Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Staat, Paul"'
Autor:
Mackensen, Philipp, Staat, Paul, Roth, Stefan, Sezgin, Aydin, Paar, Christof, Moonsamy, Veelasha
Wireless communication infrastructure is a cornerstone of modern digital society, yet it remains vulnerable to the persistent threat of wireless jamming. Attackers can easily create radio interference to overshadow legitimate signals, leading to deni
Externí odkaz:
http://arxiv.org/abs/2402.13773
Autor:
Klix, Simon, Albartus, Nils, Speith, Julian, Staat, Paul, Verstege, Alice, Wilde, Annika, Lammers, Daniel, Langheinrich, Jörn, Kison, Christian, Sester-Wehle, Sebastian, Holcomb, Daniel, Paar, Christof
Intellectual Property (IP) theft is a cause of major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed to IP theft
Externí odkaz:
http://arxiv.org/abs/2312.06195
Autor:
Li, Guyue, Staat, Paul, Li, Haoyu, Heinrichs, Markus, Zenger, Christian, Kronberger, Rainer, Elders-Boll, Harald, Paar, Christof, Hu, Aiqun
Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals. This new security technique is expected to complement existing cryptographic techniques for secret key
Externí odkaz:
http://arxiv.org/abs/2303.07015
Today, we use smartphones as multi-purpose devices that communicate with their environment to implement context-aware services, including asset tracking, indoor localization, contact tracing, or access control. As a de-facto standard, Bluetooth is av
Externí odkaz:
http://arxiv.org/abs/2202.06554
Autor:
Li, Guyue, Hu, Lei, Staat, Paul, Elders-Boll, Harald, Zenger, Christian, Paar, Christof, Hu, Aiqun
Physical layer key generation (PKG) is a promising means to provide on-the-fly shared secret keys by exploiting the intrinsic randomness of the radio channel. However, the performance of PKG is highly dependent on the propagation environments. Due to
Externí odkaz:
http://arxiv.org/abs/2112.10043
A whole range of attacks becomes possible when adversaries gain physical access to computing systems that process or contain sensitive data. Examples include side-channel analysis, bus probing, device cloning, or implanting hardware Trojans. Defendin
Externí odkaz:
http://arxiv.org/abs/2112.09014
Autor:
Staat, Paul, Mulzer, Simon, Roth, Stefan, Moonsamy, Veelasha, Heinrichs, Markus, Kronberger, Rainer, Sezgin, Aydin, Paar, Christof
Wireless radio channels are known to contain information about the surrounding propagation environment, which can be extracted using established wireless sensing methods. Thus, today's ubiquitous wireless devices are attractive targets for passive ea
Externí odkaz:
http://arxiv.org/abs/2112.01967
The intelligent reflecting surface (IRS) is a promising new paradigm in wireless communications for meeting the growing connectivity demands in next-generation mobile networks. IRS, also known as software-controlled metasurfaces, consist of an array
Externí odkaz:
http://arxiv.org/abs/2107.01709
Publikováno v:
IEEE International Conference on Communications (ICC) 2022
Reconfigurable intelligent surfaces (RIS) are a key enabler of various new applications in 6G smart radio environments. By utilizing an RIS prototype system, this paper aims to enhance self-interference (SI) cancellation for in-band full-duplex (FD)
Externí odkaz:
http://arxiv.org/abs/2105.12646
Autor:
Staat, Paul, Elders-Boll, Harald, Heinrichs, Markus, Kronberger, Rainer, Zenger, Christian, Paar, Christof
Physical layer key generation is a promising candidate for cryptographic key establishment between two wireless communication parties. It offers information-theoretic security and is an attractive alternative to public-key techniques. Here, the inher
Externí odkaz:
http://arxiv.org/abs/2010.06613