Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. -Ing. Thomas Maier University of Stuttgart

Entwicklung eines aktiven Aufgabenwarn- und assistenzsystems für Unterarm und Handgelenk im Kontext von chirurgischen Armassistenzsystemen und Exoskeletten, , and . Stuttgarter Symposium für Produktentwicklung SSP 2023 : Tagungsband zur Konferenz, Stuttgart, 25. Mai 2023, page 536-545. Stuttgart, Fraunhofer IAO, (2023)
Entwicklung eines aktiven Aufgabenwarn- und assistenzsystems für Unterarm und Handgelenk im Kontext von chirurgischen Armassistenzsystemen und Exoskeletten, , and . Stuttgarter Symposium für Produktentwicklung SSP 2023 : Tagungsband zur Konferenz, Stuttgart, 25. Mai 2023, page 536-545. Stuttgart, Fraunhofer IAO, (2023)Anpassbare Mensch-Maschine-Schnittstellen zwischen Adaptivität und Individualisierung, , , , and . Stuttgarter Symposium für Produktentwicklung SSP 2023 : Tagungsband zur Konferenz, Stuttgart, 25. Mai 2023, page 524-535. Stuttgart, Fraunhofer IAO, (2023)Experiment on digital anthropometric measurements of the hand using machine vision, , and . Stuttgarter Symposium für Produktentwicklung SSP 2023 : Tagungsband zur Konferenz, Stuttgart, 25. Mai 2023, page 428-439. Stuttgart, Fraunhofer IAO, (2023)
 

Other publications of authors with the same name

Trusted virtual domains on OpenSolaris: usable secure desktop environments., , , , and . STC@CCS, page 91-96. ACM, (2010)A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems., , , , and . ReConFig, page 1-6. IEEE, (2014)First-Order Masked Kyber on ARM Cortex-M4., , , , , and . IACR Cryptol. ePrint Arch., (2022)High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers., , , , , , , , and . ACM Trans. Embedded Comput. Syst., 16 (4): 117:1-117:24 (2017)Practical CCA2-Secure and Masked Ring-LWE Implementation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (1): 142-174 (2018)Post-quantum key exchange - a new hope., , , and . IACR Cryptology ePrint Archive, (2015)Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms., , , , , and . BalkanCryptSec, volume 9024 of Lecture Notes in Computer Science, page 103-120. Springer, (2014)Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems., , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 530-547. Springer, (2012)Accelerating Homomorphic Evaluation on Reconfigurable Hardware., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 143-163. Springer, (2015)Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware., , and . IEEE Trans. Computers, 64 (7): 1954-1967 (2015)