Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Christian Wachsmann
@article{DBLP:journals/tetc/LimayeWNAKS22, author = {Nimisha Limaye and Christian Wachsmann and Mohammed Nabeel and Mohammed Ashraf and Arun K. Kanuparthi and Ozgur Sinanoglu}, title = {AntiDOTE: Protecting Debug Against Outsourced Test Entities}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {10}, number = {3}, pages = {1507--1518}, year = {2022}, url = {https://doi.org/10.1109/TETC.2021.3102832}, doi = {10.1109/TETC.2021.3102832}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/LimayeWNAKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZeitouniOWKS16, author = {Shaza Zeitouni and Yossef Oren and Christian Wachsmann and Patrick Koeberl and Ahmad{-}Reza Sadeghi}, title = {Remanence Decay Side-Channel: The {PUF} Case}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1106--1116}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512534}, doi = {10.1109/TIFS.2015.2512534}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZeitouniOWKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsokanBISSTW15, author = {N. Asokan and Ferdinand Brasser and Ahmad Ibrahim and Ahmad{-}Reza Sadeghi and Matthias Schunter and Gene Tsudik and Christian Wachsmann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{SEDA:} Scalable Embedded Device Attestation}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {964--975}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813670}, doi = {10.1145/2810103.2813670}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsokanBISSTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BrasserMSWK15, author = {Ferdinand Brasser and Brahim El Mahjoub and Ahmad{-}Reza Sadeghi and Christian Wachsmann and Patrick Koeberl}, title = {TyTAN: tiny trust anchor for tiny devices}, booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015}, pages = {34:1--34:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2744769.2744922}, doi = {10.1145/2744769.2744922}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/BrasserMSWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/SadeghiWW15, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann and Michael Waidner}, title = {Security and privacy challenges in industrial internet of things}, booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015}, pages = {54:1--54:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2744769.2747942}, doi = {10.1145/2744769.2747942}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/SadeghiWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrenSW15, author = {Yossef Oren and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2015}, url = {http://eprint.iacr.org/2015/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrenSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2014Wachsmann, author = {Christian Wachsmann and Ahmad{-}Reza Sadeghi}, title = {Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions}, series = {Synthesis Lectures on Information Security, Privacy, {\&} Trust}, publisher = {Morgan {\&} Claypool Publishers}, year = {2014}, url = {https://doi.org/10.2200/S00622ED1V01Y201412SPT012}, doi = {10.2200/S00622ED1V01Y201412SPT012}, isbn = {978-3-031-01216-7}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/synthesis/2014Wachsmann.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/AsokanEKRRSSW14, author = {N. Asokan and Jan{-}Erik Ekberg and Kari Kostiainen and Anand Rajan and Carlos V. Rozas and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, title = {Mobile Trusted Computing}, journal = {Proc. {IEEE}}, volume = {102}, number = {8}, pages = {1189--1206}, year = {2014}, url = {https://doi.org/10.1109/JPROC.2014.2332007}, doi = {10.1109/JPROC.2014.2332007}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/AsokanEKRRSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/KongKPSW14, author = {Joonho Kong and Farinaz Koushanfar and Praveen Kumar Pendyala and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, title = {PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs}, booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San Francisco, CA, USA, June 1-5, 2014}, pages = {109:1--109:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2593069.2593192}, doi = {10.1145/2593069.2593192}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/KongKPSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/Sadeghi0W14, author = {Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {Physical Security Primitives - {A} Survey on Physically Unclonable Functions and PUF-Based Security Solutions}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {429--449}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_19}, doi = {10.1007/978-1-4614-7915-4\_19}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/14/Sadeghi0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Wachsmann13, author = {Christian Wachsmann}, title = {Trusted and privacy-preserving embedded systems advances in design, analysis and application of lightweight privacy-preserving authentication and physical security primitives}, school = {Darmstadt University of Technology, Germany}, year = {2013}, url = {http://tuprints.ulb.tu-darmstadt.de/3851/}, urn = {urn:nbn:de:tuda-tuprints-38513}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Wachsmann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtSSW13, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A security framework for the analysis and design of software attestation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516650}, doi = {10.1145/2508859.2516650}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenSW13, author = {Yossef Oren and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {107--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_7}, doi = {10.1007/978-3-642-40349-1\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BusoldTWDSSS13, author = {Christoph Busold and Ahmed Taha and Christian Wachsmann and Alexandra Dmitrienko and Herv{\'{e}} Seudie and Majid Sobhani and Ahmad{-}Reza Sadeghi}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {233--242}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435382}, doi = {10.1145/2435349.2435382}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BusoldTWDSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/gi/Wachsmann13, author = {Christian Wachsmann}, editor = {Abraham Bernstein and Wolfgang Effelsberg and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Klaus{-}Peter L{\"{o}}hr and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Nicole Schweikardt and Myra Spiliopoulou and Harald St{\"{o}}rrle and Sabine S{\"{u}}sstrunk}, title = {Vertrauensw{\"{u}}rdige und privatheitsbewahrende eingebettete Systeme basierend auf Physically Unclonable Functions}, booktitle = {Ausgezeichnete Informatikdissertationen 2013}, series = {{LNI}}, volume = {{D-14}}, pages = {291--300}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/33817}, timestamp = {Tue, 04 Jul 2023 17:43:38 +0200}, biburl = {https://dblp.org/rec/conf/gi/Wachsmann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtSSW13, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, title = {Towards Provably Secure Software Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2013}, url = {http://eprint.iacr.org/2013/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KatzenbeisserKRSVW12, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vladimir Rozic and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {283--301}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_17}, doi = {10.1007/978-3-642-33027-8\_17}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/KatzenbeisserKRSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HerrewegeKMPSVW12, author = {Anthony Van Herrewege and Stefan Katzenbeisser and Roel Maes and Roel Peeters and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann}, editor = {Angelos D. Keromytis}, title = {Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {374--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_27}, doi = {10.1007/978-3-642-32946-3\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HerrewegeKMPSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DmitrienkoSTW12, author = {Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {SmartTokens: Delegable Access Control with NFC-Enabled