Dr. Heiko Niedermayer
Research
Topics
- Realistic Modeling
- Resilience
- Social Informatics / Internet Science
- Security and Privacy
TPC
- TPC co-Chair of Internet Science Conference 2018 (INSCI 2018)
projects
- RECODIS: Cost Action on Resilient Communication Services Protecting End-user Applications from Disaster-based Failures (2016 – 2020)
- SafeCloud: Safe and Privacy-Friendly Cloud Infrastructures (2015 – 2018)
- SURF: Systemic Security for Critical Infrastructures (2014 – 2016)
- EINS: European Network of Excellence of Internet Science (2011 – 2015)
- SecFuNet: Security for Future Networks (2011 – 2014)
- ANSII: Anomalieerkennung und eingebettete Sicherheit in industriellen Informationssystemen (2012 – 2014)
Teaching
- Network Security
- Peer-to-Peer Systems and Security
- Seminar IITM and FI (advisor)
Publications
2019-04-01 | Holger Kinkelin, Heiko Niedermayer, Marc-Oliver Müller, Georg Carle, “Multi-party authorization and conflict mediation for decentralized configuration management processes,” in IM 2019 - IEEE/IFIP Workshop HotNSM 2019, Washington D.C., USA, Apr. 2019. [Preprint] [Bib] |
2018-09-01 | Michael Köpferl, Heiko Niedermayer, Georg Carle, “Security, Safety and Availability Triad in a Real-world Industrial Environment and Resulting Challenges,” in GI/ACM-Workshop: Standardisation on Industry 4.0 Automation and Control Systems, Sep. 2018. [Bib] |
2018-04-01 | Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle, “Trustworthy Configuration Management for Networked Devices using Distributed Ledgers,” in NOMS 2018 - IEEE/IFIP DOMINOS workshop, Apr. 2018. [Preprint] [Bib] |
2018-04-01 | Michael Mitterer, Heiko Niedermayer, Marcel von Maltitz, Georg Carle, “An Experimental Performance Analysis of the Cryptographic Database ZeroDB,” in 1st Workshop on Privacy by Design in Distributed Systems (co-located with EuroSys), Apr. 2018. [Pdf] [Bib] |
2018-02-01 | F. Helfert, H. Niedermayer, G. Carle, “Evaluation of Algorithms for Multipath Route Selection over the Internet ,” in 14th International Workshop on Design of Reliable Communication Networks (DRCN), Feb. 2018. [Pdf] [Bib] |
2017-11-01 | Heiko Niedermayer, Nikolai Schwellnus, Daniel Raumer, Edwin Cordeiro, Georg Carle, “Information Mining from Public Mailing Lists: A Case Study on IETF Mailing Lists,” in Proceedings of the 4th international conference on Internet Science, INSCI2017, Thessaloniki, Greece, Nov. 2017. [Pdf] [Bib] |
2016-09-01 | Heiko Niedermayer, Daniel Raumer, Nikolai Schwellnus, Edwin Cordeiro, Georg Carle, “An Analysis of IETF Activities Using Mailing Lists and Social Media ,” in Proceedings of the third international conference on Internet Science, INSCI2016, Florence, Italy, Sep. 2016. [Pdf] [Bib] |
2016-06-01 | Jacek Rak, Heiko Niedermayer, Dimitri Papadimitriou, Pablo Romero, “Information-driven network resilience: Research challenges and perspectives,” Optical Switching and Networking, Jun. 2016. [Bib] |
2014-10-01 | Holger Kinkelin, Marcel von Maltitz, Benedikt Peter, Cornelia Kappler, Heiko Niedermayer, Georg Carle, “Privacy Preserving Energy Management,” in Proceeding of City Labs Workshop in conjunction with the International Conference on Social Informatics (SocInfo 2014), Barcelona, Spain, Oct. 2014. [Pdf] [Bib] |
2014-10-01 | Holger Kinkelin, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “Human-Centric and Privacy-Protecting Trust Establishment over the Internet,” in Proceeding of the Seventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), Nice, France, Oct. 2014. [Bib] |
2014-09-01 | Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin, “Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services,” in Ninth International Conference on Availability, Reliability and Security (ARES), Sep. 2014, pp. 317–324. [Bib] |
2014-06-01 | Cornelius Diekmann, Stephan-A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle, “Verifying Security Policies using Host Attributes,” in FORTE – 34th IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems, Berlin, Germany, Jun. 2014, vol. 8461, pp. 133–148. [Pdf] [Preprint] [Slides] [Sourcecode] [Rawdata] [DOI] [Bib] |
