Jens B. Schmitt
Jens B. Schmitt
Professor of Computer Science, University of Kaiserslautern
Verified email at
Cited by
Cited by
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
Sensor network calculus–a framework for worst case analysis
JB Schmitt, U Roedig
International Conference on Distributed Computing in Sensor Systems, 141-154, 2005
Node deployment in large wireless sensor networks: coverage, energy consumption, and worst-case delay
WY Poe, JB Schmitt
Proceedings of the 4th Asian Internet Engineering Conference, 77-84, 2009
Subjective impression of variations in layer encoded videos
M Zink, O Künzel, J Schmitt, R Steinmetz
Quality of Service—IWQoS 2003: 11th International Workshop Berkeley, CA …, 2003
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Delay bounds under arbitrary multiplexing: When network calculus leaves you in the lurch...
JB Schmitt, FA Zdarsky, M Fidler
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1669-1677, 2008
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018
On realistic network topologies for simulation
O Heckmann, M Piringer, J Schmitt, R Steinmetz
Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for …, 2003
The disco network calculator: a toolbox for worst case analysis
JB Schmitt, FA Zdarsky
Proceedings of the 1st international conference on Performance evaluation …, 2006
Detection of reactive jamming in DSSS-based wireless communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
Layer-encoded video in scalable adaptive streaming
M Zink, J Schmitt, R Steinmetz
IEEE Transactions on Multimedia 7 (1), 75-84, 2005
Perspectives on network calculus: no free lunch, but still good value
F Ciucu, J Schmitt
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
Secure key generation in sensor networks based on frequency-selective channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013
A comprehensive worst-case calculus for wireless sensor networks with in-network processing
JB Schmitt, FA Zdarsky, L Thiele
28th IEEE International Real-Time Systems Symposium (RTSS 2007), 193-202, 2007
The DiscoDNC v2: A comprehensive tool for deterministic network calculus
S Bondorf, JB Schmitt
Proceedings of the 8th International Conference on Performance Evaluation …, 2014
On the effect of node misbehavior in ad hoc networks
M Hollick, J Schmitt, C Seipl, R Steinmetz
2004 IEEE International Conference on Communications (IEEE Cat. No …, 2004
Handover in mobile communication networks: who is in control anyway?
FA Zdarsky, JB Schmitt
Proceedings. 30th Euromicro Conference, 2004., 205-212, 2004
Improving performance bounds in feed-forward networks by paying multiplexing only once
JB Schmitt, FA Zdarsky, I Martinovic
14th GI/ITG Conference-Measurement, Modelling and Evalutation of Computer …, 2008
Jamming for good: a fresh approach to authentic communication in WSNs
I Martinovic, P Pichota, JB Schmitt
Proceedings of the second ACM conference on Wireless network security, 161-168, 2009
Secret keys from entangled sensor motes: implementation and analysis
M Wilhelm, I Martinovic, JB Schmitt
Proceedings of the third ACM conference on Wireless network security, 139-144, 2010
The system can't perform the operation now. Try again later.
Articles 1–20