Folgen
Daniel Hein
Titel
Zitiert von
Zitiert von
Jahr
ECC is Ready for RFID–A Proof in Silicon
D Hein, J Wolkerstorfer, N Felber
Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009
1782009
Hardware-security technologies for industrial IoT: TrustZone and security controller
C Lesjak, D Hein, J Winter
IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society …, 2015
832015
Securing smart maintenance services: Hardware-security and TLS for MQTT
C Lesjak, D Hein, M Hofmann, M Maritsch, A Aldrian, P Priller, T Ebner, ...
2015 IEEE 13th international conference on industrial informatics (INDIN …, 2015
732015
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
P Teufl, M Ferk, A Fitzek, D Hein, S Kraxberger, C Orthacker
Security and communication networks 9 (5), 389-419, 2016
652016
Evolution of biped walking using neural oscillators and physical simulation
D Hein, M Hild, R Berger
Robot Soccer World Cup, 433-440, 2007
532007
A PrivacyCA for anonymity and trust
M Pirker, R Toegl, D Hein, P Danner
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
482009
From digital business strategy to market performance: insights into key concepts and processes
A Leischnig, S Wölfl, B Ivens, D Hein
462017
What drives the adoption of autonomous cars?
D Hein, P Rauschnabel, J He, L Richter, B Ivens
422018
Android encryption systems
P Teufl, A Fitzek, D Hein, A Marsalek, A Oprisnik, T Zefferer
2014 International Conference on Privacy and Security in Mobile Systems …, 2014
382014
The ANDIX research OS—ARM TrustZone meets industrial control systems security
A Fitzek, F Achleitner, J Winter, D Hein
2015 IEEE 13th International Conference on Industrial Informatics (INDIN), 88-93, 2015
372015
Secure Block Device--Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems
D Hein, J Winter, A Fitzek
2015 IEEE Trustcom/BigDataSE/ISPA 1, 222-229, 2015
362015
Attacking ECDSA-enabled RFID devices
M Hutter, M Medwed, D Hein, J Wolkerstorfer
Applied Cryptography and Network Security: 7th International Conference …, 2009
362009
Integrated UAV-based real-time mapping for security applications
D Hein, T Kraft, J Brauchle, R Berger
ISPRS International Journal of Geo-Information 8 (5), 219, 2019
342019
Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT
C Lesjak, H Bock, D Hein, M Maritsch
2016 IEEE 14th International Conference on Industrial Informatics (INDIN …, 2016
252016
Group signatures on mobile devices: Practical experiences
K Potzmader, J Winter, D Hein, C Hanser, P Teufl, L Chen
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
242013
Smartwatches: Accessory or Tool?: The Driving Force of Visibility and Usefulness
N Krey, PA Rauschnabel, S Chuah, B Nguyen, DWE Hein, A Rossmann, ...
opus, 2016
232016
An autonomous attestation token to secure mobile agents in disaster response
DM Hein, R Toegl
Security and Privacy in Mobile Information and Communication Systems: First …, 2009
222009
Comparing model-free and model-based algorithms for offline reinforcement learning
P Swazinna, S Udluft, D Hein, T Runkler
IFAC-PapersOnLine 55 (15), 19-26, 2022
172022
Implementing Scaled-Agile Frameworks at Non-Digital Born Companies-A Multiple Case Study
F Schuch, D Gerster, D Hein, A Benlian
142020
Generating interpretable fuzzy controllers using particle swarm optimization and genetic programming
D Hein, S Udluft, TA Runkler
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018
142018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20