag, author = {Hermsen, Felix and Nitz, Lasse and Akbari Gurabi, Mehdi and Matzutt, Roman and Mandal, Avikarsha}, title = {{On Data Spaces for Retrieval Augmented Generation}}, booktitle = {}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, year = {2024}, pages = {701--707}, keywords = {}, isbn = {978-3-88579-746-3}, doi = {10.18420/inf2024_57}, } -
PDF Cite ACM DL
@inproceedings{2024-imf-akbari-gurabi-playbook-requirements, author = {Akbari Gurabi, Mehdi and Nitz, Lasse and Bregar, Andrej and Popanda, Jan and Siemers, Christian and Matzutt, Roman and Mandal, Avikarsha}, title = {{Requirements for Playbook-Assisted Cyber Incident Response, Reporting, and Automation}}, booktitle = {}, publisher = {ACM}, year = {2024}, pages = {}, keywords = {Cybersecurity playbooks, response and recovery, machine-readability}, isbn = {}, doi = {10.1145/3688810}, } -
, Poster abstractPDF Cite ACM DL
@inproceedings{2024-eicccyfrp-matzutt-abe-embeddings, author = {Matzutt, Roman}, title = {{Towards Access Control for Machine Learning Embeddings}}, booktitle = {}, publisher = {ACM}, year = {2024}, pages = {219--220}, keywords = {Attribute-based encryption, embeddings, access control}, isbn = {979-8-4007-1651-5/24/06}, doi = {10.1145/3655693.3661296}, } -
PhD thesisPDF Cite Publisher Page Amazon
@phdthesis{2024-phdthesis-matzutt-blockchain-data-management, author = {Matzutt, Roman}, title = {{Demystifying and Adjusting the Promises of Blockchain-based Data Management in the Permissionless Setting}}, school = {RWTH Aachen University}, year = {2024}, } -
PDF Cite ACM DL
@inproceedings{2024-eicc-matzutt-translucent-blockchains, author = {Matzutt, Roman and Wagner, Eric}, title = {{Towards Improving Accountability in Sensitive-Disclosure Scenarios}}, booktitle = {}, publisher = {ACM}, year = {2024}, pages = {115--119}, keywords = {Sensitive disclosure, accountability, transparency, blockchain}, isbn = {979-8-4007-1651-5/24/06}, doi = {10.1145/3655693.3655715}, } -
Book chapter, in: Blockchains – A Handbook on Fundamentals, Platforms and Applications, pp. 301-336PDF Cite Springer Link
@incollection{2024-blockchains-matzutt-contents-survey, author = {Matzutt, Roman and Henze, Martin and M{\"u}llmann, Dirk and Wehrle, Klaus}, title = {{Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies}}, booktitle = {Blockchains – A Handbook on Fundamentals, Platforms and Applications}, publisher = {Springer Cham}, editor = {}, year = {2024}, pages = {301--336}, keywords = {}, isbn = {978-3-031-32148-1}, doi = {10.1007/978-3-031-32146-7_10}, } -
Book chapter, in: Blockchains – A Handbook on Fundamentals, Platforms and Applications, pp. 531-564Cite Springer Link
@incollection{2024-blockchains-pennekamp-industrial-blockchain-survey, author = {Pennekamp, Jan and Bader, Lennart and Wagner, Eric and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus}, title = {{Blockchain Technology Accelerating Industry 4.0}}, booktitle = {Blockchains – A Handbook on Fundamentals, Platforms and Applications}, publisher = {Springer Cham}, editor = {}, year = {2024}, pages = {531--564}, keywords = {}, isbn = {978-3-031-32148-1}, doi = {10.1007/978-3-031-32146-7_17}, } -
PDF Cite Springer Link
