Georg T. Becker
Orcid: 0000-0002-1200-1508
According to our database1,
Georg T. Becker
authored at least 27 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2022
Automated benchmark network diversification for realistic attack simulation with application to moving target defense.
Int. J. Inf. Sec., 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
2020
Proc. Priv. Enhancing Technol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
2019
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice.
IEEE Trans. Dependable Secur. Comput., 2019
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.
IACR Cryptol. ePrint Arch., 2019
2018
IEEE Trans. Computers, 2018
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
2017
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
2016
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
2011
Proceedings of the IEEE 29th International Conference on Computer Design, 2011
2010
Proceedings of the HOST 2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010