Johannes Winter

According to our database1, Johannes Winter authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Data-driven Services and Servitization in Manufacturing: Innovation, Engineering, Transformation, and Management.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Introduction to the Minitrack on Data-driven Services in Manufacturing: Innovation, Engineering, Transformation, and Management.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Künstliche Intelligenz in Prozessen des Gesundheitswesens - Chancen und Risiken am Beispiel der akuten Schlaganfallbehandlung.
Proceedings of the Künstliche Intelligenz im Gesundheitswesen: Entwicklungen, 2022

2021
On Methods and Measures for the Inspection of Arbitrarily Oriented Subspace Clusters.
Datenbank-Spektrum, 2021

2018
Automata Learning for Symbolic Execution.
Proceedings of the 2018 Formal Methods in Computer Aided Design, 2018

2017
Formal Verification of Masked Hardware Implementations in the Presence of Glitches.
IACR Cryptol. ePrint Arch., 2017

2015
Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using proxy re-encryption for secure data management in an ambient assisted living application.
Proceedings of the Open Identity Summit 2015, 10-11 November 2015, Berlin, Germany, 2015

The ANDIX research OS - ARM TrustZone meets industrial control systems security.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Hardware-security technologies for industrial IoT: TrustZone and security controller.
Proceedings of the IECON 2015, 2015

Film Education for Primary-School Students - Interactive Storytelling as an Educational Approach to Raise Awareness of Design Structures in Feature Films.
Proceedings of the Interactive Storytelling, 2015

2014
Measured Firmware Deployment for Embedded Microcontroller Platforms.
Proceedings of the PECCS 2014, 2014

Formal concepts and methods fostering creative thinking in digital game design.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
A hijacker's guide to communication interfaces of the trusted platform module.
Comput. Math. Appl., 2013

Position Paper: A Path Towards Ubiquitous Protection of Media.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

STUNT: A Simple, Transparent, User-Centered Network of Trust.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted Hardware.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Lightweight Distributed Heterogeneous Attested Android Clouds.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Lightweight Distributed Attestation for the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch., 2011

Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

A Flexible Software Development and Emulation Framework for ARM TrustZone.
Proceedings of the Trusted Systems - Third International Conference, 2011

Anonymous Ticketing for NFC-Enabled Mobile Phones.
Proceedings of the Trusted Systems - Third International Conference, 2011

A Hijacker's Guide to the LPC Bus.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms.
Proceedings of the Communications and Multimedia Security, 2011

2010
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks.
Proceedings of the Trusted Systems - Second International Conference, 2010

A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Towards customizable, application specific mobile trusted modules.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Implementation Aspects of Mobile and Embedded Trusted Computing.
Proceedings of the Trusted Computing, 2009

2008
Secure Boot Revisited.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Trusted computing building blocks for embedded linux-based ARM trustzone platforms.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008


  Loading...