Skip to main content

previous disabled Page of 7
and
  1. No Access

    Living Reference Work Entry In depth

    Cybersicherheit für die Industrie 4.0 – Aktuelle Herausforderungen

    Die Abwehr von Cyberangriffen ist eine essenzielle Voraussetzung für die Robustheit und Resilienz von IT-gestützten Systemen. Beschränkten sich Angriffe in der Vergangenheit meist auf Serversysteme sowie PCs, ...

    Stefan Katzenbeisser in Handbuch Industrie 4.0 und Digitale Transformation

  2. No Access

    Chapter and Conference Paper

    Firmware-Based DoS Attacks in Wireless Sensor Network

    IoT devices are projected to scale up to hundreds of billions by 2030 due to its applications in agriculture, healthcare, environment, manufacturing, energy transition, and other industries. However, it raises...

    Phi Tuong Lau, Stefan Katzenbeisser in Computer Security. ESORICS 2023 Internatio… (2024)

  3. Article

    Open Access

    The ASHES 2021 special issue at JCEN

    This brief editorial gives a short, two-page overview of the ASHES 2021 workshop. It shall serve as an introduction for this special issue at JCEN.

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2023)

  4. No Access

    Chapter and Conference Paper

    Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things

    The design of the Internet of Things (IoT) system is a complex process, not only in terms of the balance between resource consumption and extensive functionality but also in the context of security. As various...

    Emiliia Geloczi, Felix Klement, Eva Gründinger in Security and Trust Management (2023)

  5. Article

    Open Access

    The ASHES 2020 special issue at JCEN

    This editorial provides its readers with a brief introductory overview of the ASHES workshop series in general, and of this special ASHES 2020 issue at the Journal of Cryptographic Engineering (JCEN) in partic...

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2022)

  6. No Access

    Chapter and Conference Paper

    Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security

    Third-party dongles for cars, e.g. from insurance companies, can extract sensitive data and even send commands to the car via the standardized OBD-II interface. Due to the lack of message authentication mechan...

    Felix Klement, Henrich C. Pöhls in Attacks and Defenses for the Internet-of-T… (2022)

  7. No Access

    Chapter and Conference Paper

    Using Memristor Arrays as Physical Unclonable Functions

    In this work, we introduce two new types of Physical Unclonable Functions (PUFs) based on memristor arrays. Both PUFs use the output behavior of memristor cells when an excitation signal is applied to their in...

    Florian Frank, Tolga Arul in Computer Security – ESORICS 2022 (2022)

  8. No Access

    Chapter and Conference Paper

    ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road Vehicles

    Although numerous automotive security solutions have been presented in the last years, the question of how to properly react to security incidents during vehicle operation has not yet received much attention. ...

    Dominik Püllen, Jonas Liske in Computer Safety, Reliability, and Security (2021)

  9. Article

    Open Access

    ELSA: efficient long-term secure storage of large datasets (full version)

    An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...

    Philipp Muth, Matthias Geihs, Tolga Arul in EURASIP Journal on Information Security (2020)

  10. No Access

    Chapter and Conference Paper

    Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle

    In this work, we conduct and discuss a consensus-based risk analysis for a novel architecture of a driverless and electric prototype vehicle. While well-established safety standards like ISO 26262 provide fram...

    Dominik Püllen, Nikolaos Anagnostopoulos in Computer Safety, Reliability, and Security (2020)

  11. No Access

    Chapter and Conference Paper

    Secure Two-Party Computation in a Quantum World

    Secure multi-party computation has been extensively studied in the past years and has reached a level that is considered practical for several applications. The techniques developed thus far have been steadily...

    Niklas Büscher, Daniel Demmler in Applied Cryptography and Network Security (2020)

  12. No Access

    Chapter and Conference Paper

    Secure Computation of the \(k^{\mathrm {th}}\) -Ranked Element in a Star Network

    We consider the problem of securely computing the \(k^{\mathrm {th}}\) -ranked element in a sequence of n private integers distributed among n parties. The \(k^{\mathrm {th}}\) -ranked element (e.g., minimum, m...

    Anselme Tueno, Florian Kerschbaum in Financial Cryptography and Data Security (2020)

  13. No Access

    Chapter and Conference Paper

    Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection

    We propose a new anomaly detection system to defend against semantic attacks on the command and control communication in safety-critical railway signalling networks. To this end, we train artificial neural net...

    Markus Heinrich, Dominik Renkel, Tolga Arul in Computer Safety, Reliability, and Security (2020)

  14. Article

    Open Access

    Long-term integrity protection of genomic data

    Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...

    Johannes Buchmann, Matthias Geihs, Kay Hamacher in EURASIP Journal on Information Security (2019)

  15. No Access

    Chapter

    The Future of IT in Peace and Security

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover...

    Christian Reuter, Konstantin Aal in Information Technology for Peace and Secur… (2019)

  16. No Access

    Chapter

    Resilient Critical Infrastructures

    Critical infrastructures, such as the electric grid or transportation systems, empower our modern society. Their disruption can seriously impair the daily lives of millions of people. Due to this fact, they ar...

    Matthias Hollick, Stefan Katzenbeisser in Information Technology for Peace and Security (2019)

  17. Chapter and Conference Paper

    Towards Practical RAM Based Secure Computation

    Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...

    Niklas Buescher, Alina Weber, Stefan Katzenbeisser in Computer Security (2018)

  18. No Access

    Article

    On compiling Boolean circuits optimized for secure multi-party computation

    Secure multi-party computation (MPC) allows two or more distrusting parties to jointly evaluate a function over private inputs. For a long time considered to be a purely theoretical concept, MPC transitioned i...

    Niklas Büscher, Martin Franz, Andreas Holzer in Formal Methods in System Design (2017)

  19. No Access

    Chapter and Conference Paper

    A Security Architecture for Railway Signalling

    We present the proposed security architecture Deutsche Bahn plans to deploy to protect its trackside safety-critical signalling system against cyber-attacks. We first present the existing reference interlockin...

    Christian Schlehuber, Markus Heinrich in Computer Safety, Reliability, and Security (2017)

  20. No Access

    Chapter

    Introduction

    Recent years have seen an increase in applications that collect and analyze private data on potentially untrusted machines. With the predominant use of cloud services, computations that were previously perform...

    Niklas Büscher, Stefan Katzenbeisser in Compilation for Secure Multi-party Computation (2017)

previous disabled Page of 7