Christian Gehrmann
Orcid: 0000-0001-8003-200X
According to our database1,
Christian Gehrmann
authored at least 59 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024
2023
SN Comput. Sci., November, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022
Proceedings of the International Conference on Computer, 2022
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022
2021
J. Inf. Secur. Appl., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
Proceedings of the 22nd IEEE International Conference on Industrial Technology, 2021
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021
2020
IEEE Trans. Ind. Informatics, 2020
CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
EURASIP J. Inf. Secur., 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IEEE Trans. Cloud Comput., 2017
EAI Endorsed Trans. Security Safety, 2017
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
Int. J. Inf. Sec., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the European Conference on Networks and Communications, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
2015
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies.
J. Inf. Secur. Appl., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
SMACK: Short message authentication check against battery exhaustion in the Internet of Things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
2014
Proceedings of the 2014 IEEE Visual Communications and Image Processing Conference, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Complexity in Engineering, 2012
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2000
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000
1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994