iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/60/688.rss
dblp: Manuel Koschuch https://dblp.org/pid/60/688.html dblp person page RSS feed Fri, 31 May 2024 01:43:33 +0200 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Manuel Koschuchhttps://dblp.org/pid/60/688.html14451 Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.https://doi.org/10.5220/0012736800003705, , :
Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography. IoTBDS : 329-338]]>
https://dblp.org/rec/conf/iotbd/GrasslHK24Mon, 01 Jan 2024 00:00:00 +0100
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.https://doi.org/10.5220/0011087400003194, , :
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length. IoTBDS : 258-266]]>
https://dblp.org/rec/conf/iotbd/HolzmerKH22Sat, 01 Jan 2022 00:00:00 +0100
Secure Key Management in Embedded Systems: A First Proposal.https://doi.org/10.5220/0010475600810091, , :
Secure Key Management in Embedded Systems: A First Proposal. IoTBDS : 81-91]]>
https://dblp.org/rec/conf/iotbd/JankSK21Fri, 01 Jan 2021 00:00:00 +0100
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.https://doi.org/10.1007/978-3-030-97532-6_9, , , :
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems. SKM : 151-170]]>
https://dblp.org/rec/conf/skm/ReuterL0K21Fri, 01 Jan 2021 00:00:00 +0100
Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework.https://doi.org/10.5220/0009337000250035, , , :
Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework. IoTBDS : 25-35]]>
https://dblp.org/rec/conf/iotbd/KramerSKT20Wed, 01 Jan 2020 00:00:00 +0100
Safety & Security in the Context of Autonomous Driving.https://doi.org/10.1109/ICCVE45908.2019.8965092, , , , , :
Safety & Security in the Context of Autonomous Driving. ICCVE : 1-7]]>
https://dblp.org/rec/conf/iccve/KoschuchSSTTW19Tue, 01 Jan 2019 00:00:00 +0100
Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.https://doi.org/10.5220/0007753804140421, , , :
Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes. IoTBDS : 414-421]]>
https://dblp.org/rec/conf/iotbd/KramerSTK19Tue, 01 Jan 2019 00:00:00 +0100
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.https://doi.org/10.5220/0006670300630072, , , , , , :
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things. IoTBDS : 63-72]]>
https://dblp.org/rec/conf/iotbd/SchmidtTKHSPS18Mon, 01 Jan 2018 00:00:00 +0100
Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper).https://doi.org/10.5220/0006789402910298, , , , :
Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper). IoTBDS : 291-298]]>
https://dblp.org/rec/conf/iotbd/HabockKKST18Mon, 01 Jan 2018 00:00:00 +0100
Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.https://doi.org/10.5220/0005507900130023, , , , :
Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility. DCNET : 13-23]]>
https://dblp.org/rec/conf/icete/KoschuchFGSH15Thu, 01 Jan 2015 00:00:00 +0100
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.https://doi.org/10.1007/978-3-319-30222-5_3, , , , , :
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility. ICETE (Selected Papers) : 58-78]]>
https://dblp.org/rec/conf/icete/PrinzSKGFH15Thu, 01 Jan 2015 00:00:00 +0100
Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.https://doi.org/10.1109/INM.2015.7140497, , , , :
Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice. IM : 1365-1368]]>
https://dblp.org/rec/conf/im/KoschuchHSHH15Thu, 01 Jan 2015 00:00:00 +0100
Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations.https://doi.org/10.1007/978-3-319-25915-4_2, :
Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations. ICETE (Selected Papers) : 26-33]]>
https://dblp.org/rec/conf/icete/KoschuchW14aWed, 01 Jan 2014 00:00:00 +0100
Papers, Please... - X.509 Certificate Revocation in Practice.https://doi.org/10.5220/0005113800360040, :
Papers, Please... - X.509 Certificate Revocation in Practice. DCNET : 36-40]]>
https://dblp.org/rec/conf/icete/KoschuchW14Wed, 01 Jan 2014 00:00:00 +0100
Token-based Authentication for Smartphones.https://ieeexplore.ieee.org/document/7220057/, , , :
Token-based Authentication for Smartphones. DCNET/ICE-B/OPTICS : 51-56]]>
https://dblp.org/rec/conf/icete/KoschuchHES13Tue, 01 Jan 2013 00:00:00 +0100
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.https://ieeexplore.ieee.org/document/7220059/, , :
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions. DCNET/ICE-B/OPTICS : 64-68]]>
https://dblp.org/rec/conf/icete/KoschuchHS13Tue, 01 Jan 2013 00:00:00 +0100
Hash Algorithms for 8051-based Sensornodes.https://dblp.org/pid/60/688.html, , :
Hash Algorithms for 8051-based Sensornodes. DCNET/ICE-B/OPTICS : 65-68]]>
https://dblp.org/rec/conf/icete/KoschuchHK12Sun, 01 Jan 2012 00:00:00 +0100
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.https://doi.org/10.1007/978-3-642-35755-8_6, , , , :
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography. ICETE (Selected Papers) : 74-81]]>
https://dblp.org/rec/conf/icete/KoschuchHKLW11aSat, 01 Jan 2011 00:00:00 +0100
Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.https://dblp.org/pid/60/688.html, , , , :
Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper. DCNET/OPTICS : 75-78]]>
https://dblp.org/rec/conf/icete/KoschuchHKLW11Sat, 01 Jan 2011 00:00:00 +0100
Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.https://dblp.org/pid/60/688.html, , :
Performance Evaluation of the TLS Handshake in the Context of Embedded Devices. DCNET/OPTICS : 35-44]]>
https://dblp.org/rec/conf/icete/KoschuchHK10Fri, 01 Jan 2010 00:00:00 +0100
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.https://doi.org/10.1007/978-3-642-25206-8_4, , :
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA. ICETE (Selected Papers) : 71-83]]>
https://dblp.org/rec/conf/icete/KoschuchHK10aFri, 01 Jan 2010 00:00:00 +0100
Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.https://dblp.org/pid/60/688.html, , , , :
Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper. DCNET/OPTICS : 125-128]]>
https://dblp.org/rec/conf/icete/KoschuchHKLW10Fri, 01 Jan 2010 00:00:00 +0100
Smart Elliptic Curve Cryptography for Smart Dust.https://doi.org/10.1007/978-3-642-29222-4_44, , , , :
Smart Elliptic Curve Cryptography for Smart Dust. QSHINE : 623-634]]>
https://dblp.org/rec/conf/qshine/GrossschadlHKKS10Fri, 01 Jan 2010 00:00:00 +0100
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.https://doi.org/10.1007/978-3-642-11145-7_7, , , , , :
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. ICICS : 63-79]]>
https://dblp.org/rec/conf/icics/KoschuchGPGHK09Thu, 01 Jan 2009 00:00:00 +0100
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.https://doi.org/10.1007/978-3-642-03944-7_9, , , , , :
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. WISTP : 112-127]]>
https://dblp.org/rec/conf/wistp/LedererMKGST09Thu, 01 Jan 2009 00:00:00 +0100
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.https://doi.org/10.1007/978-3-540-89641-8_25, , , , :
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. CANS : 349-365]]>
https://dblp.org/rec/conf/cans/KoschuchGPHK08Tue, 01 Jan 2008 00:00:00 +0100
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.https://doi.org/10.1007/11894063_34, , , , , , :
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. CHES : 430-444]]>
https://dblp.org/rec/conf/ches/KoschuchLWGSTW06Sun, 01 Jan 2006 00:00:00 +0100