Westhoff, Dirk, Prof.Dr. rer. nat. habil.

Westhoff, Dirk, Prof.Dr. rer. nat. habil.
Room: D304 Badstraße 24
77652 Offenburg
Badstraße 24a
Room: STB2.17
77652 Offenburg 0781 205-4674 dirk.westhoff@hs-offenburg.de nach Vereinbarung Work Areas : Netzwerk Sicherheit, Netzwerkplanung & -management, Verlässliche verteilte Systeme, Sicherheit in Webapplikationen, International Security Trends, Objektorientierte und Prozedurale Programmierung, Betriebssysteme

Function

Lectures (current and previous semester)

  • Projektarbeit, M+I303
  • Labor sichere heterogene Umgebungen, M+I236
  • Sichere Netzwerke, M+I295
  • Netzwerks-Sicherheitskomponenten, M+I237
  • Netzwerkplanung & -management, M+I244
  • Sichere heterogene Umgebungen, M+I287
  • Mobile Security, M+I814
  • Labor Mobile Security, M+I815
  • Sicherheit in Webapplikationen, M+I274
  • Labor Sicherheit in Webapplikationen, M+I280
  • Programmierung, M+I370
  • Labor Programmierung, M+I371
  • Security Trends, M+I254
  • Verlässliche verteilte Systeme, M+I287
  • Labor verlässliche verteilte Systeme, M+I236

Curriculumvitae

Academic Career

Dr. Westhoff ist seit 2014 Professor im Department M+I der Hochschule Offenburg auf dem Gebiet Sicherheit in Informationssystemen. Er studierte Informatik an der Universität Dortmund. Im Jahre 2000 erfolgte die Promotion an der FernUniversität in Hagen und 2007 ebendort die Habilitation. Von 2001 bis 2009 war er im F+E Bereich bei NEC Europe Ltd. in Heidelberg tätig. 2009 und 2012 folgte er Rufen an Hochschulen nach Hamburg und Furtwangen.

Research Interests

Research Projects

  • Aktuelle Drittmittelprojekte: Predictive Maintenance (Carl Zeiss Stiftung)
  • Abgeschlossene Projekte: PAL SAaaS (BW-Stiftung), ProSeCCo (BMBF), BMBF UNIKOPS, BMBF SKIMS, BMWi Smart Power Hamburg, BMBF Safest, EU FP7 STREP WSAN4CIP, EU FP6 STREP UbiSec&Sens, EU FP6 IP DAIDALOS, BMBF IPonAir, EU FP7 IP SENSEI, EU FP5 IP MobyDick

Patents

Acht Patente

Publication

Books Contributions

  • D. Westhoff, Gedanken zu Autonomieverschiebungen durch Informations- und Kommunikationstechnologie, Buchkapitel in: In 'Das Streben nach Autonomie - Reflexionen zum Digitalen Wandel, Nomos Verlag, pp. 67- 79, Hrsg. T. Breyer-Mayländer, März 2018
  • D. Westhoff, Security and Dependability Solutions for 4G Wireless Access Networks, FernUniversität in Hagen, kumulative Habilitationsschrift, März 2007
  • A.Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks, Buchkapitel in Wiley-IEEE Press: Sensor Network Operations, pp. 535- 557, Editors: Shashi Phoha, Thomas F. La Porta, Christopher Griffin, May 2006
  • D. Westhoff, Mobile Agenten, Buchkapitel in: Handbuch Unternehmensnetze - zukunftssicherer Einsatz und Betrieb heterogener DV- und TK- Netze, Hrsg. F. Kaderali, Verlag Deutscher Wirtschaftsdienst ISBN 3-87156-402-8, October. 2001
  • D. Westhoff, Ein dezentrales Agentensystem unter Berücksichtigung mehrseitiger Sicherheit, Shaker Verlag, Aachen 2000, ISBN 3-8265-8117-2

Editor

  • J.-M. Bohli, F. Kaspar, D. Westhoff (Eds.): Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen. De Gruyter Oldenbourg 2014, ISBN 978-3-11-035865-0
  • D. Gollmann, D. Westhoff, G. Tsudik, N. Asokan (Eds.): Proceedings of the 4th ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8
  • A. Banchs,  D. Qiao, D. Westhoff, IEEE Wireless Communications, Special Issue on “Dependability Issues with Ubiquitous Wireless Access”, 2008.
  • L. Buttyán, V. Gligor, D. Westhoff (Eds.): Security and Privacy in Ad-Hoc and Sensor Networks, 3rd European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3
  • R. Molva, G. Tsudik, D. Westhoff (Eds.): Security and Privacy in Ad-hoc and Sensor Networks, 2nd European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Lecture Notes in Computer Science 3813, Springer 2005, ISBN 3-540-30912-8
  • C. Castelluccia, H. Hartenstein, C. Paar, D. Westhoff (Eds.): Security in Ad-hoc and Sensor Networks, 1st European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Lecture Notes in Computer Science 3313, Springer 2005, ISBN 3-540-24396-8

