Zobrazeno 1 - 10
of 563
pro vyhledávání: '"A Gegenhuber"'
Autor:
Gegenhuber, Gabriel K., Günther, Maximilian, Maier, Markus, Judmayer, Aljosha, Holzbauer, Florian, Frenzel, Philipp É., Ullrich, Johanna
With over 3 billion users globally, mobile instant messaging apps have become indispensable for both personal and professional communication. Besides plain messaging, many services implement additional features such as delivery and read receipts info
Externí odkaz:
http://arxiv.org/abs/2411.11194
Autor:
Gegenhuber, Gabriel Karl, Holzbauer, Florian, Frenzel, Philipp, Weippl, Edgar, Dabrowski, Adrian
Publikováno v:
USENIX Security 2024
Voice over Wi-Fi (VoWiFi) uses a series of IPsec tunnels to deliver IP-based telephony from the subscriber's phone (User Equipment, UE) into the Mobile Network Operator's (MNO) core network via an Internet-facing endpoint, the Evolved Packet Data Gat
Externí odkaz:
http://arxiv.org/abs/2407.19556
Publikováno v:
17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024)
In today's cellular network evolutions, such as 4G and 5G, the IMS (IP Multimedia Subsystem) serves as a crucial component in managing voice calls and handling short messages. Besides accessing the IMS over the traditional radio layer, many operators
Externí odkaz:
http://arxiv.org/abs/2406.12348
Publikováno v:
22nd Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2024)
In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an integral role in terminating voice calls and short messages. Many operators use VoWiFi (Voice over Wi-Fi, also Wi-Fi calling) as an alternative network access
Externí odkaz:
http://arxiv.org/abs/2403.11759
Autor:
Gegenhuber, Gabriel Karl, Maier, Markus, Holzbauer, Florian, Mayer, Wilfried, Merzdovnik, Georg, Weippl, Edgar, Ullrich, Johanna
Publikováno v:
Computers & Security 2023/5/25
Tor provides anonymity to millions of users around the globe which has made it a valuable target for malicious actors. As a low-latency anonymity system, it is vulnerable to traffic correlation attacks from strong passive adversaries such as large au
Externí odkaz:
http://arxiv.org/abs/2403.08517
Publikováno v:
USENIX Security 2023
Cellular networks are not merely data access networks to the Internet. Their distinct services and ability to form large complex compounds for roaming purposes make them an attractive research target in their own right. Their promise of providing a c
Externí odkaz:
http://arxiv.org/abs/2403.08507
Publikováno v:
IEEE Global Communications Conference (GLOBECOM) 2022
Zero-rating, the practice of not billing data traffic that belongs to certain applications, has become popular within the mobile ecosystem around the globe. There is an ongoing debate whether mobile operators should be allowed to differentiate traffi
Externí odkaz:
http://arxiv.org/abs/2403.08066
Autor:
Qingtao Sun, Daniëlle van de Lisdonk, Miriam Ferrer, Bruno Gegenhuber, Melody Wu, Youngkyu Park, David A. Tuveson, Jessica Tollkuhn, Tobias Janowitz, Bo Li
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-19 (2024)
Abstract Interleukin-6 (IL-6) has been long considered a key player in cancer cachexia. It is believed that sustained elevation of IL-6 production during cancer progression causes brain dysfunctions, which ultimately result in cachexia. However, how
Externí odkaz:
https://doaj.org/article/0ffe8eb9112f497da2e4fea49fef27ae
Publikováno v:
Schmalenbach Journal of Business Research, Vol 76, Iss 1, Pp 113-149 (2024)
Abstract Despite much progress in the research on pivots as a response to crisis, the nature of temporary pivots remains unclear. This article investigates how a venture responded to the challenges of the COVID-19 pandemic by performing a temporary p
Externí odkaz:
https://doaj.org/article/c5e81786937041c182da79ab1ab7e45c
Publikováno v:
Digital Transformation and Institutional Theory