Author of the publication

When and How to Aggregate Message Authentication Codes on Lossy Channels?

, , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 241-264. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantification and Localization of Cross-Core Interference for Embedded Multi-Core Control Applications., , and . ICSCA, page 189-193. ACM, (2018)Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication., , , , , and . CoRR, (2023)Mental Health Promotion with Animated Characters: Exploring Issues and Potential., and . AAAI Spring Symposium: Emotion, Personality, and Social Behavior, page 72-79. AAAI, (2008)HighTecBot - Ein Roboter-Baukastensystem zur Unterstützung der Informatik-Lehre an Hochschulen., , and . Echtzeit, page 41-50. Springer, (2008)Manipulating multi-core interferences for sensorless electrical drive applications on implementation level., , and . IECON, page 6681-6686. IEEE, (2016)Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes., , and . CoRR, (2021)PowerDuck: A GOOSE Data Set of Cyberattacks in Substations., , , , , and . CSET @ USENIX Security Symposium, page 49-53. ACM, (2022)One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection., , , , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 102-122. Springer, (2023)Facilitating Protocol-independent Industrial Intrusion Detection Systems., , and . CCS, page 2105-2107. ACM, (2020)Towards Frame-Based Source Code Generation for Heterogeneous Real-Time Environments., and . CESCIT, page 212-217. International Federation of Automatic Control, (2012)