Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: André Weimerskirch
@article{DBLP:journals/dagstuhl-reports/KarglKMWG23, author = {Frank Kargl and Ioannis Krontiris and Jason Millar and Andr{\'{e}} Weimerskirch and Kevin Gomez}, title = {Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242)}, journal = {Dagstuhl Reports}, volume = {13}, number = {6}, pages = {22--54}, year = {2023}, url = {https://doi.org/10.4230/DagRep.13.6.22}, doi = {10.4230/DAGREP.13.6.22}, timestamp = {Thu, 14 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/KarglKMWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/HuZWM22, author = {Shengtuo Hu and Qingzhao Zhang and Andr{\'{e}} Weimerskirch and Z. Morley Mao}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Gatekeeper: {A} Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {494--507}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517396}, doi = {10.1145/3488932.3517396}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/HuZWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/KarglKWW22, author = {Frank Kargl and Ioannis Krontiris and Andr{\'{e}} Weimerskirch and Ian Williams}, title = {Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042)}, journal = {Dagstuhl Reports}, volume = {12}, number = {1}, pages = {83--100}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.1.83}, doi = {10.4230/DAGREP.12.1.83}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/KarglKWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/BrechtTWWKHG18, author = {Benedikt Brecht and Dean Therriault and Andr{\'{e}} Weimerskirch and William Whyte and Virendra Kumar and Thorsten Hehn and Roy Goudy}, title = {A Security Credential Management System for {V2X} Communications}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {19}, number = {12}, pages = {3850--3871}, year = {2018}, url = {https://doi.org/10.1109/TITS.2018.2797529}, doi = {10.1109/TITS.2018.2797529}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/BrechtTWWKHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-05323, author = {Benedikt Brecht and Dean Therriault and Andr{\'{e}} Weimerskirch and William Whyte and Virendra Kumar and Thorsten Hehn and Roy Goudy}, title = {A Security Credential Management System for {V2X} Communications}, journal = {CoRR}, volume = {abs/1802.05323}, year = {2018}, url = {http://arxiv.org/abs/1802.05323}, eprinttype = {arXiv}, eprint = {1802.05323}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-05323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuMWZ17, author = {Jiafa Liu and Di Ma and Andr{\'{e}} Weimerskirch and Haojin Zhu}, editor = {Jianying Zhou and Ernesto Damiani}, title = {A Functional Co-Design towards Safe and Secure Vehicle Platooning}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {81--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055193}, doi = {10.1145/3055186.3055193}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuMWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DominicCEMW16, author = {Derrick Dominic and Sumeet Chhawri and Ryan M. Eustice and Di Ma and Andr{\'{e}} Weimerskirch}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {Risk Assessment for Cooperative Automated Driving}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {47--58}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487.2994499}, doi = {10.1145/2994487.2994499}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DominicCEMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/BurakovaHMW16, author = {Yelizaveta Burakova and Bill Hass and Leif Millar and Andr{\'{e}} Weimerskirch}, editor = {Natalie Silvanovich and Patrick Traynor}, title = {Truck Hacking: An Experimental Analysis of the {SAE} {J1939} Standard}, booktitle = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/burakova}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/BurakovaHMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Weimerskirch15, author = {Andr{\'{e}} Weimerskirch}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808423}, doi = {10.1145/2808414.2808423}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/WhyteWKH13, author = {William Whyte and Andr{\'{e}} Weimerskirch and Virendra Kumar and Thorsten Hehn}, title = {A security credential management system for {V2V} communications}, booktitle = {2013 {IEEE} Vehicular Networking Conference, Boston, MA, USA, December 16-18, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/VNC.2013.6737583}, doi = {10.1109/VNC.2013.6737583}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/vnc/WhyteWKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/GuneysuMW12, author = {Tim G{\"{u}}neysu and Igor L. Markov and Andr{\'{e}} Weimerskirch}, editor = {Oliver C. S. Choy and Ray C. C. Cheung and Peter M. Athanas and Kentaro Sano}, title = {Securely Sealing Multi-FPGA Systems}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications - 8th International Symposium, {ARC} 2012, Hong Kong, China, March 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7199}, pages = {276--289}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28365-9\_23}, doi = {10.1007/978-3-642-28365-9\_23}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/GuneysuMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch11, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Fixed-Base