@inproceedings{2023-fps-dahlmanns-colpsa, author = {Dahlmanns, Markus and Matzutt, Roman and Dax, Chris and Wehrle, Klaus}, title = {{Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach}}, booktitle = {}, publisher = {Springer}, year = {2023}, pages = {}, keywords = {}, isbn = {}, doi = {10.1007/978-3-031-57540-2_2}, } -
, Poster abstractPDF Cite ACM DL
@inproceedings{2023-ccs-matzutt-street-problems, author = {Matzutt, Roman and Pennekamp, Jan and Wehrle, Klaus}, title = {{Poster: Accountable Processing of Reported Street Problems}}, booktitle = {}, publisher = {ACM}, year = {2023}, pages = {3591--3593}, keywords = {street problems, accountability, consortium blockchain, privacy}, isbn = {979-8-4007-0050-7}, doi = {10.1145/3576915.3624367}, } -
Computing Surveys, 56(2):1-38PDF Cite ACM DL Kudos
@article{2023-csur-pennekamp-scsok, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus}, title = {{An Interdisciplinary Survey on Information Flows in Supply Chains}}, journal = {Computing Surveys}, publisher = {ACM}, year = {2023}, volume = {56}, number = {2}, month = {9}, pages = {1--38}, keywords = {information flows, data communication, supply chain management, data security, data sharing, systematic literature review}, issn = {0360-0300}, doi = {10.1145/3606693}, } -
, Workshop paperPDF Cite Proceedings
@inproceedings{2022-deco-lohmoeller-data-ecosystems, author = {Lohm{\"o}ller, Johannes and Pennekamp, Jan and Matzutt, Roman and Wehrle, Klaus}, title = {{On the Need for Strong Sovereignty in Data Ecosystems}}, booktitle = {}, publisher = {VLDB Endowment}, year = {2022}, pages = {}, keywords = {data ecosystems, data sovereignty, trustability, transparency, Internet of Production}, isbn = {}, doi = {}, } -
Transactions on Cloud Computing, 10(3):1661-1674PDF Cite IEEE Xplore
@article{2022-ieeetcc-henze-prada, author = {Henze, Martin and Matzutt, Roman and Hiller, Jens and M{\"u}hmer, Erik and Ziegeldorf, Jan Henrik and van der Giet, Johannes and Wehrle, Klaus}, title = {{Complying with Data Handling Requirements in Cloud Storage Systems}}, journal = {Transactions on Cloud Computing}, publisher = {IEEE}, year = {2022}, volume = {10}, number = {3}, month = {9}, pages = {1661--1674}, keywords = {}, issn = {2168-7161}, doi = {10.1109/TCC.2020.3000336}, } -
PDF Cite Code IEEE Xplore
@inproceedings{2022-icbc-matzutt-redactchain, author = {Matzutt, Roman and Ahlrichs, Vincent and Pennekamp, Jan and Karwacik, Roman and Wehrle, Klaus}, title = {{A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content}}, booktitle = {}, publisher = {IEEE}, year = {2022}, pages = {}, keywords = {redactable blockchain, illicit content, chameleon hash functions, threshold cryptography}, isbn = {978-1-6654-9538-7}, doi = {10.1109/ICBC54727.2022.9805508}, } -
PDF Cite IEEE Xplore
@inproceedings{2022-icbc-wagner-ccchain, author = {Wagner, Eric and Matzutt, Roman and Pennekamp, Jan and Bader, Lennart and Bajelidze, Iraki and Wehrle, Klaus and Henze, Martin}, title = {{Scalable and Privacy-Focused Company-Centric Supply Chain Management}}, booktitle = {}, publisher = {IEEE}, year = {2022}, pages = {}, keywords = {supply chain management, blockchain, permissionless, deployment, tracing and tracking, privacy}, isbn = {978-1-6654-9538-7}, doi = {10.1109/ICBC54727.2022.9805503}, } -
Author version availablePDF Cite Code arXiv
@misc{2021-arxiv-munilla-garrido-differential-privacy, author = {Munilla Garrido, Gonzalo and Near, Joseph and Aitsam, Muhammad and He, Warren and Matzutt, Roman and Matthes, Florian}, title = {{Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries}}, year = {2021}, } -
