Secure Firmware Update Over the Air in the Internet of Things Focusing on Flexibility and Feasibility S Schmidt, M Tausig, M Hudler, G Simhandl Internet of Things Software Update Workshop (IoTSU), Dublin, 2016 | 17 | 2016 |
Token-based authentication for smartphones M Koschuch, M Hudler, H Eigner, Z Saffer 2013 International Conference on Data Communication Networking (DCNET), 1-6, 2013 | 16 | 2013 |
Smart elliptic curve cryptography for smart dust J Großschädl, M Hudler, M Koschuch, M Krüger, A Szekely Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th …, 2012 | 16 | 2012 |
Performance evaluation of the TLS handshake in the context of embedded devices M Koschuch, M Hudler, M Krüger 2010 International Conference on Data Communication Networking (DCNET), 1-10, 2010 | 8 | 2010 |
Workload characterization of a lightweight SSL implementation resistant to side-channel attacks M Koschuch, J Großschädl, U Payer, M Hudler, M Krüger Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 7 | 2008 |
Hardware/software co-design of public-key cryptography for ssl protocol execution in embedded systems M Koschuch, J Großschädl, D Page, P Grabher, M Hudler, M Krüger Information and Communications Security: 11th International Conference …, 2009 | 6 | 2009 |
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things. S Schmidt, M Tausig, M Koschuch, M Hudler, G Simhandl, P Puddu, ... IoTBDS, 63-72, 2018 | 4 | 2018 |
The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA M Koschuch, M Hudler, M Krüger e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012 | 3 | 2012 |
Optimizing cryptographic threshold schemes for the use in wireless sensor networks: Position paper M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl Proceedings of the International Conference on, 1-4, 2011 | 3 | 2011 |
Applicability of multiparty computation schemes for wireless sensor networks M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl 2010 International Conference on Data Communication Networking (DCNET), 1-4, 2010 | 3 | 2010 |
A Generic toolchain for model-based test generation and selection A Kraas, M Kruger, P Aschenbrenner, M Hudler, Y Lei TESTCOM/FATES 2007, 2007 | 3 | 2007 |
Applicability of Multiparty Computation Schemes for Wireless Sensor Networks-Position Paper. M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl DCNET/OPTICS, 125-128, 2010 | 2 | 2010 |
Towards algorithm agility for wireless sensor networks: Comparison of the portability of selected Hash functions M Koschuch, M Hudler, Z Saffer 2013 International Conference on Data Communication Networking (DCNET), 1-5, 2013 | 1 | 2013 |
Hash Algorithms for 8051-based Sensornodes. M Koschuch, M Hudler, M Krüger DCNET/ICE-B/OPTICS, 65-68, 2012 | 1 | 2012 |
Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography. P Grassl, M Hudler, M Koschuch IoTBDS, 329-338, 2024 | | 2024 |
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length. P Hölzmer, M Koschuch, M Hudler IoTBDS, 258-266, 2022 | | 2022 |
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility S Prinz, S Schmidt, M Koschuch, A Glaser, T Fruhwirth, M Hudler E-Business and Telecommunications: 12th International Joint Conference …, 2016 | | 2016 |
Speaking in tongues practical evaluation of TLS cipher suites compatibility M Koschuch, T Fruhwirth, A Glaser, S Schmidt, M Hudler 2015 12th International Joint Conference on e-Business and …, 2015 | | 2015 |
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl E-Business and Telecommunications: International Joint Conference, ICETE …, 2012 | | 2012 |
Prozeßschritte zur Testfallauswahl bei der Testfallgenerierung aus UML-Modellen M Hudler, M Krüger Informatik 2007–Informatik trifft Logistik–Band 2, 387-391, 2007 | | 2007 |