Exponentiation}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {482--485}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_29}, doi = {10.1007/978-1-4419-5906-5\_29}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch11a, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Fixed-Exponent Exponentiation}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {485--486}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_30}, doi = {10.1007/978-1-4419-5906-5\_30}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch11b, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Karatsuba Algorithm}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {666--669}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_35}, doi = {10.1007/978-1-4419-5906-5\_35}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/wi/10/WeimerskirchHHL10, author = {Andr{\'{e}} Weimerskirch and Jason J. Haas and Yih{-}Chun Hu and Kenneth P. Laberteaux}, editor = {Hannes Hartenstein and Kenneth P. Laberteaux}, title = {Data Security in Vehicular Communication Networks}, booktitle = {{VANET:} Vehicular Applications and Inter-Networking Technologies}, series = {Intelligent transportation systems}, pages = {299--363}, publisher = {Wiley}, year = {2010}, url = {https://doi.org/10.1002/9780470740637.ch9}, doi = {10.1002/9780470740637.CH9}, timestamp = {Tue, 23 Jul 2019 12:02:26 +0200}, biburl = {https://dblp.org/rec/books/wi/10/WeimerskirchHHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobicom/2010vanet, editor = {Timo Kosch and Andr{\'{e}} Weimerskirch and Marc Torrent{-}Moreno and Marco Gruteser}, title = {Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, {VANET} 2010, Chicago, IL, USA, September 24, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0145-9}, timestamp = {Wed, 27 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/2010vanet.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/ButtyanHWW09, author = {Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Andr{\'{e}} Weimerskirch and William Whyte}, title = {{SLOW:} {A} Practical pseudonym changing scheme for location privacy in VANETs}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2009, Tokyo, Japan, October 28-30, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/VNC.2009.5416380}, doi = {10.1109/VNC.2009.5416380}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/vnc/ButtyanHWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobicom/2009vanet, editor = {Rajeev Shorey and Andr{\'{e}} Weimerskirch and Daniel Jiang and Martin Mauve}, title = {Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, {VANET} 2009, Beijing, China, September 25, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-737-0}, timestamp = {Wed, 27 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/2009vanet.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LucksZWW09, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, title = {Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2009}, url = {http://eprint.iacr.org/2009/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LucksZWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LucksZWW08, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Concrete Security for Entity Recognition: The Jane Doe Protocol}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {158--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_13}, doi = {10.1007/978-3-540-89754-5\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LucksZWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejes/WolfWW07, author = {Marko Wolf and Andr{\'{e}} Weimerskirch and Thomas J. Wollinger}, title = {State of the Art: Embedding Security in Vehicles}, journal = {{EURASIP} J. Embed. Syst.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/74706}, doi = {10.1155/2007/74706}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejes/WolfWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PaarW07, author = {Christof Paar and Andr{\'{e}} Weimerskirch}, title = {Embedded security in a pervasive world}, journal = {Inf. Secur. Tech. Rep.}, volume = {12}, number = {3}, pages = {155--161}, year = {2007}, url = {https://doi.org/10.1016/j.istr.2007.05.006}, doi = {10.1016/J.ISTR.2007.05.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PaarW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeimerskirchP06, author = {Andr{\'{e}} Weimerskirch and Christof Paar}, title = {Generalizations of the Karatsuba Algorithm for Efficient Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2006}, url = {http://eprint.iacr.org/2006/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeimerskirchP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/WesthoffLPW05, author = {Dirk Westhoff and Bernd Lamparter and Christof Paar and Andr{\'{e}} Weimerskirch}, title = {On digital signatures in ad hoc networks}, journal = {Eur. Trans. Telecommun.}, volume = {16}, number = {5}, pages = {411--425}, year = {2005}, url = {https://doi.org/10.1002/ett.1061}, doi = {10.1002/ETT.1061}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/LucksZWW05, author = {Stefan Lucks and Erik Zenner and Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Armin B. Cremers and Rainer Manthey and Peter Martini and Volker Steinhage}, title = {Entity Recognition for Sensor Network Motes}, booktitle = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band 2}, series = {{LNI}}, volume = {{P-68}}, pages = {145--149}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28182}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/LucksZWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/HammellWGW05, author = {Jonathan Hammell and Andr{\'{e}} Weimerskirch and Joao Gir{\~{a}}o and Dirk Westhoff}, title = {Recognition in a Low-Power Environment}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {933--938}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.119}, doi = {10.1109/ICDCSW.2005.