Matthias Hudler
According to our database1,
Matthias Hudler
authored at least 17 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.
Proceedings of the 9th International Conference on Internet of Things, 2024
2022
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.
Proceedings of the 7th International Conference on Internet of Things, 2022
2018
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018
2015
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the DCNET 2015, 2015
2013
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013
2012
Hash Algorithms for 8051-based Sensornodes.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012
2011
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011
2010
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010
Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
2009
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007