Zobrazeno 1 - 10
of 108
pro vyhledávání: '"Björn Scheuermann"'
Autor:
Jan Sebastian Götte, Björn Scheuermann
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
In this paper, we introduce a novel countermeasure against physical attacks: Inertial Hardware Security Modules (IHSMs). Conventional systems have in common that their security requires the crafting of fine sensor structures that respond to minute ma
Externí odkaz:
https://doaj.org/article/f0bdf645304341029b40af31a9f9d6c1
Publikováno v:
Distributed Computing. 35:399-417
Federated Byzantine Agreement Systems (FBASs) are a fascinating new paradigm in the context of consensus protocols. Originally proposed for powering the Stellar payment network, FBASs can instantiate Byzantine quorum systems without requiring out-of-
Autor:
Christoph Koch, Matthias Weidlich, Volker Markl, Lars Grunske, Dagmar Kainmüller, Alexander Reinefeld, Peter Eisert, Ulf Leser, Florian Schintke, Knut Reinert, Timo Kehrer, Odej Kao, Tilmann Rabl, Nicole Schweikardt, Henning Meyerhenke, Patrick Hostert, Birte Kehr, Claudia Draxl, Marcus Hilbrich, Björn Scheuermann, Kerstin Ritter
Publikováno v:
Datenbank-Spektrum
Today’s scientific data analysis very often requires complex Data Analysis Workflows (DAWs) executed over distributed computational infrastructures, e.g., clusters. Much research effort is devoted to the tuning and performance optimization of speci
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
We explore issues relating to the storage of digital art, based on an empirical investigation into the storage of audiovisual data referenced by non-fungible tokens (NFTs). We identify current trends in NFT data storage and highlight problems with im
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::501d8485a1dcd10287126f1a14ce5ffa
http://arxiv.org/abs/2210.11166
http://arxiv.org/abs/2210.11166
Publikováno v:
ACM Transactions on Computing for Healthcare. 2:1-33
To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to automate the process of finding infected people, also called contact tracing . A special focus was put on preserving the privacy of users. Bluetooth Low Energy as bas
Autor:
Björn Scheuermann, Jan Sebastian Götte
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
In this paper, we introduce a novel countermeasure against physical attacks: Inertial Hardware Security Modules (IHSMs). Conventional systems have in common that their security requires the crafting of fine sensor structures that respond to minute ma
Publikováno v:
IEEE/ACM Transactions on Networking. 27:635-648
The protocol evaluation is an integral part of network protocol design. From the perspective of experimental design, discrete event simulations constitute a middle ground between analytical protocol evaluation and testbeds. They allow precise control
Publikováno v:
ICC Workshops
Super-spreader events have been a driving force of the COVID-19 pandemic. Such events often take place indoors when many people come together. Various systems for automated contact tracing (ACT) have been proposed which warn users if they have come n
Publikováno v:
2021 IEEE Space Hardware and Radio Conference (SHaRC).
The uplinks from ground stations to CubeSats typically support only low data rates. Additionally, the noise level in orbit is relatively high in the frequency bands used. Therefore, the upload of high amounts of data, e.g. software updates, can take