Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Verified Value Chains, Innovation and Competition.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Souveränität und die IT-Wertschöpfungskette.
Datenschutz und Datensicherheit, 2018
Open Source Value Chains for Addressing Security Issues Efficiently.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Verifizierte Virtualisierung für mehr Sicherheit und Komfort.
Datenschutz und Datensicherheit, 2012
Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing".
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011
The convergence of mobile data phones, consumer electronics, and wallets: Lessons from Japan.
Telematics Informatics, 2007
Enabling crypto: how radical innovations occur.
Commun. ACM, 2002
Die PERSEUS Systemarchitektur.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Full Bindingness and Confidentiality: Requirements for Secure Computers, and Design Options.
Proceedings of the 8th European Conference on Information Systems, 2000
See What You Sign: Secure Implementations of Digital Signatures.
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998
Soziale Alternativen in Zahlungsnetzen.
PhD thesis, 1997