Smartphones}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {219--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_13}, doi = {10.1007/978-3-642-30921-2\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/DmitrienkoSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DmitrienkoSTW12, author = {Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann}, title = {SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2012}, url = {http://eprint.iacr.org/2012/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DmitrienkoSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzenbeisserKRSVW12, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vladimir Rozic and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann}, title = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2012}, url = {http://eprint.iacr.org/2012/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzenbeisserKRSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KatzenbeisserKLSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Christian Wachsmann}, title = {Recyclable PUFs: logically reconfigurable PUFs}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {177--186}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0016-9}, doi = {10.1007/S13389-011-0016-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KatzenbeisserKLSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KocabasSWS11, author = {{\"{U}}nal Ko{\c{c}}abas and Ahmad{-}Reza Sadeghi and Christian Wachsmann and Steffen Schulz}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: practical embedded remote attestation using physically unclonable functions}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {797--800}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093496}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KocabasSWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KatzenbeisserKLSSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Heike Schr{\"{o}}der and Christian Wachsmann}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Recyclable PUFs: Logically Reconfigurable PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {374--389}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_25}, doi = {10.1007/978-3-642-23951-9\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KatzenbeisserKLSSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ArmknechtMSSW11, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Fran{\c{c}}ois{-}Xavier Standaert and Christian Wachsmann}, title = {A Formalization of the Security Features of Physical Functions}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {397--412}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.10}, doi = {10.1109/SP.2011.10}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzSW11, author = {Steffen Schulz and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: lightweight remote attestation using physical functions}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {109--114}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998432}, doi = {10.1145/1998412.1998432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchulzSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenDLSWW11, author = {Liqun Chen and Kurt Dietrich and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Christian Wachsmann and Johannes Winter}, title = {Lightweight Anonymous Authentication with {TLS} and {DAA} for Embedded Mobile Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2011}, url = {http://eprint.iacr.org/2011/101}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenDLSWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzenbeisserKLSSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Heike Schr{\"{o}}der and Christian Wachsmann}, title = {Recyclable PUFs: Logically Reconfigurable PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2011}, url = {http://eprint.iacr.org/2011/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzenbeisserKLSSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/ArmknechtSSVW10, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Alessandra Scafuro and Ivan Visconti and Christian Wachsmann}, title = {Impossibility Results for {RFID} Privacy Notions}, journal = {Trans. Comput. Sci.}, volume = {11}, pages = {39--63}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17697-5\_3}, doi = {10.1007/978-3-642-17697-5\_3}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/ArmknechtSSVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ArmknechtSVW10, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Jianying Zhou and Moti Yung}, title = {On {RFID} Privacy with Mutual Authentication and Tag Corruption}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {493--510}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_29}, doi = {10.1007/978-3-642-13708-2\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ArmknechtSVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WachsmannCDLSW10, author = {Christian Wachsmann and Liqun Chen and Kurt Dietrich and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Johannes Winter}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Lightweight Anonymous Authentication with {TLS} and {DAA} for Embedded Mobile Devices}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {84--98}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_8}, doi = {10.1007/978-3-642-18178-8\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WachsmannCDLSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/ArmknechtCSW10, author = {Frederik Armknecht and Liqun Chen and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Anonymous Authentication for {RFID} Systems}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {158--175}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_14}, doi = {10.1007/978-3-642-16822-2\_14}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/ArmknechtCSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SadeghiVW10, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Enhancing {RFID} Security and Privacy by Physically Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {281--305}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_13}, doi = {10.1007/978-3-642-14452-3\_13}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/isc/SadeghiVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SadeghiW10, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Burton Rosenberg}, title = {Trusted Computing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {221--256}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c9}, doi = {10.1201/9781420059823-C9}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SadeghiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SadeghiVW09, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Anonymizer-Enabled Security and Privacy for {RFID}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {134--153}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_10}, doi = {10.1007/978-3-642-10433-6\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SadeghiVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SadeghiVW09, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Location Privacy in {RFID} Applications}, booktitle = {Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]}, series = {Lecture Notes in Computer Science}, volume = {5599}, pages = {127--150}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03511-1\_6}, doi = {10.1007/978-3-642-03511-1\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SadeghiVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SadeghiVW08, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {User Privacy in Transport Systems Based on {RFID} E-Tickets}, booktitle = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:59 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SadeghiVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SadeghiSSWW06, author = {Ahmad{-}Reza Sadeghi and Marcel Selhorst and Christian St{\"{u}}ble and Christian Wachsmann and Marcel Winandy}, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {{TCG} inside?: a note on {TPM} specification compliance}, booktitle = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {47--56}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179474.1179487}, doi = {10.1145/1179474.1179487}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SadeghiSSWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.