Christian Zenger
Cited by
Cited by
Authenticated key establishment for low-resource devices exploiting correlated random channels
CT Zenger, M Pietersz, J Zimmer, JF Posielek, T Lenze, C Paar
Computer Networks 109, 105-123, 2016
Intelligent reflecting surface-assisted wireless key generation for low-entropy environments
P Staat, H Elders-Boll, M Heinrichs, R Kronberger, C Zenger, C Paar
2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile …, 2021
A novel key generating architecture for wireless low-resource devices
CT Zenger, MJ Chur, JF Posielek, C Paar, G Wunder
2014 International Workshop on Secure Internet of Things, 26-34, 2014
Bringing PHY-based key generation into the field: An evaluation for practical scenarios
R Guillaume, F Winzer, A Czylwik, CT Zenger, C Paar
2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 1-5, 2015
Efficient e-cash in practice: NFC-based payments for public transportation systems
G Hinterwälder, CT Zenger, F Baldimtsi, A Lysyanskaya, C Paar, ...
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013
Security analysis of quantization schemes for channel-based key extraction
C Zenger, J Zimmer, C Paar
EAI Endorsed Transactions on Security and Safety 2 (6), 267-272, 2015
Exploiting the physical environment for securing the internet of things
CT Zenger, J Zimmer, M Pietersz, JF Posielek, C Paar
Proceedings of the 2015 New Security Paradigms Workshop, 44-58, 2015
Fair comparison and evaluation of quantization schemes for phy-based key generation
R Guillaume, A Mueller, CT Zenger, C Paar, A Czylwik
OFDM 2014; 18th International OFDM Workshop 2014 (InOWo'14), 1-5, 2014
The passive eavesdropper affects my channel: Secret-key rates under real-world conditions
C Zenger, H Vogt, J Zimmer, A Sezgin, C Paar
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
Reconfigurable intelligent surface for physical layer key generation: Constructive or destructive?
G Li, L Hu, P Staat, H Elders-Boll, C Zenger, C Paar, A Hu
IEEE Wireless Communications 29 (4), 146-153, 2022
Physical-layer security for the internet of things
C Zenger
Preventing relay attacks and providing perfect forward secrecy using physec on 8-bit µc
CT Zenger, M Pietersz, C Paar
2016 IEEE International Conference on Communications Workshops (ICC), 110-115, 2016
Mirror, mirror on the wall: Wireless environment reconfiguration attacks based on fast software-controlled surfaces
P Staat, H Elders-Boll, M Heinrichs, C Zenger, C Paar
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
On-line entropy estimation for secure information reconciliation
C Zenger, J Zimmer, JF Posielek, C Paar
proceedings of the 12th EAI International Conference on Mobile and …, 2015
Preventing scaling of successful attacks: A cross-layer security architecture for resource-constrained platforms
CT Zenger, A Ambekar, F Winzer, T Pöppelmann, HD Schotten, C Paar
Cryptography and Information Security in the Balkans: First International …, 2015
Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet
CT Zenger, J Zimmer, M Pietersz, B Driessen, C Paar
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
Rights management with NFC smartphones and electronic ID cards: A proof of concept for modern car sharing
T Kasper, A Kühn, D Oswald, C Zenger, C Paar
Radio Frequency Identification: Security and Privacy Issues 9th …, 2013
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems
P Staat, J Tobisch, C Zenger, C Paar
2022 IEEE Symposium on Security and Privacy (SP), 1722-1736, 2022
Electromagnetic enclosure PUF for tamper proofing commodity hardware and other applications
J Tobisch, C Zenger, C Paar
On the precise phase recovery for physical-layer authentication in dynamic channels
H Vogt, C Li, A Sezgin, C Zenger
2019 IEEE International Workshop on Information Forensics and Security (WIFS …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20