Automation, 2(3):202-219PDF Cite MDPI
@article{2021-automation-pennekamp-manufacturing, author = {Pennekamp, Jan and Matzutt, Roman and Kanhere, Salil S. and Hiller, Jens and Wehrle, Klaus}, title = {{The Road to Accountable and Dependable Manufacturing}}, journal = {Automation}, publisher = {MDPI}, year = {2021}, volume = {2}, number = {3}, month = {9}, pages = {202--219}, keywords = {blockchain, supply chain management, Industry 4.0, manufacturing, secure industrial collaboration, scalability, industrial Internet of Things, Internet of Production}, issn = {2673-4052}, doi = {10.3390/automation2030013}, } -
IEEE Transactions on Network and Service Management, 18(3):3064-3078PDF Cite Code Dataset IEEE Xplore
@article{2021-ieeetnsm-matzutt-coinprune-v2, author = {Matzutt, Roman and Kalde, Benedikt and Pennekamp, Jan and Drichel, Arthur and Henze, Martin and Wehrle, Klaus}, title = {{CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively}}, journal = {IEEE Transactions on Network and Service Management}, publisher = {IEEE}, year = {2021}, volume = {18}, number = {3}, month = {9}, pages = {3064--3078}, keywords = {blockchain, block pruning, synchronization, bootstrapping, scalability, velvet fork, Bitcoin}, issn = {1932-4537}, doi = {10.1109/TNSM.2021.3073270}, } -
Computer Law Review International, 22(1):8-15Cite
@article{2021-cri-schomakers-insights, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker, Indra and Ziefle, Martina}, title = {{Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives}}, journal = {Computer Law Review International}, publisher = {Verlag Dr. Otto Schmidt, K{\"o}ln}, year = {2021}, volume = {22}, number = {1}, month = {2}, pages = {8--15}, keywords = {Information Sensitivity, Privacy, European Data Protection Law}, issn = {2194-4164}, doi = {10.9785/cri-2021-220103}, } -
Information Processing & Management, 58(3)PDF Cite ScienceDirect
@article{2021-ipm-bader-supply-chain, author = {Bader, Lennart and Pennekamp, Jan and Matzutt, Roman and Hedderich, David and Kowalski, Markus and L{\"u}cken, Volker and Wehrle, Klaus}, title = {{Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability}}, journal = {Information Processing & Management}, publisher = {Elsevier}, year = {2021}, volume = {58}, number = {3}, month = {2}, pages = {}, keywords = {}, issn = {0306-4573}, doi = {10.1016/j.ipm.2021.102529}, } -
, Workshop paperPDF Cite GI DL ArXiv
@inproceedings{2021-giinformatik-schomakers-3perspectives, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker, Indra and Ziefle, Martina}, title = {{Putting Privacy into Perspective - Comparing Technical, Legal, and Users' View of Information Sensitivity}}, booktitle = {}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, year = {2021}, pages = {857--870}, keywords = {Information Sensitivity, Privacy, European Data Protection Law}, isbn = {}, doi = {10.18420/inf2020_76}, } -
, Workshop paperPDF Cite IEEE Xplore
@inproceedings{2020-cpssec-pennekamp-end-to-end-sensing, author = {Pennekamp, Jan and Alder, Fritz and Matzutt, Roman and M{\"u}hlberg, Jan Tobias and Piessens, Frank and Wehrle, Klaus}, title = {{Secure End-to-End Sensing in Supply Chains}}, booktitle = {}, publisher = {IEEE}, year = {2020}, pages = {}, keywords = {}, isbn = {978-1-7281-4760-4}, doi = {10.1109/CNS48642.2020.9162337}, } -
