Skip to main content

and
  1. Article

    Open Access

    Embedded fuzzing: a review of challenges, tools, and solutions

    Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to the very hardware architecture, has gro...

    Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth in Cybersecurity (2022)

  2. No Access

    Article

    On the feasibility of deriving cryptographic keys from MEMS sensors

    One of the main challenges in the internet of things (IoT) will be to guarantee the security of products and services enabled by it. A fundamental assumption in any cryptosystem is that secret-key material rem...

    Oliver Willers, Christopher Huth, Jorge Guajardo in Journal of Cryptographic Engineering (2020)

  3. No Access

    Article

    A stakeholder marketing perspective: golf’s potential to (re-)position as a health sport

    Modern societies are challenged by unhealthy lifestyles. There is great evidence that regular physical activity offers positive physiological, mental and social health benefits. Emerging research shows that go...

    Tim Breitbarth, Christopher Huth in German Journal of Exercise and Sport Research (2019)

  4. No Access

    Article

    Crowdfunding in sports

    The sale of naming rights to sport facilities is a widespread practice. However, there may be public resistance to naming rights because sport remains associated with tradition and local identity. In response,...

    Christopher Huth in German Journal of Exercise and Sport Research (2018)

  5. No Access

    Article

    League design and sporting challenge as factors in amateur golf players’ satisfaction

    The organization of individual sports into leagues has received little attention in research, but its practical relevance has increased. This article aims to elucidate the role of competitive balance and leagu...

    Christopher Huth in German Journal of Exercise and Sport Research (2018)

  6. No Access

    Chapter and Conference Paper

    Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

    The Internet of Things (IoT) is boon and bane. It offers great potential for new business models and ecosystems, but raises major security and privacy concerns. Because many IoT systems collect, process, and s...

    Christopher Huth, Aydin Aysu, Jorge Guajardo in Information Security and Cryptology – ICIS… (2017)