Stephan Wesemeyer

Orcid: 0000-0002-7167-0146

According to our database1, Stephan Wesemeyer authored at least 20 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Verifying List Swarm Attestation Protocols.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Fine-Grained Trackability in Protocol Executions.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Systematic Improvement of Access-Stratum Security in Mobile Networks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020

Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Time-Varying Block Codes for Synchronization Errors: MAP Decoder and Practical Issues.
CoRR, 2018

SimCommSys: Taking the errors out of error-correcting code simulations.
CoRR, 2018

Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018

2017
Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

2015
Cloning localization approach using k-means clustering and support vector machine.
J. Electronic Imaging, 2015

2014
Cloning Localization Based on Feature Extraction and K-means Clustering.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Forgery localization based on image chroma feature extraction.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

2010
An Improved Decoding Algorithm for the Davey-MacKay Construction.
Proceedings of IEEE International Conference on Communications, 2010

1999
Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes.
Proceedings of the Cryptography and Coding, 1999

1998
On the Automorphism Group of Various Goppa Codes.
IEEE Trans. Inf. Theory, 1998


  Loading...