2013-10-01 | Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “Enabling Sustainable Smart Neighborhoods,” in 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability 2013 (SustainIT 2013), Palermo, Italy, Oct. 2013. [Pdf] [Bib] |
2011-01-01 | Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “On Using TPM for Secure Identities in Future Home Networks,” Future Internet, vol. 3, no. 1, pp. 1–13, 2011. [Pdf] [DOI] [Bib] |
2010-10-29 | Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Georg Carle, “On Using TPM for Secure Identities in Future Networks (ext. abstract),” in Proceedings of Security in NGNs and the Future Internet Workshop, Sep. 2010. [Bib] |
2010-08-01 | Ali Fessi, Nathan Evans, Heiko Niedermayer, Ralph Holz, “Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich, Aug. 2010. [Pdf] [Bib] |
2010-07-01 | Heiko Niedermayer, “Architecture and Components of secure and anonymous Peer-to-Peer Systems,” PhD thesis, Technische Universität München, Jul. 2010. [Pdf] [Bib] |
2010-06-01 | Holger Kinkelin, Heiko Niedermayer, Ralph Holz, Georg Carle, “TPM-based Access Control for the Future Internet (ext. abstract),” in 5th GI/ITG KuVS Workshop on Future Internet, Stuttgart, Germany, Jun. 2010. [Bib] |
2009-12-01 | Ralph Holz, Christoph P. Mayer, Sebastian Mies, Heiko Niedermayer, Muhammad Adnan Tariq, “SpoVNet Security Task Force Report,” Universität Karlsruhe, Karlsruhe, Germany, Technical Report TM-2009-3, Dec. 2009. [Pdf] [Homepage] [Bib] |
2009-12-01 | Marc Fouquet, Heiko Niedermayer, Georg Carle, “Cloud Computing for the Masses,” in Proceedings of the 1st ACM Workshop on User-provided Networking, co-located with CoNEXT 2009, Rome, Italy, Dec. 2009. [Bib] |
2009-09-01 | Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, Georg Carle, “On Using Home Networks and Cloud Computing for a Future Internet of Things,” in Proc. Future Internet Symposium 2009 (FIS 2009), Berlin, Germany, Sep. 2009. [Bib] |
2009-03-01 | Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel Laskov, “CLIO – A Cross-Layer Information Service for Overlay Network Optimization,” in Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, Mar. 2009. [Pdf] [Homepage] [Bib] |
2008-12-01 | Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” International Journal of Advanced Media and Communication (IJAMC), vol. 2, no. 4, pp. 351–363, Dec. 2008. [Bib] |
2008-07-01 | Georg Carle, Holger Kinkelin, Andreas Müller, Heiko Niedermayer, Marc-Oliver Pahl, Alexander König, Thomas Luckenbach, Klaus Scholl, Mario Schuster, Lasse Thiem, Leo Petrak, Markus Steinmetz, Christoph Niedermeier, Jürgen Reichmann, “Autonomic Home Networks in the BMBF project AutHoNe,” in 8th Würzburg Workshop on IP (EuroView 2008), Jul. 2008. [Bib] |
2008-04-01 | Ralph Holz, Heiko Niedermayer, “A Protocol for Inter-Domain Authentication with a Trust-Rating Mechanism.,” in 8. Kryptotag der GI-Fachgruppe KRYPTO (Workshop). Technical Report WSI-2008-02. University of Tübingen, Apr. 2008. [Bib] |
2008-03-01 | Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” in Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008), Reno, Nevada, USA, Mar. 2008. [Bib] |
2008-01-01 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle, “Trust-Rated Authentication for Domain-Structured Distributed Systems,” in Proc. 5th European PKI Workshop: Theory and Practice (EuroPKI 2008), Trondheim, Norway, 2008. [Pdf] [Bib] |
2007-11-01 | Olaf Landsiedel, Alexis Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle, “Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks,” in Proceedings of IEEE Global Communication Conference (GlobeCom), Washington, DC, USA, Nov. 2007. [Bib] |
2007-07-01 | Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), New York), Jul. 2007. [Pdf] [Bib] |
2007-01-01 | Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” in Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nevada, USA, Jan. 2007. [Pdf] [Bib] |
2007-01-01 | Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “CoSIP - a hybrid architecture for reliable and secure SIP services,” Praxis in der Informationsverarbeitung und Kommunikation (PIK), special issue on Voice over IP, 2007. [Bib] |
