Matthias Hudler

According to our database1, Matthias Hudler authored at least 17 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.
Proceedings of the 9th International Conference on Internet of Things, 2024

2022
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.
Proceedings of the 7th International Conference on Internet of Things, 2022

2018
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2015
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.
Proceedings of the DCNET 2015, 2015

2013
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

Token-based Authentication for Smartphones.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

2012
Hash Algorithms for 8051-based Sensornodes.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012

2011
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

2010
Smart Elliptic Curve Cryptography for Smart Dust.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

2009
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Prozeßschritte zur Testfallauswahl bei der Testfallgenerierung aus UML-Modellen.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007


  Loading...