Daniel M. Hein

According to our database1, Daniel M. Hein authored at least 24 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play).
Secur. Commun. Networks, 2016

Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

2015
Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Case Study: Automatic Test Case Generation for a Secure Cache Implementation.
Proceedings of the Tests and Proofs - 9th International Conference, 2015

Securing smart maintenance services: Hardware-security and TLS for MQTT.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

The ANDIX research OS - ARM TrustZone meets industrial control systems security.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Hardware-security technologies for industrial IoT: TrustZone and security controller.
Proceedings of the IECON 2015, 2015

2014
Agent-Based Cloud Resource Management for Secure Cloud Infrastructures.
Comput. Informatics, 2014

Identifying Cryptographic Functionality in Android Applications.
Proceedings of the SECRYPT 2014, 2014

Do you think your passwords are secure?
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Android - On-device detection of SMS catchers and sniffers.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Android encryption systems.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Security concepts for a distributed architecture for activity logging and analysis.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

2013
Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

STUNT: A Simple, Transparent, User-Centered Network of Trust.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2010
An autonomous attestation token to secure mobile agents in disaster response.
Secur. Commun. Networks, 2010

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices.
J. Univers. Comput. Sci., 2010

Securing Emergency Response Operations Using Distributed Trust Decisions.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Secure Multi-Agent System for Multi-Hop Environments.
Proceedings of the Computer Network Security, 2010

Trust Management Through Hardware Means: Design Concerns and Optimizations.
Proceedings of the VLSI 2010 Annual Symposium - Selected papers, 2010

2009
A PrivacyCA for Anonymity and Trust.
Proceedings of the Trusted Computing, 2009

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Attacking ECDSA-Enabled RFID Devices.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
ECC Is Ready for RFID - A Proof in Silicon.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008


  Loading...