Author of the publication

Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography.

, , , , and . VTC Fall, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Evaluation of Scenarios Based on the TCG's TPM Specification., , , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 438-453. Springer, (2007)Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures., , , , , , and . AINA, page 800-807. IEEE Computer Society, (2016)Ähnlichkeitseigenschaften von Minutiendatensätzen zur Beurteilung von Interoperabilität., and . Datenschutz und Datensicherheit, 31 (3): 186-188 (2007)Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme., , , , , , , , , and . Informatik Spektrum, 40 (5): 419-429 (2017)Protected transmission of biometric user authentication data for oncard-matching., , and . SAC, page 425-430. ACM, (2004)Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System., , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 439-453. Springer, (2015)Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography., , , , and . VTC Fall, page 1-5. IEEE, (2011)Hash-Funktionen auf der Basis modularer Arithmetik.. Justus Liebig University Giessen, (1997)Smartcards with biometric user verification., and . ICME (2), page 589-592. IEEE Computer Society, (2002)0-7803-7304-9.Addressing Industry 4.0 Security by Software-Defined Networking., , , , and . Guide to Security in SDN and NFV, Springer, (2017)