Professor
Wissenschaftlicher Leiter Institut ProtectIT; Studiengangskoordinator des Bachelorstudiengangs Cyber Security; Mitglied der Prüfungskommission Weiterbildungszentrum
Nach Vereinbarung (per E-Mail)
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security
In: Applied Sciences vol. 11 pg. 12073.
DOI: 10.3390/app112412073
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data
In: Electronics vol. 10 pg. 2160.
DOI: 10.3390/electronics10172160
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data
In: Electronics vol. 10 pg. 1534.
DOI: 10.3390/electronics10131534
Lightweight edge authentication for software defined networks
In: Computing (Special Issue)
DOI: 10.1007/s00607-020-00835-4
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks
pg. 21-26.
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
pg. 72-83.
Hacking an optics manufacturing machine: You don't see it coming?!
pg. 11171071-11171076.
Bellingham, WA, USA
DOI: 10.1117/12.2526691
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection
In: Computers & Security vol. 85 pg. 270-285.
DOI: 10.1016/j.cose.2019.05.010
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
pg. 906-911.
DOI: 10.1109/PERCOMW.2019.8730749
Delegation of Authentication to the Data Plane in Software Defined Networks
pg. 58-65.
DOI: 10.1109/IUCC/DSCI/SmartCNS.2019.00038
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404)
In: Security and Communication Networks pg. 1-18.
DOI: 10.1155/2018/4983404
Incident Reaction Based on Intrusion Detections’ Alert Analysis
pg. 1-6.
A Practical Introduction to Cryptographic Engineering . [Invited Talk; eingeladen von Dalibor Fiala (PhD)]
University of West Bohemia Pilsen, Tschechische Republik
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs
pg. 1-6.
Assessment simulation model for uncoupled message authentication
Embedded Plug-In Devices to Secure Industrial Network Communications
Trusted Computing Concepts for Resilient Embedded Networks . International Workshop on Engineering Cyber Security and Resilience
In: 2014 ASE Bigdata/SocialCom/Cybersecurity Conference
Stanford University Stanford, CA, USA
Resilience in Embedded Industrial Networks
In: Trusted Computing Group Members Meeting 2014
Barcelona, Spanien
Embedded Trusted Computing on ARM-based Systems
In: Security Forum 2014
Hagenberg im Mühlkreis, Österreich
On the Implementation of a Lightweight Generic FPGA ECC Crypto-Core over GF(p)
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
Enhanced Embedded Device Security by Combining Hardware-Based Trust Mechanisms . Poster-Session
In: ACM Conference on Computer and Communications Security
Berlin
On the Implementation of an Efficient Multiplier Logic for FPGA-based Cryptographic Applications
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
Reconfigurable Trust for Embedded Computing Platforms
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
The Establishment of High Degrees of Trust in a Linux Environment
In: Embedded World International Conference 2012
Nürnberg
Trustworthy Building Blocks for a More Secure Embedded Computing Environment
In: Applied Electronics International Conference
Pilsen, Tschechische Republik
Utilizing a State-of-the-art Trust Anchor in Order to Increase the Trustworthiness of Embedded Platforms
In: Embedded World International Conference 2011
Nürnberg
The Benefits of Combining Trusted Computing with Virtualization Techniques
In: Applied Electronics International Conference
Pilsen, Tschechische Republik
The Benefits of Combining Trusted Computing with Virtualization Techniques
In: IEEE International Conference on Applied Electronics 2010
Pilsen, Tschechische Republik
Institut ProtectIT
IT-Security