Christopher Huth
Orcid: 0000-0002-1473-1221
According to our database1,
Christopher Huth
authored at least 19 papers
between 2015 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
2020
J. Cryptogr. Eng., 2020
EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
2018
Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
On the Fingerprinting of Electronic Control Units Using Physical Characteristics in Controller Area Networks.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch., 2016
Comput. Networks, 2016
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
2015
Securing systems on the Internet of Things via physical properties of devices and communications.
Proceedings of the Annual IEEE Systems Conference, 2015