default search action
André Weimerskirch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i6]Frank Kargl, Ioannis Krontiris, Jason Millar, André Weimerskirch, Kevin Gomez:
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242). Dagstuhl Reports 13(6): 22-54 (2023) - 2022
- [c18]Shengtuo Hu, Qingzhao Zhang, André Weimerskirch, Z. Morley Mao:
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet. AsiaCCS 2022: 494-507 - [i5]Frank Kargl, Ioannis Krontiris, André Weimerskirch, Ian Williams:
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042). Dagstuhl Reports 12(1): 83-100 (2022)
2010 – 2019
- 2018
- [j4]Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy:
A Security Credential Management System for V2X Communications. IEEE Trans. Intell. Transp. Syst. 19(12): 3850-3871 (2018) - [i4]Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy:
A Security Credential Management System for V2X Communications. CoRR abs/1802.05323 (2018) - 2017
- [c17]Jiafa Liu, Di Ma, André Weimerskirch, Haojin Zhu:
A Functional Co-Design towards Safe and Secure Vehicle Platooning. CPSS@AsiaCCS 2017: 81-90 - 2016
- [c16]Derrick Dominic, Sumeet Chhawri, Ryan M. Eustice, Di Ma, André Weimerskirch:
Risk Assessment for Cooperative Automated Driving. CPS-SPC@CCS 2016: 47-58 - [c15]Yelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch:
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. WOOT 2016 - 2015
- [c14]André Weimerskirch:
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches. TrustED@CCS 2015: 53 - 2013
- [c13]William Whyte, André Weimerskirch, Virendra Kumar, Thorsten Hehn:
A security credential management system for V2V communications. VNC 2013: 1-8 - 2012
- [c12]Tim Güneysu, Igor L. Markov, André Weimerskirch:
Securely Sealing Multi-FPGA Systems. ARC 2012: 276-289 - 2011
- [r6]André Weimerskirch:
Fixed-Base Exponentiation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 482-485 - [r5]André Weimerskirch:
Fixed-Exponent Exponentiation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 485-486 - [r4]André Weimerskirch:
Karatsuba Algorithm. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 666-669 - 2010
- [p1]André Weimerskirch, Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Data Security in Vehicular Communication Networks. VANET 2010: 299-363 - [e2]Timo Kosch, André Weimerskirch, Marc Torrent-Moreno, Marco Gruteser:
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, VANET 2010, Chicago, IL, USA, September 24, 2010. ACM 2010, ISBN 978-1-4503-0145-9 [contents]
2000 – 2009
- 2009
- [c11]Levente Buttyán, Tamás Holczer, André Weimerskirch, William Whyte:
SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. VNC 2009: 1-8 - [e1]Rajeev Shorey, André Weimerskirch, Daniel Jiang, Martin Mauve:
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, VANET 2009, Beijing, China, September 25, 2009. ACM 2009, ISBN 978-1-60558-737-0 [contents] - [i3]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper). IACR Cryptol. ePrint Arch. 2009: 175 (2009) - 2008
- [c10]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol. INDOCRYPT 2008: 158-171 - 2007
- [j3]Marko Wolf, André Weimerskirch, Thomas J. Wollinger:
State of the Art: Embedding Security in Vehicles. EURASIP J. Embed. Syst. 2007 (2007) - [j2]Christof Paar, André Weimerskirch:
Embedded security in a pervasive world. Inf. Secur. Tech. Rep. 12(3): 155-161 (2007) - 2006
- [i2]André Weimerskirch, Christof Paar:
Generalizations of the Karatsuba Algorithm for Efficient Implementations. IACR Cryptol. ePrint Arch. 2006: 224 (2006) - 2005
- [j1]Dirk Westhoff, Bernd Lamparter, Christof Paar, André Weimerskirch:
On digital signatures in ad hoc networks. Eur. Trans. Telecommun. 16(5): 411-425 (2005) - [c9]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Entity Recognition for Sensor Network Motes. GI Jahrestagung (2) 2005: 145-149 - [c8]Jonathan Hammell, André Weimerskirch, Joao Girão, Dirk Westhoff:
Recognition in a Low-Power Environment. ICDCS Workshops 2005: 933-938 - [c7]Marko Wolf, André Weimerskirch, Christof Paar:
Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil. Sicherheit 2005: 193-196 - [r3]André Weimerskirch:
Fixed-Base Exponentiation. Encyclopedia of Cryptography and Security 2005 - [r2]André Weimerskirch:
Fixed-Exponent Exponentiation. Encyclopedia of Cryptography and Security 2005 - [r1]André Weimerskirch:
Karatsuba algorithm. Encyclopedia of Cryptography and Security 2005 - 2004
- [b1]André Weimerskirch:
Authentication in ad-hoc and sensor networks. Ruhr University Bochum, 2004 - 2003
- [c6]André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. ACISP 2003: 79-92 - [c5]André Weimerskirch, Dirk Westhoff:
Zero Common-Knowledge Authentication for Pervasive Networks. Selected Areas in Cryptography 2003: 73-87 - [c4]André Weimerskirch, Dirk Westhoff:
Identity certified authentication for ad-hoc networks. SASN 2003: 33-40 - 2002
- [c3]Olivier Pelletier, André Weimerskirch:
Algorithmic Self-assembly Of DNA Tiles And Its Application To Cryptanalysis. GECCO 2002: 139-146 - 2001
- [c2]André Weimerskirch, Christof Paar, Sheueling Chang Shantz:
Elliptic Curve Cryptography on a Palm OS Device. ACISP 2001: 502-513 - [c1]André Weimerskirch, Gilles Thonet:
A Distributed Light-Weight Authentication Model for Ad-hoc Networks. ICISC 2001: 341-354 - [i1]Olivier Pelletier, André Weimerskirch:
Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis. CoRR cs.CR/0110009 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint