Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security

    Third-party dongles for cars, e.g. from insurance companies, can extract sensitive data and even send commands to the car via the standardized OBD-II interface. Due to the lack of message authentication mechan...

    Felix Klement, Henrich C. Pöhls in Attacks and Defenses for the Internet-of-T… (2022)

  2. Article

    Open Access

    ELSA: efficient long-term secure storage of large datasets (full version)

    An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...

    Philipp Muth, Matthias Geihs, Tolga Arul in EURASIP Journal on Information Security (2020)

  3. Article

    Open Access

    Long-term integrity protection of genomic data

    Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...

    Johannes Buchmann, Matthias Geihs, Kay Hamacher in EURASIP Journal on Information Security (2019)

  4. No Access

    Article

    On compiling Boolean circuits optimized for secure multi-party computation

    Secure multi-party computation (MPC) allows two or more distrusting parties to jointly evaluate a function over private inputs. For a long time considered to be a purely theoretical concept, MPC transitioned i...

    Niklas Büscher, Martin Franz, Andreas Holzer in Formal Methods in System Design (2017)

  5. No Access

    Chapter

    Strong PUFs: Models, Constructions, and Security Proofs

    Electronic devices have pervaded our everyday life to a previously unseen extent, and will likely continue to do so in the future. But their ubiquity also makes them a potential target for adversaries and brin...

    Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser in Towards Hardware-Intrinsic Security (2010)