PDF Cite Code Dataset Video arXiv IEEE Xplore IFIP DL
@inproceedings{2020-networking-matzutt-coinprune, author = {Matzutt, Roman and Kalde, Benedikt and Pennekamp, Jan and Drichel, Arthur and Henze, Martin and Wehrle, Klaus}, title = {{How to Securely Prune Bitcoin's Blockchain}}, booktitle = {}, publisher = {IFIP}, year = {2020}, pages = {298--306}, keywords = {blockchain, block pruning, synchronization, bootstrapping, scalability, velvet fork, Bitcoin}, isbn = {978-3-903176-28-7}, doi = {}, } -
, Workshop paperPDF Cite IEEE Xplore
@inproceedings{2020-biotcps-pennekamp-supply-chain-accountability, author = {Pennekamp, Jan and Bader, Lennart and Matzutt, Roman and Niemietz, Philipp and Trauth, Daniel and Henze, Martin and Bergs, Thomas and Wehrle, Klaus}, title = {{Private Multi-Hop Accountability for Supply Chains}}, booktitle = {}, publisher = {IEEE}, year = {2020}, pages = {}, keywords = {}, isbn = {978-1-7281-7440-2}, doi = {10.1109/ICCWorkshops49005.2020.9145100}, } -
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
PDF Cite Code ACM DL arXiv@inproceedings{2020-asiaccs-matzutt-anonboot, author = {Matzutt, Roman and Pennekamp, Jan and Buchholz, Erik and Wehrle, Klaus}, title = {{Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services}}, booktitle = {}, publisher = {ACM}, year = {2020}, pages = {531--542}, keywords = {anonymization, bootstrapping, public blockchain, Sybil attack, anonymity network, cryptocurrency tumbler, Bitcoin, Tor}, isbn = {978-1-4503-6750-9/20/10}, doi = {10.1145/3320269.3384729}, } -
, Poster abstractPDF Cite IEEE Xplore
@inproceedings{2020-icoin-matzutt-coralis, author = {Matzutt, Roman and Pennekamp, Jan and Wehrle, Klaus}, title = {{A Secure and Practical Decentralized Ecosystem for Shareable Education Material}}, booktitle = {}, publisher = {IEEE}, year = {2020}, pages = {529--534}, keywords = {}, isbn = {}, doi = {10.1109/ICOIN48656.2020.9016478}, } -
PDF Cite Code IEEE Xplore
@inproceedings{2019-icbc-wagner-dispute-resolution, author = {Wagner, Eric and V{\"o}lker, Achim and Fuhrmann, Frederik and Matzutt, Roman and Wehrle, Klaus}, title = {{Dispute Resolution for Smart Contract-based Two Party Protocols}}, booktitle = {}, publisher = {IEEE}, year = {2019}, pages = {422--430}, keywords = {Ethereum, Bitcoin, smart contracts, two-party protocols, dispute resolution, cross-blockchain trades}, isbn = {978-1-7281-1328-9}, doi = {10.1109/BLOC.2019.8751312}, } -
, Poster abstractPDF Cite IEEE Xplore
@inproceedings{2019-icnp-dahlmanns-knowledge-system, author = {Dahlmanns, Markus and Dax, Chris and Matzutt, Roman and Pennekamp, Jan and Hiller, Jens and Wehrle, Klaus}, title = {{Privacy-Preserving Remote Knowledge System}}, booktitle = {}, publisher = {IEEE}, year = {2019}, pages = {}, keywords = {}, isbn = {978-1-7281-2700-2}, doi = {10.1109/ICNP.2019.8888121}, } -
, Workshop paperPDF Cite IEEE Xplore
@inproceedings{2018-gcwkshps-bader-car-insurance, author = {Bader, Lennart and B{\"u}rger, Jens Christoph and Matzutt, Roman and Wehrle, Klaus}, title = {{Smart Contract-based Car Insurance Policies}}, booktitle = {}, publisher = {IEEE}, year = {2018}, pages = {}, keywords = {Blockchain, Ethereum, Smart Contracts, IoT, Sensory, Insurance, Access Control}, isbn = {978-1-5386-4920-6}, doi = {10.1109/GLOCOMW.2018.8644136}, } -
