| 2013 |
|
Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids
IEEE Journal on Selected Areas in Communication (JSAC) - JSAC Smart Grid Communications Series
|
| |
|
A Decisional Attack to Privacy-friendly Data Aggregation in Smart Grids
IEEE Globecom 2013 - Symposium on Selected Areas in Communications - GC13 SAC Green Communication Systems and Networks
|
| |
|
Verifiable Trust between Electronic Control Units based on a single Trust Anchor
11th Embedded Security in Cars (escar)
|
| |
|
Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks
Proceedings of the ISC 2013: The 16th Information Security Conference
|
| |
|
Secure Distributed Data Aggregation in the Automatic Metering Infrastructure of Smart Grids
IEEE International Conference on Communications (ICC) - Selected Areas in Communications Symposium (ICC SAC)
|
| |
|
Using Trusted Platform Modules for Location Assurance in Cloud Networking
Proceedings of the 7th International Conference on Network and System Security (NSS 2013)
|
| 2012 |
|
Implementation of a Protocol for Secure Distributed Aggregation of Smart Metering Data
International Conference on Smart Grid Technology, Economics and Policies (SG-TEP 2012)
|
| |
|
Towards Secure Fieldbus Communication
31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)
|
| 2011 |
|
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen
Datenschutz und Datensicherheit
|
| |
|
T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks
7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
|
| 2010 |
|
Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection
it-Information Technology
|
| |
|
A Security Model for Future Vehicular Electronic Infrastructures
8th Embedded Security in Cars (escar)
|
| |
|
Handling Insider Attacks in Wireless Sensor Networks
|
| |
|
Infiltrating critical infrastructures with next-generation attacks: W32.Stuxnet as a showcase threat
Fraunhofer SIT, Darmstadt
|
| 2009 |
|
PDoS-Resilient Push Protocols for Sensor Networks
The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009)
|
| |
|
Short Hash-based Signatures for Wireless Sensor Networks
Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009)
|
| 2008 |
|
Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
|
| |
|
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications
|
| |
|
On Handling Insider Attacks in Wireless Sensor Networks
Information Security Technical Report
|
| 2007 |
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
|
| |
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
|
| |
|
A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
2nd International Conference on Availability, Reliability and Security ({ARES}) 2007
|
| 2005 |
|
Identification of Security Requirements in WLAN-WLAN Inter-Domain Handovers based on Threat And Risk Analysis
The 8th International Symposium on Wireless Personal Multimedia Communications WPMC 2005
|