Christopher Huth
Christopher Huth
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα de.bosch.com
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Scission: Signal characteristic-based sender identification and intrusion detection in automotive networks
M Kneib, C Huth
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
702018
Securing systems on the Internet of Things via physical properties of devices and communications
C Huth, J Zibuschka, P Duplys, T Güneysu
2015 Annual IEEE Systems Conference (SysCon) Proceedings, 8-13, 2015
402015
MEMS gyroscopes as physical unclonable functions
O Willers, C Huth, J Guajardo, H Seidel
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
362016
Information reconciliation schemes in physical-layer security: A survey
C Huth, R Guillaume, T Strohm, P Duplys, IA Samuel, T Güneysu
Computer Networks 109, 84-104, 2016
342016
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions
C Huth, P Duplys, T Güneysu
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
242016
Securing systems with indispensable entropy: LWE-based lossless computational fuzzy extractor for the Internet of Things
C Huth, D Becker, JG Merchan, P Duplys, T Güneysu
IEEE Access 5, 11909-11926, 2017
142017
Method for protecting a network against a cyberattack
M Kneib, C Huth, C Schroff, H Loehr, H Seudie, P Duplys, R Guillaume, ...
US Patent App. 15/967,157, 2018
132018
On the fingerprinting of electronic control units using physical characteristics in controller area networks
M Kneib, C Huth
INFORMATIK 2017, 2017
92017
EASI: Edge-based sender identification on resource-constrained platforms for automotive networks
M Kneib, O Schell, C Huth
Network and Distributed System Security Symposium (NDSS), 1-16, 2020
72020
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
C Huth, A Aysu, J Guajardo, P Duplys, T Güneysu
International Conference on Information Security and Cryptology, 28-48, 2016
72016
LWE-based lossless computational fuzzy extractor for the Internet of Things
C Huth, D Becker, J Guajardo, P Duplys, T Güneysu
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
42017
On the energy cost of channel based key agreement
C Huth, R Guillaume, P Duplys, K Velmurugan, T Güneysu
Proceedings of the 6th International Workshop on Trustworthy Embedded …, 2016
42016
Thienylalanine derivatives as inhibitors of cell adhesion
T Gadek, J Gourvest, A Peyman, J Ruxer, K Scheunemann
US Patent 6,762,190, 2004
42004
On the feasibility of deriving cryptographic keys from MEMS sensors
O Willers, C Huth, J Guajardo, H Seidel, P Deutsch
Journal of Cryptographic Engineering, 1-17, 2019
32019
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
C Huth, D Becker, J Guajardo, P Duplys, T Güneysu
IACR Cryptol. ePrint Arch. 2016, 982, 2016
32016
Method for executing a safety-critical function of a computing unit in a cyber-physical system
P Duplys, C Huth
US Patent 10,169,612, 2019
22019
Physical-layer security architectures for the internet of things
CSF Huth
22018
Method for protecting a network against a cyberattack
C Huth, C Schroff, H Seudie, M Kneib
US Patent 10,757,119, 2020
12020
On the robustness of signal characteristic-based sender identification
M Kneib, O Schell, C Huth
arXiv preprint arXiv:1911.09881, 2019
12019
Method for generating a secret sequence of values in a device as a function of measured physical properties of a transmission channel
C Huth, R Guillaume
US Patent 10,111,091, 2018
12018
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20