Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Lukas Seidel"'
Autor:
Bahareh Marzban, Lukas Seidel, Teren Liu, Kui Wu, Vivien Kiyek, Marvin Hartwig Zoellner, Zoran Ikonic, Joerg Schulze, Detlev Grützmacher, Giovanni Capellini, Michael Oehme, Jeremy Witzens, Dan Buca
Publikováno v:
ACS Photonics. 10:217-224
Autor:
Lukas Seidel, Soren Schafer, Michael Oehme, Dan Buca, Giovanni Capellini, Jorg Schulze, Daniel Schwarz
Publikováno v:
ESSCIRC 2022- IEEE 48th European Solid State Circuits Conference (ESSCIRC).
Autor:
Maurice Wanitzek, Michael Oehme, Christian Spieth, Daniel Schwarz, Lukas Seidel, Jorg Schulze
Publikováno v:
ESSCIRC 2022- IEEE 48th European Solid State Circuits Conference (ESSCIRC).
Autor:
Bahareh Marzban, Lukas Seidel, Teren Liu, Vivien Kiyek, Kui Wu, Marvin H. Zollner, Zoran Ikonik, Joerg Schulze, D. Grutzmacher, Giovanni Capellini, Michael Oehme, Jeremy Witzens, Dan Buca
Publikováno v:
2022 IEEE Photonics Society Summer Topicals Meeting Series (SUM).
Autor:
David Weißhaupt, Hannes S Funk, Michael Oehme, Dominik Bloos, Fritz Berkmann, Lukas Seidel, Inga A Fischer, Jörg Schulze
Publikováno v:
Semiconductor Science and Technology. 38:035007
Modulation-doped field-effect transistors (MODFET) that are typically based on either a two-dimensional electron gas or a two-dimensional hole gas (2DHG) are highly suitable for low-temperature applications due to the high mobilities attained by the
Autor:
Bahareh Marzban, Lukas Seidel, Vivien Kiyek, Teren Liu, Marvin Zöllner, Zoran Ikonic, Giovanni Capellini, Dan Buca, Jörg Schulze, Michael Oehme, Jeremy Witzens
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1e0405b25cb21b4a6304ec9189c57407
https://hdl.handle.net/11590/406325
https://hdl.handle.net/11590/406325
Autor:
Lukas Seidel, Dominik Maier
Publikováno v:
Proceedings 2021 Workshop on Binary Analysis Research.
Publikováno v:
WISEC
Rogue base stations are an effective attack vector. Cellular basebands represent a critical part of the smartphone's security: they parse large amounts of data even before authentication. They can, therefore, grant an attacker a very stealthy way to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c468e5f3a04cbf6340ac10878818ee45
Publikováno v:
Digital Threats: Research & Practice; Mar2023, Vol. 4 Issue 1, p1-24, 24p
Publikováno v:
Interface; Winter2015, Vol. 24 Issue 4, p82-83, 2p