Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Andre Rein"'
Autor:
Andre Rein
Publikováno v:
AsiaCCS
Classic security techniques use patterns (e.g., virus scanner) for detecting malicious software, compiler features (e.g., canaries, tainting) or hardware memory protection features (e.g., DEP) for protecting software. An alternative approach is the v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82fd120a36af5c20883c3f47c58a57b9
https://media.suub.uni-bremen.de/handle/elib/1523
https://media.suub.uni-bremen.de/handle/elib/1523
Publikováno v:
IDAACS
Most security software tools try to detect malicious components by cryptographic hashes, signatures or based on their behavior. The former, is a widely adopted approach based on Integrity Measurement Architecture (IMA) enabling appraisal and attestat
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319403847
CyberICS/WOS-CPS@ESORICS
CyberICS/WOS-CPS@ESORICS
Cooperating systems are systems of systems that collaborate for a common purpose. Cooperating cyber-physical systems often base important decisions on data gathered from external sensors and use external actuators to enforce safety critical actions.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bde36df0b415a3591d486a489d211c89
https://doi.org/10.1007/978-3-319-40385-4_3
https://doi.org/10.1007/978-3-319-40385-4_3
Autor:
Marcos da Silva Ramos, Andre Rein, Stephan Heuser, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Thien Duc Nguyen
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662478530
Financial Cryptography
Financial Cryptography
Today, most smartphones feature different kinds of secure hardware, such as processor-based security extensions (e.g., TrustZone) and dedicated secure co-processors (e.g., SIM-cards or embedded secure elements). Unfortunately, secure hardware is almo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::317076cb2ebc76a221365aea0eea690a
https://doi.org/10.1007/978-3-662-47854-7_23
https://doi.org/10.1007/978-3-662-47854-7_23
Autor:
Alexander Oberle, Andrew Lunn, Andre Rein, Peter Racz, Nicolai Kuntze, Janne Paatero, Carsten Rudolph
Publikováno v:
WCNC
Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish
Publikováno v:
2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).
In todayâs software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirement analyses is
Publikováno v:
2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).
This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the proces
Autor:
Christian Mathiszik, Edwin Zschetzsche, André Reinke, Johannes Koal, Jörg Zschetzsche, Uwe Füssel
Publikováno v:
Crystals, Vol 12, Iss 11, p 1512 (2022)
Conventional resistance spot welds are not visible from the outside. Therefore, it is not straightforward to evaluate the joint quality non-destructively. The pulse-echo method of manual ultrasonic is widely used for non-destructive testing. Another
Externí odkaz:
https://doaj.org/article/42eedf60df7a465e935b7c217cba6f66
Autor:
Claudia Post, Niklas Heyden, André Reinartz, Aaron Foerderer, Simon Bruelisauer, Volker Linnemann, William Hug, Florian Amann
Publikováno v:
Sensors, Vol 22, Iss 13, p 4668 (2022)
The entire water cycle is contaminated with largely undetected micropollutants, thus jeopardizing wastewater treatment. Currently, monitoring methods that are used by wastewater treatment plants (WWTP) are not able to detect these micropollutants, ca
Externí odkaz:
https://doaj.org/article/9b9f279e00c6483d8a8110d9a3abf697
Publikováno v:
Journal of Functional Biomaterials, Vol 9, Iss 1, p 21 (2018)
In this study, the efficacy of electron beam irradiation versus chemical coupling for yielding polyethersulfone (PES) membranes with antibacterial properties was investigated. For the surface coating, a recently discovered lead compound, IL-KKA, comp
Externí odkaz:
https://doaj.org/article/6f2ede6b1a624e38a41966ac28348e41