2006-11-01 | Andreas Klenk, Heiko Niedermayer, Marcus Masekowsky, Georg Carle, “An Architecture for Autonomic Security Adaptation,” Journal Annals of the Telecommunications, vol. 61, no. 9/10, Nov. 2006. [Pdf] [Bib] |
2006-08-01 | Simon Rieche, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Klaus Wehrle, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” Wilhelm-Schickard-Institute for Computer Science, University of Tübingen, Tübingen, Germany, Technical Report WSI-2006-04, Aug. 2006. [Bib] |
2006-06-30 | K. Wehrle, H. Niedermayer, “Improving Performance-oriented Simulation Models for Communication Networks,” in MSO 2004 (Modelling, Simulation, and Optimization), Kauai, Hawaii., Aug. 2004. [Bib] |
2006-06-30 | S. Rieche, K. Wehrle, H. Niedermayer, S. Götz, “Reliability and Load Balancing in DHTs,” in chapter in the book Ralf Steinmetz, Klaus Wehrle (Eds.) Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science Volume 3485, 657 pages, Springer, Sep. 2005, pp. 129–146. [Bib] |
2006-06-30 | Simon Rieche, Marc Fouquet, Heiko Niedermayer, Klaus Wehrle, Georg Carle, “On the Use of Structured Peer-to-Peer Systems for Online Gaming,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Pdf] [Bib] |
2006-06-30 | Heiko Niedermayer, Andreas Klenk, Georg Carle, “The Networking Perspective of Security Performance - a Measurement Study -,” in MMB 2006, Nürnberg, Germany, Mar. 2006. [Pdf] [Bib] |
2006-06-30 | H. Niedermayer, S. Rieche, K. Wehrle, Georg Carle, “On the Distribution of Nodes in Distributed Hash Tables,” in KiVS 2005 (Workshop Peer-to-Peer-Systeme und Anwendungen), Kaiserslautern, Germany., Mar. 2005. [Bib] |
2006-06-30 | H. Niedermayer, O. Rose, “Solution Approaches for the Cluster Tool Scheduling Problem in Semiconductor Manufacturing,” in ESS 2004 (16th European Simulation Symposium), Budapest, Hungary., Oct. 2004. [Bib] |
2006-06-30 | Heiko Niedermayer, Klaus Wehrle, Thomas Schreiner, Georg Carle, “Considering Security in Distributed Hash Tables,” in Abstract at 4th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Germany., Jul. 2004. [Bib] |
2006-06-30 | H. Niedermayer, “Optimierungsmethoden für Fabriken mit Clustertool-Workcentern.” talk on the 7th Workshop Simulation und Leistungsbewertung von Fertigungssystemen(Performance Analysis and Simulation in Manufacturing), TU Dresden, Germany., Nov-2004. [Bib] |
2006-06-30 | H. Niedermayer, O. Rose, “A Simulation-Based Analysis of the Cycle Time of Cluster Tools in Semiconductor Manufacturing,” in 5th European Simulation Symposium, Delft, Netherlands., Oct. 2003. [Bib] |
2006-06-30 | H. Niedermayer, “Scheduling von Clustertools.” talk on the 6th Workshop Leistungsbewertung und Simulation von Fertigungsanlagen(Performance Analysis and Simulation in Manufacturing), Würzburg, Germany, Nov-2003. [Bib] |
2006-06-30 | H. Niedermayer, O. Rose, “Approximation of Cycle Times of Cluster Tools in Semiconductor Manufacturing,” in IERC 2004 (Industrial Engineering Research Conference), Houston, Texas., May 2004. [Bib] |
2006-06-30 | O. Landsiedel, S. Rieche, H. Niedermayer, K. Wehrle, Georg Carle, “Anonymous IP-Services via Overlay Routing,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement,IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Bib] |
2006-06-30 | O. Landsiedel, K. Wehrle, H. Niedermayer, “An Infrastructure for Anonymous Internet Services,” in International Workshop on Innovations In Web Infrastructure (IWI2005), 14th International World Wide Web Conference - WWW2005, Chiba/Tokyo, Japan, May 2005. [Bib] |
2006-06-30 | Andreas Klenk, Marcus Masekowsky, Heiko Niedermayer, Georg Carle, “ESAF - an Extensible Security Adaptation Framework,” in 10th Nordic Workshop on Secure IT-systems, Tartu, Estonia, Oct. 2005. [Pdf] [Bib] |
2006-06-30 | T. Heer, H. Niedermayer, L. Petrak, S. Rieche, K. Wehrle, “On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios,” in Informatik 2004 (Workshop on Peer-to-Peer Systems), Ulm, Germany., Sep. 2004. [Bib] |