Dirk Scheuermann

According to our database1, Dirk Scheuermann authored at least 17 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment.
CoRR, 2023

2022
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering.
Microprocess. Microsystems, April, 2022

2021
Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

2017
Addressing Industry 4.0 Security by Software-Defined Networking.
Proceedings of the Guide to Security in SDN and NFV, 2017

Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme.
Inform. Spektrum, 2017

2016
Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

2011
Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates.
Proceedings of the Communication Technologies for Vehicles - Third International Workshop, 2011

On biometric key generation from handwritten signatures.
Proceedings of the BIOSIG 2011, 2011

2010
Increasing Security and Privacy in User-centric Identity Management: The IdM Card Approach.
Proceedings of the 3PGCIC 2010, 2010

2007
Ähnlichkeitseigenschaften von Minutiendatensätzen zur Beurteilung von Interoperabilität.
Datenschutz und Datensicherheit, 2007

Security Evaluation of Scenarios Based on the TCG's TPM Specification.
Proceedings of the Computer Security, 2007

Minutiae template conformance and interoperability issues.
Proceedings of the BIOSIG 2007: Biometrics and Electronic Signatures, 2007

2004
Protected transmission of biometric user authentication data for oncard-matching.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2002
Smartcards with biometric user verification.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

1997
Hash-Funktionen auf der Basis modularer Arithmetik.
PhD thesis, 1997


  Loading...