Reviewed Papers

Die fünf aktuellsten Veröffentlichungen:

  • Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets,
    L. Tajan, D. Westhoff, Central European Cybersecurity Conference, CECC 2019, Munich, November 2019
  • Private Set Relations with Bloom Filters for Outsourced SLA Validation, L. Tajan, D. Westhoff and F. Armknecht, IACR, Cryptology ePrint, Report 2019/993, September 2019
  • Measuring the World - How the Smartphone Industry Impacts Cyber Deterrence Credibility D. Westhoff, M. Zeiser,  International Journal of Cyber Warfare and Terrorism (IJCWT), volume 8, issue 2, April 2018
  • Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing, L. Tajan, M. Kaumanns, D. Westhoff, IFIP International Conference on New Technologies, Mobility & Security, February 2018, Paris, France (best paper award)
  • Survey on covert-channels in virtual machines and cloud computing, J. Betz, D. Westhoff, G. Müller, Wiley Journal Transactions on Emerging Telecommunications Technologies, DOI: 10.1002/ett.3134, indexed in ISI, impact factor 1.295, 2017.

Zehn ausgewählte Veröffentlichungen:

  • Survey on covert-channels in virtual machines and cloud computing, J. Betz, D. Westhoff, G. Müller, Wiley Journal Transactions on Emerging Telecommunications Technologies, DOI: 10.1002/ett.3134, indexed in ISI, impact factor 1.295, 2017.
  • Privacy-enhanced architecture for smart metering F.G. Marmol, C. Sorge, R. Petrlic, O. Ugus, D. Westhoff, International Journal of Information Security (2): 67-82 (2013), impact factor 0.941 (2013)
  • Dependable Over-the-Air Programming J.M. Bohli, A. Hessler, K. Maier, O.Ugus, D. Westhoff, Ad Hoc & Sensor Wireless Networks (AHSWN), 2011. indexed in ISI
  • Data Obfuscation with Network Coding A. Hessler, T. Kakumaru, H. Perrey, D. Westhoff, Elsevier Computer Communications, indexed in ISI, impact factor 0.933 (2010)
  • A Survey on the Encryption of Convergecast-Traffic with In-Network Processing P. Steffen, D. Westhoff, C. Castelluccia, IEEE Transactions on Dependable and Secure Computing, January-March 2010 (vol. 7 no.1), pp. 20-34, ISSN: 1545-5971, indexed in ISI, impact factor 2.093 (2010)
  • A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T-time signature scheme O. Ugus, D. Westhoff, J.M. Bohli, Proceedings of the Second ACM Conference on Wireless Network Security, ACM WiSec 2009, Zurich, Switzerland, March 16-19, 2009
  • A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing F. Armknecht, D. Westhoff, A. Hessler, J. Girao, Elsevier Computer Communications. Vol. 31, issue 4, pp. 734-749, March 2008, indexed in ISI, impact factor 0.933 (2010)
  • TinyPEDS: Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks J. Giroa, D. Westhoff, E. Mykletun, T. Araki, Elsevier Ad Hoc Journal, Vol. 5, Issue 7, pp. 1073-1089, September 2007, indexed in ISI, impact factor 1.293 (2010)
  • Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing Adaptation D. Westhoff, J. Girao, M. Acharya, IEEE Transactions on Mobile Computing, featured article, IEEE Computer Society highlight August 2006, Vol. 5, No. 10, pp. 1417-1431, October 2006, indexed in ISI, impact factor 3.352 (2008)
  • Charging Support for Ad Hoc Stub Networks B. Lamparter, K. Paul, D. Westhoff, Elsevier Journal of Computer Communication, ‘Internet Pricing and Charging: Algorithms, Technology and Applications’, Elsevier Science, Volume 26, Issue 13, pp. 1504-1514, August 2003, indexed in ISI, impact factor 0.933 (2010)

Miscellaneous

Expertise

  • Central European Cybersecurity Conference (CECC'18, '19)
  • GI Fachtagung SICHERHEIT'18, '20
  • ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16,'11,'09,'08) vormals ACM SASN'05,'04
  • International Conference on Security and Privacy in Communication Networks (SecureComm'08,'07,'06,'05)
  • European Symposium on Research in Computer Security (ESORICS'11,'10)
  • European Workshop for Wireless Sensor Networks (EWSN'07,'06,'05,'04)
  • IEEE Globecom ('05,'03,'02) und IEEE ICC ('14,'09,'03,'02)
  • andere: SPVAN'16, ICCCN'13, SESOC'13, ANT'13, IFIP SEC'12,  GI Sicherheit'08, WiOpt'08, ICUCT'06, IEEE EmNetS'06, ACM Mobicom'05, IEEE ICICT'04, IEEE P2P'03
  • Journale: ACM Transactions on Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Mobile Computing, IEEE Journal on Selected Areas in Communications, Oxford Computer Journal, IEEE Journal on Transactions on Computers, Elsevier Computer Communications Journal,  Elsevier Computer Networks Journal, J.UCS (SI)

Links