Informatik VIII: Lehrstuhl für
Netzarchitekturen und Netzdienste 
Sie sind hier: Mitarbeiter → Dr. Heiko Niedermayer
Photo of Heiko  Niedermayer

Dr. Heiko Niedermayer

Wissenschaftlicher Mitarbeiter

Postanschrift

Institut für Informatik der
Technischen Universität München
Lehrstuhl I8
Boltzmannstr. 3

85748 Garching bei München - Germany

Kontakt

Tel: +49 89 289 - 18040
Fax: +49 89 289 - 18033
Email: niedermayer_ÄT_net.in.tum.de

Gebäude / Raum

MI Building
03.05.040
 

Research

  • Network Security

  • Peer-to-Peer and Overlay Networks

  • Autonomous and Future Networks

Teaching

Information about my teaching can be found under Lehre (in German)

Publications:

[1] Heiko Niedermayer, Daniel Raumer, Nikolai Schwellnus, Edwin Cordeiro, and Georg Carle. An Analysis of IETF Activities Using Mailing Lists and Social Media (accepted). In Proceedings of the third international conference on Internet Science, INSCI2016, Florence, Italy, September 2016. [ .pdf ]
[2] Jacek Rak, Heiko Niedermayer, Dimitri Papadimitriou, and Pablo Romero. Information-driven network resilience: Research challenges and perspectives. Optical Switching and Networking, 2016.
[3] Holger Kinkelin, Heiko Niedermayer, Simon Mittelberger, and Georg Carle. Human-Centric and Privacy-Protecting Trust Establishment over the Internet. In Proceeding of the Seventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), Nice, France, October 2014.
[4] Holger Kinkelin, Marcel von Maltitz, Benedikt Peter, Cornelia Kappler, Heiko Niedermayer, and Georg Carle. Privacy Preserving Energy Management. In Proceeding of City Labs Workshop in conjunction with the International Conference on Social Informatics (SocInfo 2014), Barcelona, Spain, October 2014. [ .pdf ]
[5] Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, and Holger Kinkelin. Increasing the resilience and trustworthiness of openid identity providers for future networks and services. In Ninth International Conference on Availability, Reliability and Security (ARES), pages 317-324, September 2014.
[6] Cornelius Diekmann, Stephan-A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, and Georg Carle. Verifying Security Policies using Host Attributes. In FORTE - 34th IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems, volume 8461, pages 133-148, Berlin, Germany, June 2014. Springer. [ DOI | .pdf ]
[7] Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, and Georg Carle. Enabling sustainable smart neighborhoods. In 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability 2013 (SustainIT 2013), Palermo, Italy, October 2013. [ .pdf ]
[8] Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, and Georg Carle. On using TPM for secure identities in future home networks. Future Internet, 3(1):1-13, 2011. [ DOI | Official link | .pdf ]
[9] Holger Kinkelin, Ralph Holz, Heiko Niedermayer, and Georg Carle. On using TPM for secure identities in future networks (ext. abstract). In Proceedings of Security in NGNs and the Future Internet Workshop, September 2010.
[10] Ali Fessi, Nathan Evans, Heiko Niedermayer, and Ralph Holz. Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM. In Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich, August 2010. [ ACM | .pdf ]
[11] Heiko Niedermayer. Architecture and Components of secure and anonymous Peer-to-Peer Systems. PhD thesis, Technische Universität München, July 2010. [ .pdf ]
[12] Holger Kinkelin, Heiko Niedermayer, Ralph Holz, and Georg Carle. TPM-based access control for the future internet (ext. abstract). In 5th GI/ITG KuVS Workshop on Future Internet, Stuttgart, Germany, June 2010.
[13] Marc Fouquet, Heiko Niedermayer, and Georg Carle. Cloud Computing for the Masses. In Proceedings of the 1st ACM Workshop on User-provided Networking, co-located with CoNEXT 2009, Rome, Italy, December 2009.
[14] Ralph Holz, Christoph P. Mayer, Sebastian Mies, Heiko Niedermayer, and Muhammad Adnan Tariq. SpoVNet Security Task Force Report. Technical Report TM-2009-3, Universität Karlsruhe, Karlsruhe, Germany, December 2009. [ Project page | .pdf ]
[15] Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, and Georg Carle. On Using Home Networks and Cloud Computing for a Future Internet of Things. In Proc. Future Internet Symposium 2009 (FIS 2009), Berlin, Germany, September 2009.
[16] Dirk Haage, Ralph Holz, Heiko Niedermayer, and Pavel Laskov. CLIO - a cross-layer information service for overlay network optimization. In Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, March 2009. [ Project page | .pdf ]
[17] Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, and Georg Carle. Clustering players for load balancing in virtual worlds. International Journal of Advanced Media and Communication (IJAMC), 2(4):351-363, December 2008.
[18] Georg Carle, Holger Kinkelin, Andreas Müller, Heiko Niedermayer, Marc-Oliver Pahl, Alexander König, Thomas Luckenbach, Klaus Scholl, Mario Schuster, Lasse Thiem, Leo Petrak, Markus Steinmetz, Christoph Niedermeier, and Jürgen Reichmann. Autonomic Home Networks in the BMBF project AutHoNe. In 8th Würzburg Workshop on IP (EuroView 2008), July 2008.
[19] Ralph Holz and Heiko Niedermayer. A Protocol for Inter-Domain Authentication with a Trust-Rating Mechanism. In 8. Kryptotag der GI-Fachgruppe KRYPTO (Workshop). Technical Report WSI-2008-02. University of Tübingen, April 2008.