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/HammellWGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfWP05, author = {Marko Wolf and Andr{\'{e}} Weimerskirch and Christof Paar}, editor = {Hannes Federrath}, title = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology im Automobil}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {193--196}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28371}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch05, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg}, title = {Fixed-Base Exponentiation}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_170}, doi = {10.1007/0-387-23483-7\_170}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch05a, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg}, title = {Fixed-Exponent Exponentiation}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_171}, doi = {10.1007/0-387-23483-7\_171}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Weimerskirch05b, author = {Andr{\'{e}} Weimerskirch}, editor = {Henk C. A. van Tilborg}, title = {Karatsuba algorithm}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_214}, doi = {10.1007/0-387-23483-7\_214}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Weimerskirch05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Weimerskirch2004, author = {Andr{\'{e}} Weimerskirch}, title = {Authentication in ad-hoc and sensor networks}, school = {Ruhr University Bochum}, year = {2004}, url = {http://www-brs.ub.ruhr-uni-bochum.de/netahtml/HSS/Diss/WeimerskirchAndre/}, urn = {urn:nbn:de:hbz:294-13406}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Weimerskirch2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03, author = {Andr{\'{e}} Weimerskirch and Douglas Stebila and Sheueling Chang Shantz}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {79--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_8}, doi = {10.1007/3-540-45067-X\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WeimerskirchW03, author = {Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Zero Common-Knowledge Authentication for Pervasive Networks}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {73--87}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_6}, doi = {10.1007/978-3-540-24654-1\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WeimerskirchW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/WeimerskirchW03, author = {Andr{\'{e}} Weimerskirch and Dirk Westhoff}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Identity certified authentication for ad-hoc networks}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {33--40}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986864}, doi = {10.1145/986858.986864}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/WeimerskirchW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/PelletierW02, author = {Olivier Pelletier and Andr{\'{e}} Weimerskirch}, editor = {William B. Langdon and Erick Cant{\'{u}}{-}Paz and Keith E. Mathias and Rajkumar Roy and David Davis and Riccardo Poli and Karthik Balakrishnan and Vasant G. Honavar and G{\"{u}}nter Rudolph and Joachim Wegener and Larry Bull and Mitchell A. Potter and Alan C. Schultz and Julian F. Miller and Edmund K. Burke and Natasa Jonoska}, title = {Algorithmic Self-assembly Of {DNA} Tiles And Its Application To Cryptanalysis}, booktitle = {{GECCO} 2002: Proceedings of the Genetic and Evolutionary Computation Conference, New York, USA, 9-13 July 2002}, pages = {139--146}, publisher = {Morgan Kaufmann}, year = {2002}, timestamp = {Mon, 13 Nov 2017 18:15:11 +0100}, biburl = {https://dblp.org/rec/conf/gecco/PelletierW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01, author = {Andr{\'{e}} Weimerskirch and Christof Paar and Sheueling Chang Shantz}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Cryptography on a Palm {OS} Device}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {502--513}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_39}, doi = {10.1007/3-540-47719-5\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WeimerskirchT01, author = {Andr{\'{e}} Weimerskirch and Gilles Thonet}, editor = {Kwangjo Kim}, title = {A Distributed Light-Weight Authentication Model for Ad-hoc Networks}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {341--354}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_26}, doi = {10.1007/3-540-45861-1\_26}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WeimerskirchT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0110009, author = {Olivier Pelletier and Andr{\'{e}} Weimerskirch}, title = {Algorithmic Self-Assembly of {DNA} Tiles and its Application to Cryptanalysis}, journal = {CoRR}, volume = {cs.CR/0110009}, year = {2001}, url = {https://arxiv.org/abs/cs/0110009}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0110009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.