Wissenschaftliche Leitung
The Benefits of Combining Trusted Computing with Virtualization Techniques.
Pilsen, Tschechische Republik 2010.
(2010)
The Benefits of Combining Trusted Computing with Virtualization Techniques.
Pilsen, Tschechische Republik 08.-09.09.2010.
(2010)
Utilizing a State-of-the-art Trust Anchor in Order to Increase the Trustworthiness of Embedded Platforms.
Nürnberg 2011.
(2011)
Trustworthy Building Blocks for a More Secure Embedded Computing Environment.
Pilsen, Tschechische Republik 2011.
(2011)
The Establishment of High Degrees of Trust in a Linux Environment.
Nürnberg 28.02.-01.03.2012.
(2012)
Reconfigurable Trust for Embedded Computing Platforms.
Pilsen, Tschechische Republik 05.-06.09.2012.
(2012)
On the Implementation of a Lightweight Generic FPGA ECC Crypto-Core over GF(p).
Pilsen, Tschechische Republik 2013.
(2013)
On the Implementation of an Efficient Multiplier Logic for FPGA-based Cryptographic Applications.
Pilsen, Tschechische Republik 2013.
(2013)
Enhanced Embedded Device Security by Combining Hardware-Based Trust Mechanisms. Poster-Session.
Berlin 04.-08.11.2013.
(2013)
Embedded Trusted Computing on ARM-based Systems.
Hagenberg im Mühlkreis, Österreich 09.-10.04.2014.
(2014)
Trusted Computing Concepts for Resilient Embedded Networks. International Workshop on Engineering Cyber Security and Resilience.
Stanford, CA, USA Mai 2014.
(2014)
Resilience in Embedded Industrial Networks.
Barcelona, Spanien Juni 2014.
(2014)
Embedded Plug-In Devices to Secure Industrial Network Communications.
(2016)
Assessment simulation model for uncoupled message authentication.
(2017)
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs.
pg. 1-6
(2017)
Incident Reaction Based on Intrusion Detections’ Alert Analysis.
pg. 1-6
(2018)
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404).
In: Security and Communication Networks , pg. 1-18
(2018)
DOI: 10.1155/2018/4983404
A Practical Introduction to Cryptographic Engineering. [Invited Talk; eingeladen von Dalibor Fiala (PhD)].
Pilsen, Tschechische Republik 14.12.2018.
(2018)
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection.
In: Computers & Security (vol. 85) , pg. 270-285
(2019)
DOI: 10.1016/j.cose.2019.05.010
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks.
pg. 21-26
(2019)
Hacking an optics manufacturing machine: You don't see it coming?!.
Bellingham, WA, USA pg. 11171071-11171076
DOI: 10.1117/12.2526691
(2019)
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication.
pg. 906-911
DOI: 10.1109/PERCOMW.2019.8730749
(2019)
Delegation of Authentication to the Data Plane in Software Defined Networks.
pg. 58-65
DOI: 10.1109/IUCC/DSCI/SmartCNS.2019.00038
(2019)
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks.
pg. 72-83
(2019)
Lightweight edge authentication for software defined networks.
In: Computing (Special Issue)
(2020)
DOI: 10.1007/s00607-020-00835-4
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data.
In: Electronics (vol. 10) , pg. 1534
(2021)
DOI: 10.3390/electronics10131534
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data.
In: Electronics (vol. 10) , pg. 2160
(2021)
DOI: 10.3390/electronics10172160
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security.
In: Applied Sciences (vol. 11) , pg. 12073
(2021)
DOI: 10.3390/app112412073
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.
DOI: 10.1109/IWCMC58020.2023.10183131
(2023)
Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis.
In: Information (vol. 14) , pg. 487
(2023)
DOI: 10.3390/info14090487
Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.
(2024)
Institut ProtectIT
IT-Security