[20] Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, and Georg Carle. Clustering players for load balancing in virtual worlds. In Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008), Reno, Nevada, USA, March 2008.
[21] Ralph Holz, Heiko Niedermayer, Peter Hauck, and Georg Carle. Trust-rated authentication for domain-structured distributed systems. In Proc. 5th European PKI Workshop: Theory and Practice (EuroPKI 2008), Trondheim, Norway, 2008. [ Springer | .pdf ]
[22] Olaf Landsiedel, Alexis Pimenidis, Klaus Wehrle, Heiko Niedermayer, and Georg Carle. Dynamic multipath onion routing in anonymous peer-to-peer overlay networks. In Proceedings of IEEE Global Communication Conference (GlobeCom), Washington, DC, USA, November 2007.
[23] Ali Fessi, Heiko Niedermayer, Holger Kinkelin, and Georg Carle. A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services. In Principles, Systems and Applications of IP Telecommunications (IPTComm), New York), July 2007. [ .pdf ]
[24] Ali Fessi, Heiko Niedermayer, Holger Kinkelin, and Georg Carle. Cosip - a hybrid architecture for reliable and secure sip services. Praxis in der Informationsverarbeitung und Kommunikation (PIK), special issue on Voice over IP, 2007.
[25] Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Leo Petrak, and Georg Carle. Peer-to-peer-based infrastructure support for massively multiplayer online games. In Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nevada, USA, January 2007. [ .pdf ]
[26] Andreas Klenk, Heiko Niedermayer, Marcus Masekowsky, and Georg Carle. An architecture for autonomic security adaptation. Journal Annals of the Telecommunications, 61(9/10), November 2006. [ .pdf ]
[27] Simon Rieche, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Klaus Wehrle, and Georg Carle. Peer-to-peer-based infrastructure support for massively multiplayer online games. Technical Report WSI-2006-04, Wilhelm-Schickard-Institute for Computer Science, University of Tübingen, Tübingen, Germany, August 2006.
[28] Heiko Niedermayer, Andreas Klenk, and Georg Carle. The networking perspective of security performance - a measurement study -. In MMB 2006, Nürnberg, Germany, March 2006. [ .pdf ]
[29] Andreas Klenk, Marcus Masekowsky, Heiko Niedermayer, and GeorgCarle. ESAF - an extensible security adaptation framework. In 10th Nordic Workshop on Secure IT-systems, Tartu, Estonia, October 2005. [ .pdf ]
[30] S. Rieche, K. Wehrle, H. Niedermayer, and S. Götz. Reliability and load balancing in dhts. In chapter in the book Ralf Steinmetz, Klaus Wehrle (Eds.) Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science Volume 3485, 657 pages, Springer, pages 129-146. September 2005.
[31] O. Landsiedel, S. Rieche, H. Niedermayer, K. Wehrle, and Georg Carle. Anonymous ip-services via overlay routing. In Extended Abstract at 5th Würzburger Workshop IP Netzmanagement,IP Netzplanung und Optimierung, Würzburg, July 2005.
[32] Simon Rieche, Marc Fouquet, Heiko Niedermayer, Klaus Wehrle, and Georg Carle. On the use of structured peer-to-peer systems for online gaming. In Extended Abstract at 5th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, July 2005. [ .pdf ]
[33] O. Landsiedel, K. Wehrle, and H. Niedermayer. An infrastructure for anonymous internet services. In International Workshop on Innovations In Web Infrastructure (IWI2005), 14th International World Wide Web Conference - WWW2005, Chiba/Tokyo, Japan, May 2005.
[34] H. Niedermayer, S. Rieche, K. Wehrle, and Georg Carle. On the distribution of nodes in distributed hash tables. In KiVS 2005 (Workshop Peer-to-Peer-Systeme und Anwendungen), Kaiserslautern, Germany., March 2005.
[35] H. Niedermayer. Optimierungsmethoden für Fabriken mit Clustertool-Workcentern. talk on the 7th Workshop Simulation und Leistungsbewertung von Fertigungssystemen(Performance Analysis and Simulation in Manufacturing), TU Dresden, Germany., November 2004.
[36] H. Niedermayer and O. Rose. Solution approaches for the cluster tool scheduling problem in semiconductor manufacturing. In ESS 2004 (16th European Simulation Symposium), Budapest, Hungary., October 2004.
[37] T. Heer, H. Niedermayer, L. Petrak, S. Rieche, and K. Wehrle. On the use of structured p2p indexing mechanisms in mobile ad-hoc scenarios. In Informatik 2004 (Workshop on Peer-to-Peer Systems), Ulm, Germany., September 2004.
[38] K. Wehrle and H. Niedermayer. Improving performance-oriented simulation models for communication networks. In MSO 2004 (Modelling, Simulation, and Optimization), Kauai, Hawaii., August 2004.
[39] Heiko Niedermayer, Klaus Wehrle, Thomas Schreiner, and Georg Carle. Considering security in distributed hash tables. In Abstract at 4th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Germany., July 2004.
[40] H. Niedermayer and O. Rose. Approximation of cycle times of cluster tools in semiconductor manufacturing. In IERC 2004 (Industrial Engineering Research Conference), Houston, Texas., May 2004.
[41] H. Niedermayer. Scheduling von clustertools. talk on the 6th Workshop Leistungsbewertung und Simulation von Fertigungsanlagen(Performance Analysis and Simulation in Manufacturing), Würzburg, Germany, November 2003.
[42] H. Niedermayer and O. Rose. A simulation-based analysis of the cycle time of cluster tools in semiconductor manufacturing. In 5th European Simulation Symposium, Delft, Netherlands., October 2003.
© copyright 2009 TUM Informatik VIII: Lehrstuhl für Netzarchitekturen und Netzdienste Impressum & Datenschutz