Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism | 0 | 0.34 | 2022 |
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT | 0 | 0.34 | 2020 |
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation | 0 | 0.34 | 2019 |
Lightweight Authenticated Encryption for Network-on-Chip Communications | 0 | 0.34 | 2019 |
Protecting Communication in Many-Core Systems against Active Attackers. | 0 | 0.34 | 2018 |
Improving Quantization for Channel Reciprocity based Key Generation. | 1 | 0.37 | 2018 |
Secure and energy-efficient interconnects for board-to-board communication | 1 | 0.39 | 2017 |
Security Aspects Of Confidential Network Coding | 1 | 0.36 | 2017 |
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer. | 0 | 0.34 | 2016 |
Resilient and efficient communication in many-core systems using network coding. | 1 | 0.36 | 2015 |
A Metric for Adaptive Routing on Trustworthy Paths. | 0 | 0.34 | 2015 |
Energy Models for Communication of Future Computing Platforms | 1 | 0.35 | 2015 |
Confidential Network Coding: Physical Layer vs. Network Layer | 1 | 0.41 | 2015 |
Analysis of Parallel Applications on a High Performance-Low Energy Computer. | 1 | 0.35 | 2014 |
Adjustable redundancy for secure network coding in a unicast scenario | 3 | 0.50 | 2014 |
A conceptual framework for designing mHealth solutions for developing countries | 5 | 0.61 | 2013 |
Comparison Of Different Secure Network Coding Paradigms Concerning Transmission Efficiency | 1 | 0.35 | 2013 |
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? | 1 | 0.36 | 2013 |
Protection of consumer data in the smart grid compliant with the German smart metering guideline | 3 | 0.47 | 2013 |
Efficiency of secure network coding schemes | 4 | 0.57 | 2012 |
Enhancing privacy in social applications with the notion of group context | 2 | 0.35 | 2012 |
Improved embedding based on a set of cover images. | 1 | 0.68 | 2009 |
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms | 1 | 0.36 | 2009 |
A Comprehensive Approach for Context-dependent Privacy Management | 1 | 0.37 | 2008 |
Privacy-aware user interfaces within collaborative environments | 2 | 0.39 | 2006 |
Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects | 1 | 0.36 | 2006 |
Access Control in a Privacy-Aware eLearning Environment | 7 | 0.67 | 2006 |
Pre-processing for adding noise steganography | 6 | 0.49 | 2005 |
Towards Privacy-Aware eLearning | 10 | 0.99 | 2005 |
Tailored responsibility within component-based systems | 1 | 0.39 | 2005 |
Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. | 0 | 0.34 | 2005 |
Usable presentation of secure pseudonyms | 8 | 0.60 | 2005 |
Adaptive steganography based on dithering | 4 | 0.78 | 2004 |
Adapting Component Models to Support Responsibility | 1 | 0.39 | 2004 |
COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit | 1 | 0.40 | 2003 |
Geschäftsmodelle für Watermarking. | 0 | 0.34 | 1999 |
Steganography Secure against Cover-Stego-Attacks | 9 | 1.23 | 1999 |
A Payment Scheme for Mixes Providing Anonymity | 8 | 0.67 | 1998 |
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks | 6 | 2.81 | 1998 |
A Mix-Mediated Anonymity Service and Its Payment | 2 | 0.39 | 1998 |
Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas | 2 | 0.61 | 1998 |
Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen | 0 | 0.34 | 1997 |
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best | 16 | 32.66 | 1996 |