Ludwig Seitz

According to our database1, Ludwig Seitz authored at least 26 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Software Updates for IoT Based on Industry Requirements.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework.
RFC, August, 2022

Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE).
RFC, August, 2022

Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE).
RFC, August, 2022

Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth).
RFC, August, 2022

Context-Aware Policy Enforcement for PaaS-Enabled Access Control.
IEEE Trans. Cloud Comput., 2022

2021
Evaluating the performance of the OSCORE security protocol in constrained IoT environments.
Internet Things, 2021

2020
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs).
RFC, March, 2020

2019
Object Security for Constrained RESTful Environments (OSCORE).
RFC, July, 2019

Authentication and Authorization for IoT Devices in Disadvantaged Environments.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

2017
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
Int. J. Inf. Sec., 2017

2016
Use Cases for Authentication and Authorization in Constrained Environments.
RFC, January, 2016

S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things.
IEEE Trans Autom. Sci. Eng., 2016

Robust and Scalable DTLS Session Establishment.
ERCIM News, 2016

2015
Security and Privacy in the Internet of Things.
ERCIM News, 2015

2014
New paradigms for access control in constrained environments.
Proceedings of the 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, 2014

2013
Authorization framework for the Internet-of-Things.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

2008
Decentralized Access Control Management for Network Configuration.
J. Netw. Syst. Manag., 2008

Secure communication for ad-hoc, federated groups.
Proceedings of the IDtrust 2008, 2008

2006
A Classification of Delegation Schemes for Attribute Authority.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
Authentication and Authorisation Prototype on the μgrid for Medical Data Management.
Proceedings of the From Grid to Healthgrid, 2005

Policy administration control and delegation using XACML and Delegent.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

2004
Medical Images Simulation, Storage, and Processing on the European DataGrid Testbed.
J. Grid Comput., 2004

MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Key Management for Encrypted Data Storage in Distributed Systems.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Semantic Access Control for Medical Applications in Grid Environments.
Proceedings of the Euro-Par 2003. Parallel Processing, 2003


  Loading...