Follow
Anwar Hithnawi
Anwar Hithnawi
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
H Shafagh, A Hithnawi, S Duquennoy
ACM Cloud Computing Security Workshop (CCSW 2017)., 2017
4082017
Talos: Encrypted Query Processing for the Internet of Things
H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu
ACM Conference on Embedded Network Sensor Systems (SenSys 2015), 197-210, 2015
1022015
Understanding the impact of cross technology interference on IEEE 802.15. 4
A Hithnawi, H Shafagh, S Duquennoy
ACM Workshop on Wireless Network Testbeds, Experimental Evaluation and …, 2014
652014
TIIM: technology-independent interference mitigation for low-power wireless networks
A Hithnawi, H Shafagh, S Duquennoy
ACM Conference on Information Processing in Sensor Networks (IPSN 2015), 1-12, 2015
642015
Secure sharing of partially homomorphic encrypted iot data
H Shafagh, A Hithnawi, L Burkhalter, P Fischli, S Duquennoy
ACM Conference on Embedded Network Sensor Systems (SenSys 2017), 1-14, 2017
562017
CrossZig: Combating Cross-Technology Interference in Low-power Wireless Networks
A Hithnawi, S Li, H Shafagh, J Gross, S Duquennoy
ACM Conference on Information Processing in Sensor Networks (IPSN 2016), 1-12, 2016
472016
SoK: Fully Homomorphic Encryption Compilers
A Viand, P Jattke, A Hithnawi
IEEE S&P, 2021
352021
Poster: Towards Encrypted Query Processing for the Internet of Things
H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu
ACM Conference on Mobile Computing and Networking (MobiCom 2015), 251-253, 2015
352015
Security Comes First, A Public-key Cryptography Framework for the Internet of Things
H Shafagh, A Hithnawi
IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2014 …, 2014
332014
Come Closer: Proximity-based Authentication for the Internet of Things
H Shafagh, A Hithnawi
ACM Conference on Mobile Computing and Networking (MobiCom 2014), 421-424, 2014
23*2014
TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
L Burkhalter, A Hithnawi, A Viand, H Shafagh, S Ratnasamy
USENIX NSDI 2020, 835-850, 2020
172020
A Receiver-based 802.11 Rate Adaptation Scheme with on-demand Feedback
F Schmidt, A Hithnawi, O Punal, J Gross, K Wehrle
IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC …, 2012
122012
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
H Shafagh, L Burkhalter, S Ratnasamy, A Hithnawi
USENIX Security Symposium 2020, 2469-2486, 2020
112020
Droplet: Decentralized authorization for IoT data streams
H Shafagh, L Burkhalter, S Ratnasamy, A Hithnawi
arXiv preprint arXiv:1806.02057, 2018
92018
Demo Abstract: Talos a Platform for Processing Encrypted IoT Data
H Shafagh, L Burkhalter, A Hithnawi
ACM Conference on Embedded Network Sensor Systems (SenSys 2016), 308-309, 2016
8*2016
Zeph: Cryptographic Enforcement of End-to-End Data Privacy
L Burkhalter, N Küchler, A Viand, H Shafagh, A Hithnawi
USENIX OSDI 21, 387-404, 2021
72021
Exploiting Physical Layer Information to Mitigate Cross-technology Interference Effects on Low-power Wireless Networks
A Hithnawi
ACM Conference on Information Processing in Sensor Networks (IPSN 2013), 2013
72013
Rofl: Attestable robustness for secure federated learning
L Burkhalter, H Lycklama, A Viand, N Küchler, A Hithnawi
arXiv preprint arXiv:2107.03311, 2021
62021
An On-Demand Rate-Adaptation Mechanism For IEEE 802.11 Networks
A Hithnawi
Master Thesis, RWTH Aachen University, Germany, 2011
52011
Privacy-preserving quantified Self: Secure Sharing and Processing of Encrypted Small Data
H Shafagh, A Hithnawi
ACM SIGCOMM Workshop on Mobility in the Evolving Internet Architecture …, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20