Christoph Lipps

Orcid: 0000-0001-6382-9156

According to our database1, Christoph Lipps authored at least 25 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.
Network, 2024

Latency optimized Deep Neural Networks (DNNs): An Artificial Intelligence approach at the Edge using Multiprocessor System on Chip (MPSoC).
CoRR, 2024

Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review.
IEEE Access, 2024

Update Rate and Dimension Requirements for Reconfigurable Mirror Arrays in Vehicular Visible Light Communication.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

A Ring Topology Approach: Efficient Communication in Wireless Body Area Networks (WBANs).
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024

DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces.
Discov. Internet Things, December, 2023

URLLC Physical Layer Authentication based on non-linear Supervised Learning.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Piezoelectric Beam Path Modulation for Visible Light Communication.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG).
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Multi-Feature Physical Layer Authentication for URLLC based on Linear Supervised Learning.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Fully Homomorphic Encryption: Precision Loss in Wireless Mobile Communication.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Open Source 5G Core Network Implementations: A Qualitative and Quantitative Analysis.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
No One Acts like You: AI based Behavioral Biometric Identification.
Proceedings of the 3rd International Conference on Next Generation Computing Applications, 2022

Reconfigurable Intelligent Surfaces: A Physical Layer Security Perspective.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

2021
Physical Layer Security based Key Management for LoRaWAN.
CoRR, 2021

2020
Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

2019
Two Decades of SCADA Exploitation: A Brief History.
CoRR, 2019

Securing Industrial Wireless Networks: Enhancing SDN with PhySec.
Proceedings of the Conference on Next Generation Computing Applications, 2019

2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware., 2018

Demystifying Deception Technology: A Survey.
CoRR, 2018

Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Deception in Information Security: Legal Considerations in the Context of German and European Law.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017


  Loading...