, Workshop paperPDF Cite IEEE Xplore Website
@inproceedings{2018-bta-matzutt-bitcoin-content-countermeasures, author = {Matzutt, Roman and Henze, Martin and Ziegeldorf, Jan Henrik and Hiller, Jens and Wehrle, Klaus}, title = {{Thwarting Unwanted Blockchain Content Insertion}}, booktitle = {}, publisher = {IEEE}, year = {2018}, pages = {364--370}, keywords = {Bitcoin, blockchain, security, objectionable content, countermeasure}, isbn = {978-1-5386-5008-0}, doi = {10.1109/IC2E.2018.00070}, } -
Future Generation Computer Systems, 80:448-466PDF Cite Code ScienceDirect
@article{2018-fgcs-ziegeldorf-coinparty-v2, author = {Ziegeldorf, Jan Henrik and Matzutt, Roman and Henze, Martin and Grossmann, Fred and Wehrle, Klaus}, title = {{Secure and anonymous decentralized Bitcoin mixing}}, journal = {Future Generation Computer Systems}, publisher = {Elsevier}, year = {2018}, volume = {80}, number = {}, month = {3}, pages = {448--466}, keywords = {Bitcoin, digital cash, privacy-preserving protocols, pseudonymity, anonymity, untraceability}, issn = {0167-739X}, doi = {10.1016/j.future.2016.05.018}, } -
PDF Cite The Morning Paper Website Springer
@inproceedings{2018-fc-matzutt-bitcoin-contents, author = {Matzutt, Roman and Hiller, Jens and Henze, Martin and Ziegeldorf, Jan Henrik and M{\"u}llmann, Dirk and Hohlfeld, Oliver and Wehrle, Klaus}, title = {{A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin}}, booktitle = {}, publisher = {Springer}, year = {2018}, pages = {420--438}, keywords = {}, isbn = {978-3-662-58386-9}, doi = {10.1007/978-3-662-58387-6_23}, } -
Book chapter, in: Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications, pp. 25-56Cite
@incollection{2017-cps-henze-network-sp, author = {Henze, Martin and Hiller, Jens and Hummen, René and Matzutt, Roman and Wehrle, Klaus and Ziegeldorf, Jan Henrik}, title = {{Network Security and Privacy for Cyber-Physical Systems}}, booktitle = {Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications}, publisher = {Wiley-IEEE Press}, editor = {}, year = {2017}, pages = {25--56}, keywords = {security and privacy, lightweight security, cyber-physical systems, Internet of Things, sensor networks, cloud}, isbn = {978-1-119-22604-8}, doi = {10.1002/9781119226079.ch2}, } -
, Workshop paperPDF Cite Slides GI DL
@inproceedings{2017-giinformatik-matzutt-mynedata, author = {Matzutt, Roman and M{\"u}llmann, Dirk and Zeissig, Eva-Maria and Horst, Christiane and Kasugai, Kai and Lidynia, Sean and Wieninger, Simon and Ziegeldorf, Jan Henrik and Gudergan, Gerhard and Spiecker, Indra and Wehrle, Klaus and Ziefle, Martina}, title = {{myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data}}, booktitle = {}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, year = {2017}, pages = {1073--1084}, keywords = {Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling}, isbn = {978-3-88579-669-5}, doi = {10.18420/in2017_109}, } -
PDF Cite IEEE Xplore
@inproceedings{2017-trustcom-henze-dcam, author = {Henze, Martin and Wolters, Benedikt and Matzutt, Roman and Zimmermann, Torsten and Wehrle, Klaus}, title = {{Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things}}, booktitle = {}, publisher = {IEEE}, year = {2017}, pages = {185--192}, keywords = {Internet of Things, Security, Safety, Cloud Computing, Authorization, Network Management}, isbn = {978-1-5090-4905-9}, doi = {10.1109/Trustcom/BigDataSE/ICESS.2017.236}, } -
