Martin Schramm

Orcid: 0000-0001-6206-2969

According to our database1, Martin Schramm authored at least 11 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis.
Inf., 2023

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2021
Lightweight edge authentication for software defined networks.
Computing, 2021

Development and Evaluation of a Data Privacy Concept for a Frustration-Aware In-Vehicle System: Development and Evaluation of a Data Privacy Concept for a Frustration-Aware In-Vehicle System.
Proceedings of the AutomotiveUI '21: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2021

2019
A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection.
Comput. Secur., 2019

A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks.
Proceedings of the 2019 International Electronics Communication Conference, 2019

On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Towards a frustration-aware assistant for increased in-vehicle UX: F-RELACS.
Proceedings of the Adjunct Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2019

2018
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(s<sup>m</sup>) Based on Montgomery Arithmetic.
Secur. Commun. Networks, 2018

2013
Enhanced embedded device security by combining hardware-based trust mechanisms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...