Folgen
Matthias Hudler
Matthias Hudler
FH Campus Wien - Competence Centre for IT-Security
Bestätigte E-Mail-Adresse bei fh-campuswien.ac.at
Titel
Zitiert von
Zitiert von
Jahr
Smart elliptic curve cryptography for smart dust
J Großschädl, M Hudler, M Koschuch, M Krüger, A Szekely
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th …, 2012
162012
Secure Firmware Update Over the Air in the Internet of Things Focusing on Flexibility and Feasibility
S Schmidt, M Tausig, M Hudler, G Simhandl
Internet of Things Software Update Workshop (IoTSU), Dublin, 2016
142016
Token-based authentication for smartphones
M Koschuch, M Hudler, H Eigner, Z Saffer
2013 International Conference on Data Communication Networking (DCNET), 1-6, 2013
142013
Performance evaluation of the TLS handshake in the context of embedded devices
M Koschuch, M Hudler, M Krüger
2010 International Conference on Data Communication Networking (DCNET), 1-10, 2010
82010
Workload characterization of a lightweight SSL implementation resistant to side-channel attacks
M Koschuch, J Großschädl, U Payer, M Hudler, M Krüger
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
72008
Hardware/software co-design of public-key cryptography for ssl protocol execution in embedded systems
M Koschuch, J Großschädl, D Page, P Grabher, M Hudler, M Krüger
Information and Communications Security: 11th International Conference …, 2009
62009
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.
S Schmidt, M Tausig, M Koschuch, M Hudler, G Simhandl, P Puddu, ...
IoTBDS, 63-72, 2018
42018
The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA
M Koschuch, M Hudler, M Krüger
e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012
32012
Optimizing cryptographic threshold schemes for the use in wireless sensor networks: Position paper
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
Proceedings of the International Conference on, 1-4, 2011
32011
Applicability of multiparty computation schemes for wireless sensor networks
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
2010 International Conference on Data Communication Networking (DCNET), 1-4, 2010
32010
A Generic toolchain for model-based test generation and selection
A Kraas, M Kruger, P Aschenbrenner, M Hudler, Y Lei
TESTCOM/FATES 2007, 2007
32007
Applicability of Multiparty Computation Schemes for Wireless Sensor Networks-Position Paper.
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
DCNET/OPTICS, 125-128, 2010
22010
Towards algorithm agility for wireless sensor networks: Comparison of the portability of selected Hash functions
M Koschuch, M Hudler, Z Saffer
2013 International Conference on Data Communication Networking (DCNET), 1-5, 2013
12013
Hash Algorithms for 8051-based Sensornodes.
M Koschuch, M Hudler, M Krüger
DCNET/ICE-B/OPTICS, 65-68, 2012
12012
Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.
P Grassl, M Hudler, M Koschuch
IoTBDS, 329-338, 2024
2024
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.
P Hölzmer, M Koschuch, M Hudler
IoTBDS, 258-266, 2022
2022
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility
S Prinz, S Schmidt, M Koschuch, A Glaser, T Fruhwirth, M Hudler
E-Business and Telecommunications: 12th International Joint Conference …, 2016
2016
Speaking in tongues practical evaluation of TLS cipher suites compatibility
M Koschuch, T Fruhwirth, A Glaser, S Schmidt, M Hudler
2015 12th International Joint Conference on e-Business and …, 2015
2015
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
E-Business and Telecommunications: International Joint Conference, ICETE …, 2012
2012
Prozeßschritte zur Testfallauswahl bei der Testfallgenerierung aus UML-Modellen
M Hudler, M Krüger
Informatik 2007–Informatik trifft Logistik–Band 2, 387-391, 2007
2007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20