ECC is Ready for RFID–A Proof in Silicon D Hein, J Wolkerstorfer, N Felber International workshop on selected areas in cryptography, 401-413, 2008 | 172 | 2008 |
Hardware-security technologies for industrial IoT: TrustZone and security controller C Lesjak, D Hein, J Winter IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society …, 2015 | 64 | 2015 |
Securing smart maintenance services: Hardware-security and TLS for MQTT C Lesjak, D Hein, M Hofmann, M Maritsch, A Aldrian, P Priller, T Ebner, ... 2015 IEEE 13th international conference on industrial informatics (INDIN …, 2015 | 61 | 2015 |
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) P Teufl, M Ferk, A Fitzek, D Hein, S Kraxberger, C Orthacker Security and communication networks 9 (5), 389-419, 2016 | 58 | 2016 |
A PrivacyCA for anonymity and trust M Pirker, R Toegl, D Hein, P Danner International Conference on Trusted Computing, 101-119, 2009 | 48 | 2009 |
Android encryption systems P Teufl, A Fitzek, D Hein, A Marsalek, A Oprisnik, T Zefferer 2014 International Conference on Privacy and Security in Mobile Systems …, 2014 | 35 | 2014 |
Attacking ECDSA-enabled RFID devices M Hutter, M Medwed, D Hein, J Wolkerstorfer International Conference on Applied Cryptography and Network Security, 519-534, 2009 | 34 | 2009 |
From digital business strategy to market performance: insights into key concepts and processes A Leischnig, S Wölfl, B Ivens, D Hein Proceedings of the 38th International Conference on Information Systems, 2017 | 28 | 2017 |
The ANDIX research OS—ARM TrustZone meets industrial control systems security A Fitzek, F Achleitner, J Winter, D Hein 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), 88-93, 2015 | 28 | 2015 |
Secure Block Device--Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems D Hein, J Winter, A Fitzek 2015 IEEE Trustcom/BigDataSE/ISPA 1, 222-229, 2015 | 27 | 2015 |
Group signatures on mobile devices: Practical experiences K Potzmader, J Winter, D Hein, C Hanser, P Teufl, L Chen International Conference on Trust and Trustworthy Computing, 47-64, 2013 | 23 | 2013 |
What drives the adoption of autonomous cars? D Hein, P Rauschnabel, J He, L Richter, B Ivens | 22 | 2018 |
An autonomous attestation token to secure mobile agents in disaster response DM Hein, R Toegl International Conference on Security and Privacy in Mobile Information and …, 2009 | 22 | 2009 |
Integrated uav-based real-time mapping for security applications D Hein, T Kraft, J Brauchle, R Berger ISPRS International Journal of Geo-Information 8 (5), 219, 2019 | 19 | 2019 |
Smartwatches: Accessory or Tool?: The Driving Force of Visibility and Usefulness N Krey, PA Rauschnabel, S Chuah, B Nguyen, DWE Hein, A Rossmann, ... opus, 2016 | 16 | 2016 |
Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT C Lesjak, H Bock, D Hein, M Maritsch 2016 IEEE 14th International Conference on Industrial Informatics (INDIN …, 2016 | 15 | 2016 |
Implementing Scaled-Agile Frameworks at Non-Digital Born Companies-A Multiple Case Study F Schuch, D Gerster, D Hein, A Benlian | 9 | 2020 |
Generating interpretable fuzzy controllers using particle swarm optimization and genetic programming D Hein, S Udluft, TA Runkler Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018 | 8 | 2018 |
MACS-Mar: a real-time remote sensing system for maritime security applications J Brauchle, S Bayer, D Hein, R Berger, S Pless CEAS Space Journal 11 (1), 35-44, 2019 | 7 | 2019 |
From Big Data to Smart Data–Problemfelder der systematischen Nutzung von Daten in Unternehmen S Wölfl, A Leischnig, B Ivens, D Hein Geschäftsmodelle in der digitalen Welt, 213-231, 2019 | 7 | 2019 |