, 10(Suppl 2):29-42PDF Cite
@article{2017-bmcmedgenomics-ziegeldorf-bloom, author = {Ziegeldorf, Jan Henrik and Pennekamp, Jan and Hellmanns, David and Schwinger, Felix and Kunze, Ike and Henze, Martin and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus}, title = {{BLOOM: BLoom filter based Oblivious Outsourced Matchings}}, journal = {}, publisher = {BioMed Central}, year = {2017}, volume = {10}, number = {Suppl 2}, month = {7}, pages = {29--42}, keywords = {Secure outsourcing, Homomorphic encryption, Bloom filters}, issn = {1755-8794}, doi = {10.1186/s12920-017-0277-y}, } -
PDF Cite arXiv
@techreport{2016-aib-henze-sensorcloud, author = {Henze, Martin and Hummen, René and Matzutt, Roman and Wehrle, Klaus}, title = {{The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud}}, year = {2017}, number = {}, publisher = {Department of Computer Science, RWTH Aachen University}, institution = {}, address = {Ahornstr. 55, 52074 Aachen, Germany}, issn = {0935-3232}, type = {Technical report}, } -
PDF Cite IEEE Xplore
@inproceedings{2017-ic2e-henze-prada, author = {Henze, Martin and Matzutt, Roman and Hiller, Jens and M{\"u}hmer, Erik and Ziegeldorf, Jan Henrik and van der Giet, Johannes and Wehrle, Klaus}, title = {{Practical Data Compliance for Cloud Storage}}, booktitle = {}, publisher = {IEEE}, year = {2017}, pages = {252--258}, keywords = {cloud storage, privacy, data handling requirements, compliance}, isbn = {978-1-5090-5817-4}, doi = {10.1109/IC2E.2017.32}, } -
, Poster abstractPDF Cite ACM DL Website
@inproceedings{2016-ccs-matzutt-bitcoin-contents, author = {Matzutt, Roman and Hohlfeld, Oliver and Henze, Martin and Rawiel, Robin and Ziegeldorf, Jan Henrik and Wehrle, Klaus}, title = {{POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store}}, booktitle = {}, publisher = {ACM}, year = {2016}, pages = {1769--1771}, keywords = {}, isbn = {978-1-4503-4139-4}, doi = {10.1145/2976749.2989059}, } -
MSc. thesis
-
Book chapter, in: Trusted Cloud Computing, pp. 77-106Cite
@incollection{2014-tcc-henze-trustpoint, author = {Henze, Martin and Hummen, René and Matzutt, Roman and Wehrle, Klaus}, title = {{A Trust Point-based Security Architecture for Sensor Data in the Cloud}}, booktitle = {Trusted Cloud Computing}, publisher = {Springer}, editor = {}, year = {2014}, pages = {77--106}, keywords = {Sensor Network, Sensor Node, Cloud Computing, Sensor Data, Data Item}, isbn = {978-3-319-12717-0}, doi = {10.1007/978-3-319-12718-7_6}, } -
, 5(4):97-112PDF Cite
@article{2013-ijghpc-henze-sensorcloud, author = {Henze, Martin and Hummen, René and Matzutt, Roman and Catrein, Daniel and Wehrle, Klaus}, title = {{Maintaining User Control While Storing and Processing Sensor Data in the Cloud}}, journal = {}, publisher = {IGI Global}, year = {2013}, volume = {5}, number = {4}, month = {12}, pages = {97--112}, keywords = {}, issn = {1938-0259}, doi = {10.4018/ijghpc.2013100107}, } -
BSc. thesisCite
@mastersthesis{2013-bscthesis-matzutt-sensorcloud, author = {Matzutt, Roman}, title = {{User-controlled Utilization of Sensor Data for Cloud Computing}}, school = {Communication and Distributed Systems, RWTH Aachen University}, year = {2013}, type = {Bachelor's thesis}, }