Frederic Stumpf

According to our database1, Frederic Stumpf authored at least 33 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Improving mobile device security with operating system-level virtualization.
Comput. Secur., 2015

2014
Side-channel analysis of a high-throughput AES peripheral with countermeasures.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

SobrTrA: a software-based trust anchor for ARM cortex application processors.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

TrustID: trustworthy identities for untrusted mobile devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Protecting PUF Error Correction by Codeword Masking.
IACR Cryptol. ePrint Arch., 2013

Improving Mobile Device Security with Operating System-Level Virtualization.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

PAL - privacy augmented LTE: a privacy-preserving scheme for vehicular LTE communication.
Proceedings of the Proceeding of the tenth ACM international workshop on Vehicular inter-networking, 2013

Active File Integrity Monitoring Using Paravirtualized Filesystems.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Localized electromagnetic analysis of RO PUFs.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Comprehensive analysis of software countermeasures against fault attacks.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
Allgegenwärtig: Eingebettete Systeme.
Datenschutz und Datensicherheit, 2012

Attestation of Mobile Baseband Stacks.
Proceedings of the Network and System Security - 6th International Conference, 2012

A New Security Architecture for Smartcards Utilizing PUFs.
Proceedings of the ISSE 2012, 2012

Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Complementary IBS: Application specific error correction for PUFs.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

A Cache Timing Attack on AES in Virtualization Environments.
Proceedings of the Financial Cryptography and Data Security, 2012

Localized Electromagnetic Analysis of Cryptographic Implementations.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

A Secure Architecture for Smart Meter Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Side-Channel Analysis of PUFs and Fuzzy Extractors.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

A Cost-Effective FPGA-based Fault Simulation Environment.
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011

2010
Leveraging attestation techniques for trust establishment in distributed systems.
PhD thesis, 2010

Efficient One-pass Entity Authentication based on ECC for Constrained Devices.
Proceedings of the HOST 2010, 2010

Improving the quality of ring oscillator PUFs on FPGAs.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

2009
Revocation of TPM Keys.
Proceedings of the Trusted Computing, 2009

Enhancing Control of Service Compositions in Service-Oriented Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Improving the scalability of platform attestation.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
Proceedings of the The Third International Conference on Availability, 2008

2007
Erzeugung elektronischer Signaturen mittels Trusted Platform Module.
Datenschutz und Datensicherheit, 2007

Vertrauen(skapseln) beim Online-Einkauf.
Datenschutz und Datensicherheit, 2007

An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

An Approach to a Trustworthy System Architecture Using Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...