André Weimerskirch

According to our database1, André Weimerskirch authored at least 34 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242).
Dagstuhl Reports, 2023

2022
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042).
Dagstuhl Reports, 2022

Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2018
A Security Credential Management System for V2X Communications.
IEEE Trans. Intell. Transp. Syst., 2018

2017
A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Risk Assessment for Cooperative Automated Driving.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

2013
A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2012
Securely Sealing Multi-FPGA Systems.
Proceedings of the Reconfigurable Computing: Architectures, Tools and Applications, 2012

2011
Karatsuba Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fixed-Exponent Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fixed-Base Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Data Security in Vehicular Communication Networks.
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010

2009
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper).
IACR Cryptol. ePrint Arch., 2009

SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

2008
Concrete Security for Entity Recognition: The Jane Doe Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
Embedded security in a pervasive world.
Inf. Secur. Tech. Rep., 2007

State of the Art: Embedding Security in Vehicles.
EURASIP J. Embed. Syst., 2007

2006
Generalizations of the Karatsuba Algorithm for Efficient Implementations.
IACR Cryptol. ePrint Arch., 2006

2005
Karatsuba algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fixed-Exponent Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fixed-Base Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

On digital signatures in ad hoc networks.
Eur. Trans. Telecommun., 2005

Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Recognition in a Low-Power Environment.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Entity Recognition for Sensor Network Motes.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

2004
Authentication in ad-hoc and sensor networks.
PhD thesis, 2004

2003
Identity certified authentication for ad-hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Zero Common-Knowledge Authentication for Pervasive Networks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Generic GF(2) Arithmetic in Software and Its Application to ECC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Algorithmic Self-assembly Of DNA Tiles And Its Application To Cryptanalysis.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

2001
A Distributed Light-Weight Authentication Model for Ad-hoc Networks.
Proceedings of the Information Security and Cryptology, 2001

Elliptic Curve Cryptography on a Palm OS Device.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001


  Loading...