André Weimerskirch

According to our database1, André Weimerskirch authored at least 30 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Security Credential Management System for V2X Communications.
IEEE Trans. Intelligent Transportation Systems, 2018

A Security Credential Management System for V2X Communications.
CoRR, 2018

2017
A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Risk Assessment for Cooperative Automated Driving.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

2013
A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2012
Securely Sealing Multi-FPGA Systems.
Proceedings of the Reconfigurable Computing: Architectures, Tools and Applications, 2012

2010
Data Security in Vehicular Communication Networks.
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010

2009
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper).
IACR Cryptology ePrint Archive, 2009

SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

2008
Concrete Security for Entity Recognition: The Jane Doe Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
Embedded security in a pervasive world.
Inf. Sec. Techn. Report, 2007

State of the Art: Embedding Security in Vehicles.
EURASIP J. Emb. Sys., 2007

2006
Generalizations of the Karatsuba Algorithm for Efficient Implementations.
IACR Cryptology ePrint Archive, 2006

2005
Karatsuba algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fixed-Exponent Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fixed-Base Exponentiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

On digital signatures in ad hoc networks.
European Transactions on Telecommunications, 2005

Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Recognition in a Low-Power Environment.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Entity Recognition for Sensor Network Motes.
Proceedings of the INFORMATIK 2005, 2005

2004
Authentication in ad-hoc and sensor networks.
PhD thesis, 2004

2003
Identity certified authentication for ad-hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Zero Common-Knowledge Authentication for Pervasive Networks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Generic GF(2) Arithmetic in Software and Its Application to ECC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Algorithmic Self-assembly Of DNA Tiles And Its Application To Cryptanalysis.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

2001
Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis
CoRR, 2001

A Distributed Light-Weight Authentication Model for Ad-hoc Networks.
Proceedings of the Information Security and Cryptology, 2001

Elliptic Curve Cryptography on a Palm OS Device.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001


  Loading...