Research Areas:
- Network Security
- Security of Embedded Systems
- Network Virtualization
- Signaling Protocols
- New routing algorithms and paradigms
Zirkel 2
76131 Karlsruhe
R. Bless, M. Röhricht, C. Werle. Authenticated Quality-of-Service Signaling for Virtual Networks. In: Journal of Communications, Vol. 7, No. 1, ISSN 1796-2021, pp. 17-27, January 2012 |
L. Völker, M. Noe, O. Waldhorst, C. Werle, C. Sorge. Can Internet users protect themselves? Challenges and Techniques of Automated Protection of HTTP Communication. In: Computer Communications, Vol. 34, No. 3, pp. 457-467, March 2011 |
C. Werle, M. Kind, O. Maennel, G. Schaffrath, A. Feldmann. Network Virtualization - An Enabler for Overcoming Ossification. In: Ercim News, No. 77, ISSN 0926-4981, pp. 21-22, April 2009 |
C. Werle, O. Waldhorst. Greedy Failure-Carrying Packets. International Conference on Computing, Networking and Communications 2014, Honolulu, Hawaii, USA, February 2014 |
C. Werle, S. Mies, M. Zitterbart. On Benchmarking Routing Protocols. Proceedings of the 17th IEEE International Conference on Networks (ICON2011), Singapore, December 2011 |
R. Bless, M. Röhricht, C. Werle. Authenticated Setup of Virtual Links with Quality-of-Service Guarantees. Proceedings of 20th IEEE International Conference on Computer Communications and Networks (ICCCN 2011), pp. 1-8, Maui, HI, USA, August 2011 |
C. Werle, L. Völker, R. Bless. Attachment of End Users to Virtual Networks. 4th GI/ITG KuVS Workshop on The Future Internet, Zurich, Switzerland, November 2009 |
R. Bless, C. Haas, C. Werle, C. Krauß. Security Challenges for Integration of IP into Cars. KIT Workshop "Fahrzeugkommnikation", Karlsruhe, Germany, November 2009 |
C. Werle, R. Bless, P. Papadimitriou, G. Schaffrath, A. Feldmann, A. Greenhalgh, M. Kind, O. Maennel, L. Mathy. Network Virtualization Architecture: Proposal and Initial Prototype. Proceedings of The First ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, pp. 63-71, Barcelona, Spain, August 2009 |
R. Bless, C. Werle. Network Virtualization from a Signaling Perspective. Proceedings of the International Workshop on the Network of the Future 2009, Dresden, Germany, June 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. Selecting Concurrent Network Architectures at Runtime. Proceedings of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. A Node Architecture for 1000 Future Networks. Proceedings of the International Workshop on the Network of the Future 2009, Dresden, Germany, June 2009 |
R. Bless, C. Werle. Control Plane Issues in the 4WARD Network Virtualization Architecture. Proceedings of the KiVS Workshop on Overlay and Network Virtualization, Kassel, Germany, March 2009 |
L. Völker, D. Martin, C. Werle, M. Zitterbart, I. Khayat. An Architecture for Concurrent Future Networks. 2nd GI/ITG KuVS Workshop on The Future Internet, Karlsruhe, Germany, November 2008 |
L. Völker, C. Werle, M. Zitterbart. Decision Process for Automated Selection of Security Protocols. 33rd IEEE Conference on Local Computer Networks (LCN 2008), pp. 223-229, Montreal, Canada, October 2008 |
C. Werle, R. Bless, P. Papadimitriou, W. Louati, I. Houidi, D. Zeghlache, L. Mathy. Building Virtual Networks Across Multiple Domains. ACM SIGCOMM, Toronto, Kanada, August 2011 |
L. Völker, C. Werle, M. Noe, B. Behringer. Auto-Configuration for Communication Security (Poster+Demo). March 2009 |
C. Werle, C. Haas. Security in Embedded IP-based Systems Problem space and future directions. 5. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Essen, Germany, April 2011, Essen, Deutschland, April 2011 |
C. Werle, L. Völker. Network Access Challenges in a Future Internet. 4. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Essen, Germany, April 2010 |
L. Völker, C. Werle. Security in the Future Internet: Assessment, problems, and first solutions. Meeting of the Network Security working group of the ITG, VDE, Heidelberg, Germany, June 2009 |
L. Völker, C. Werle, M. Zitterbart. Choosing the right Security Protocol: A flexible automated approach. 3. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Essen, Germany, April 2008 |
D. Dudek, S. Krause, L. Völker, C. Werle, M. Zitterbart. Netzsicherheit und Hackerabwehr. Seminarband WS08/09. Technischer Bericht TM-2009-2, KIT Scientific Publishing, March 2009 |
Titel | chair | advisor | person in charge |
---|---|---|---|
Implementierung und Optimierung des Routingprotokolls PIE für den Einsatz in dynamischen Netzen | Skalierbares Routing | Fabian Geisberger |
Titel | chair | advisor | person in charge |
---|---|---|---|
Signalisierung und Visualisierung transparent genutzer Sicherheitsmechanismen | Netzsicherheit | Michael Weber | |
Implementierung und simulative Untersuchung von Identity Hash Routing | Skalierbares Routing | Matthias Preis | |
Schicht 2-Anbindung von Endnutzern an virtuelle Netze | Netzvirtualisierung | Christoph Werle |
Fabian Geisberger |
AAA-Dienst für die Anbindung von Endnutzern an virtuelle Netze | Netzvirtualisierung, Netzsicherheit | Christoph Werle |
Martin Merkel |