default search action
Milan Stute
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i9]Stephan Kleber, Milan Stute, Matthias Hollick, Frank Kargl:
Network Message Field Type Classification and Recognition for Unknown Binary Protocols. CoRR abs/2301.03584 (2023) - 2022
- [j4]Milan Stute, Florian Kohnhäuser, Lars Baumgärtner, Lars Almon, Matthias Hollick, Stefan Katzenbeisser, Bernd Freisleben:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. IEEE Trans. Dependable Secur. Comput. 19(3): 1722-1734 (2022) - [c17]Stephan Kleber, Frank Kargl, Milan Stute, Matthias Hollick:
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols. DSN Workshops 2022: 80-87 - 2021
- [j3]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. Proc. Priv. Enhancing Technol. 2021(3): 227-245 (2021) - [c16]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. USENIX Security Symposium 2021: 3577-3594 - [c15]Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick:
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. USENIX Security Symposium 2021: 3917-3934 - [c14]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. WISEC 2021: 371-373 - [c13]Alexander Heinrich, Milan Stute, Matthias Hollick:
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. WISEC 2021: 374-376 - [i8]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. CoRR abs/2103.02282 (2021) - [i7]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 481 (2021) - [i6]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 893 (2021) - 2020
- [b1]Milan Stute:
Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks. Darmstadt University of Technology, Germany, 2020 - [j2]Milan Stute, Pranay Agarwal, Abhinav Kumar, Arash Asadi, Matthias Hollick:
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. IEEE Internet Things J. 7(8): 6802-6816 (2020) - [i5]Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick:
Empirical Insights for Designing Information and Communication Technology for International Disaster Response. CoRR abs/2005.04910 (2020) - [i4]Alexander Heinrich, Milan Stute, Matthias Hollick:
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. CoRR abs/2007.00349 (2020)
2010 – 2019
- 2019
- [j1]Milan Stute, David Kreitschmann, Matthias Hollick:
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol. GetMobile Mob. Comput. Commun. 23(1): 30-33 (2019) - [c12]Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick:
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. USENIX Security Symposium 2019: 37-54 - 2018
- [c11]Daniel Steinmetzer, Milan Stute, Matthias Hollick:
TPy: A Lightweight Framework for Agile Distributed Network Experiments. WiNTECH 2018: 38-45 - [c10]Milan Stute, David Kreitschmann, Matthias Hollick:
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. MobiCom 2018: 529-543 - [c9]Milan Stute, David Kreitschmann, Matthias Hollick:
Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. MobiCom 2018: 820-822 - [i3]Milan Stute, David Kreitschmann, Matthias Hollick:
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. CoRR abs/1808.03156 (2018) - [i2]Milan Stute, David Kreitschmann, Matthias Hollick:
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. CoRR abs/1812.06743 (2018) - 2017
- [c8]Lars Baumgärtner, Stefan Kohlbrecher, Juliane Euler, Tobias Ritter, Milan Stute, Christian Meurisch, Max Mühlhäuser, Matthias Hollick, Oskar von Stryk, Bernd Freisleben:
Emergency communication in challenged environments via unmanned ground and aerial vehicles. GHTC 2017: 1-9 - [c7]Jeremy Lakeman, Matthew Lloyd, Romana Challans, Angus Wallace, Paul Gardner-Stephen, Milan Stute, Matthias Hollick:
A practical and secure social media facility for internet-deprived populations. GHTC 2017: 1-9 - [c6]Christian Meurisch, Julien Gedeon, Artur Gogel, The An Binh Nguyen, Fabian Kaup, Florian Kohnhäuser, Lars Baumgärtner, Milan Schmittner, Max Mühlhäuser:
Temporal Coverage Analysis of Router-Based Cloudlets Using Human Mobility Patterns. GLOBECOM 2017: 1-6 - [c5]Christian Meurisch, The An Binh Nguyen, Julien Gedeon, Florian Kohnhäuser, Milan Schmittner, Stefan Niemczyk, Stefan Wullkotte, Max Mühlhäuser:
Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge. ICCCN 2017: 1-2 - [c4]Florian Kohnhäuser, Milan Stute, Lars Baumgärtner, Lars Almon, Stefan Katzenbeisser, Matthias Hollick, Bernd Freisleben:
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios. LCN 2017: 195-198 - [c3]Milan Stute, Max Maass, Tom Schons, Matthias Hollick:
Reverse Engineering Human Mobility in Large-scale Natural Disasters. MSWiM 2017: 219-226 - [c2]Milan Schmittner, Arash Asadi, Matthias Hollick:
SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks. Networking 2017: 1-9 - [i1]Milan Schmittner, Max Maass, Tom Schons, Matthias Hollick:
Reverse Engineering Human Mobility in Large-scale Natural Disasters. CoRR abs/1708.02151 (2017) - 2016
- [c1]Milan Schmittner, Matthias Hollick:
Xcastor: Secure and scalable group communication in ad hoc networks. WoWMoM 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint