Folgen
Christian Wachsmann
Titel
Zitiert von
Zitiert von
Jahr
Security and privacy challenges in industrial internet of things
AR Sadeghi, C Wachsmann, M Waidner
Proceedings of the 52nd annual design automation conference, 1-6, 2015
10142015
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
3292012
TyTAN: Tiny trust anchor for tiny devices
F Brasser, B El Mahjoub, AR Sadeghi, C Wachsmann, P Koeberl
Proceedings of the 52nd annual design automation conference, 1-6, 2015
2592015
Seda: Scalable embedded device attestation
N Asokan, F Brasser, A Ibrahim, AR Sadeghi, M Schunter, G Tsudik, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2372015
A formalization of the security features of physical functions
F Armknecht, R Maes, AR Sadeghi, FX Standaert, C Wachsmann
2011 IEEE symposium on security and privacy, 397-412, 2011
2232011
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
2052012
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, Ü Koçabas, V Van Der Leest, AR Sadeghi, GJ Schrijen, ...
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
1372011
A security framework for the analysis and design of software attestation
F Armknecht, AR Sadeghi, S Schulz, C Wachsmann
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1292013
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C Stüble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
1092006
PUFatt: Embedded platform attestation based on novel processor-based PUFs
J Kong, F Koushanfar, PK Pendyala, AR Sadeghi, C Wachsmann
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
942014
Short paper: Lightweight remote attestation using physical functions
S Schulz, AR Sadeghi, C Wachsmann
Proceedings of the fourth ACM conference on Wireless network security, 109-114, 2011
832011
PUF-enhanced RFID security and privacy
AR Sadeghi, I Visconti, C Wachsmann
Workshop on secure component and system identification (SECSI) 110, 2010
762010
Enhancing RFID security and privacy by physically unclonable functions
AR Sadeghi, I Visconti, C Wachsmann
Towards Hardware-Intrinsic Security: Foundations and Practice, 281-305, 2010
762010
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
722014
User privacy in transport systems based on RFID e-tickets
AR Sadeghi, I Visconti, C Wachsmann
PiLBA’08 Privacy in Location-Based Applications, 102, 2008
692008
Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource
A Dmitrienko, AR Sadeghi, C Wachsmann
US Patent App. 13/912,617, 2014
632014
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
C Wachsmann, L Chen, K Dietrich, H Löhr, AR Sadeghi, J Winter
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
632011
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
612015
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ...
Proceedings of the third ACM conference on Data and application security and …, 2013
602013
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
592013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20