Christian Wachsmann
According to our database1,
Christian Wachsmann
authored at least 35 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
IEEE Trans. Emerg. Top. Comput., 2022
2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02344-6, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Trusted and privacy-preserving embedded systems advances in design, analysis and application of lightweight privacy-preserving authentication and physical security primitives.
PhD thesis, 2013
Vertrauenswürdige und privatheitsbewahrende eingebettete Systeme basierend auf Physically Unclonable Functions.
Proceedings of the Ausgezeichnete Informatikdissertationen 2013, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006