Christian Wachsmann
Christian Wachsmann
Verified email at - Homepage
Cited by
Cited by
Security and privacy challenges in industrial internet of things
AR Sadeghi, C Wachsmann, M Waidner
Proceedings of the 52nd annual design automation conference, 1-6, 2015
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, ▄ Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th Internationalá…, 2012
TyTAN: Tiny trust anchor for tiny devices
F Brasser, B El Mahjoub, AR Sadeghi, C Wachsmann, P Koeberl
Proceedings of the 52nd annual design automation conference, 1-6, 2015
Seda: Scalable embedded device attestation
N Asokan, F Brasser, A Ibrahim, AR Sadeghi, M Schunter, G Tsudik, ...
Proceedings of the 22nd ACM SIGSAC conference on computer and communicationsá…, 2015
A formalization of the security features of physical functions
F Armknecht, R Maes, AR Sadeghi, FX Standaert, C Wachsmann
2011 IEEE symposium on security and privacy, 397-412, 2011
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
Financial Cryptography and Data Security: 16th International Conference, FCá…, 2012
A security framework for the analysis and design of software attestation
F Armknecht, AR Sadeghi, S Schulz, C Wachsmann
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, ▄ Kocabaş, V Van Der Leest, AR Sadeghi, GJ Schrijen, ...
Journal of Cryptographic Engineering 1, 177-186, 2011
PUFatt: Embedded platform attestation based on novel processor-based PUFs
J Kong, F Koushanfar, PK Pendyala, AR Sadeghi, C Wachsmann
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C StŘble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
Short paper: Lightweight remote attestation using physical functions
S Schulz, AR Sadeghi, C Wachsmann
Proceedings of the fourth ACM conference on Wireless network security, 109-114, 2011
Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource
A Dmitrienko, AR Sadeghi, C Wachsmann
US Patent App. 13/912,617, 2014
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
PUF-enhanced RFID security and privacy
AR Sadeghi, I Visconti, C Wachsmann
Workshop on secure component and system identification (SECSI) 110, 2010
Enhancing RFID security and privacy by physically unclonable functions
AR Sadeghi, I Visconti, C Wachsmann
Towards Hardware-Intrinsic Security: Foundations and Practice, 281-305, 2010
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
User privacy in transport systems based on RFID e-tickets
AR Sadeghi, I Visconti, C Wachsmann
PiLBA’08 Privacy in Location-Based Applications, 102-121, 2008
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th Internationalá…, 2013
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
C Wachsmann, L Chen, K Dietrich, H L÷hr, AR Sadeghi, J Winter
Information Security: 13th International Conference, ISC 2010, Boca Ratoná…, 2011
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
C Busold, A Taha, C Wachsmann, A Dmitrienko, H SeudiÚ, M Sobhani, ...
Proceedings of the third ACM conference on Data and application security andá…, 2013
The system can't perform the operation now. Try again later.
Articles 1–20