default search action
Christian Wachsmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Nimisha Limaye, Christian Wachsmann, Mohammed Nabeel, Mohammed Ashraf, Arun K. Kanuparthi, Ozgur Sinanoglu:
AntiDOTE: Protecting Debug Against Outsourced Test Entities. IEEE Trans. Emerg. Top. Comput. 10(3): 1507-1518 (2022)
2010 – 2019
- 2016
- [j4]Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi:
Remanence Decay Side-Channel: The PUF Case. IEEE Trans. Inf. Forensics Secur. 11(6): 1106-1116 (2016) - 2015
- [c21]N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Embedded Device Attestation. CCS 2015: 964-975 - [c20]Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, Patrick Koeberl:
TyTAN: tiny trust anchor for tiny devices. DAC 2015: 34:1-34:6 - [c19]Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner:
Security and privacy challenges in industrial internet of things. DAC 2015: 54:1-54:6 - [i6]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. IACR Cryptol. ePrint Arch. 2015: 148 (2015) - 2014
- [b2]Christian Wachsmann, Ahmad-Reza Sadeghi:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01216-7, pp. 1-91 - [j3]N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos V. Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Mobile Trusted Computing. Proc. IEEE 102(8): 1189-1206 (2014) - [c18]Joonho Kong, Farinaz Koushanfar, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Christian Wachsmann:
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. DAC 2014: 109:1-109:6 - [p3]Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions. Secure Smart Embedded Devices, Platforms and Applications 2014: 429-449 - 2013
- [b1]Christian Wachsmann:
Trusted and privacy-preserving embedded systems advances in design, analysis and application of lightweight privacy-preserving authentication and physical security primitives. Darmstadt University of Technology, Germany, 2013, pp. 1-193 - [c17]Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
A security framework for the analysis and design of software attestation. CCS 2013: 1-12 - [c16]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. CHES 2013: 107-125 - [c15]Christoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi:
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. CODASPY 2013: 233-242 - [p2]Christian Wachsmann:
Vertrauenswürdige und privatheitsbewahrende eingebettete Systeme basierend auf Physically Unclonable Functions. Ausgezeichnete Informatikdissertationen 2013: 291-300 - [i5]Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Towards Provably Secure Software Attestation. IACR Cryptol. ePrint Arch. 2013: 83 (2013) - 2012
- [c14]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. CHES 2012: 283-301 - [c13]Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. Financial Cryptography 2012: 374-389 - [c12]Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-Enabled Smartphones. TRUST 2012: 219-238 - [i4]Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version). IACR Cryptol. ePrint Arch. 2012: 187 (2012) - [i3]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version). IACR Cryptol. ePrint Arch. 2012: 557 (2012) - 2011
- [j2]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Christian Wachsmann:
Recyclable PUFs: logically reconfigurable PUFs. J. Cryptogr. Eng. 1(3): 177-186 (2011) - [c11]Ünal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz:
Poster: practical embedded remote attestation using physically unclonable functions. CCS 2011: 797-800 - [c10]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. CHES 2011: 374-389 - [c9]Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann:
A Formalization of the Security Features of Physical Functions. IEEE Symposium on Security and Privacy 2011: 397-412 - [c8]Steffen Schulz, Ahmad-Reza Sadeghi, Christian Wachsmann:
Short paper: lightweight remote attestation using physical functions. WISEC 2011: 109-114 - [i2]Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 101 (2011) - [i1]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. IACR Cryptol. ePrint Arch. 2011: 552 (2011) - 2010
- [j1]Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann:
Impossibility Results for RFID Privacy Notions. Trans. Comput. Sci. 11: 39-63 (2010) - [c7]Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
On RFID Privacy with Mutual Authentication and Tag Corruption. ACNS 2010: 493-510 - [c6]Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ISC 2010: 84-98 - [c5]Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann:
Anonymous Authentication for RFID Systems. RFIDSec 2010: 158-175 - [p1]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 281-305 - [r1]Ahmad-Reza Sadeghi, Christian Wachsmann:
Trusted Computing. Handbook of Financial Cryptography and Security 2010: 221-256
2000 – 2009
- 2009
- [c4]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Anonymizer-Enabled Security and Privacy for RFID. CANS 2009: 134-153 - [c3]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Location Privacy in RFID Applications. Privacy in Location-Based Applications 2009: 127-150 - 2008
- [c2]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
User Privacy in Transport Systems Based on RFID E-Tickets. PiLBA 2008 - 2006
- [c1]Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy:
TCG inside?: a note on TPM specification compliance. STC 2006: 47-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint