Manuel Koschuch

Orcid: 0000-0001-8090-3784

According to our database1, Manuel Koschuch authored at least 26 papers between 2006 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.
Proceedings of the 7th International Conference on Internet of Things, 2022

2021
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Secure Key Management in Embedded Systems: A First Proposal.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework.
Proceedings of the 5th International Conference on Internet of Things, 2020

2019
Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.
Proceedings of the 4th International Conference on Internet of Things, 2019

Safety & Security in the Context of Autonomous Driving.
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019

2018
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper).
Proceedings of the 3rd International Conference on Internet of Things, 2018

2015
Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.
Proceedings of the DCNET 2015, 2015

2014
Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Papers, Please... - X.509 Certificate Revocation in Practice.
Proceedings of the DCNET 2014, 2014

2013
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

Token-based Authentication for Smartphones.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

2012
Hash Algorithms for 8051-based Sensornodes.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012

2011
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

2010
Smart Elliptic Curve Cryptography for Smart Dust.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

2009
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2006
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...