Benutzer: Gast  Login
Sortieren nach:
und:
Mehr ...

Ernstberger, Jens;Zhang, Chengru;Ciprian, Luca;Jovanovic, Philipp;Steinhorst, Sebastian
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
IACR Cryptol. ePrint Arch.
2024
1842

Mehr ...

Ernstberger, Jens;Lauinger, Jan;Wu, Yinnan;Gervais, Arthur;Steinhorst, Sebastian
ORIGO: Proving Provenance of Sensitive Data with Constant Communication
IACR Cryptol. ePrint Arch.
2024
447

Mehr ...

Vincenzi, Marco De;Pesé, Mert D.;Bodei, Chiara;Matteucci, Ilaria;Brooks, Richard R.;Hasan, Monowar;Saracino, Andrea;Hamad, Mohammad;Steinhorst, Sebastian
Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives
CoRR
2024
abs/2411.10612

Mehr ...

Debnath, Rubi;Zhao, Luxi;Barzegaran, Mohammadreza;Steinhorst, Sebastian
CyclicSim: Comprehensive Evaluation of Cyclic Shapers in Time-Sensitive Networking
CoRR
2024
abs/2409.19792

Mehr ...

Shivaraman, Nitin;Schuster, Patrick;Ramanathan, Saravanan;Easwaran, Arvind;Steinhorst, Sebastian
Cluster-based Network Time Synchronization for Resilience with Energy Efficiency
CoRR
2024
abs/2409.14323

Mehr ...

Shivaraman, Nitin;Fittler, Jakob;Ramanathan, Saravanan;Easwaran, Arvind;Steinhorst, Sebastian
A novel load distribution strategy for aggregators using IoT-enabled mobile devices
CoRR
2024
abs/2409.14293

Mehr ...

Kühr, Michael;Hamad, Mohammad;MohajerAnsari, Pedram;Pesé, Mert D.;Steinhorst, Sebastian
SoK: Security of the Image Processing Pipeline in Autonomous Vehicles
CoRR
2024
abs/2409.01234

Mehr ...

Ernstberger, Jens;Zhang, Chengru;Ciprian, Luca;Jovanovic, Philipp;Steinhorst, Sebastian
Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs
CoRR
2024
abs/2404.14983

Mehr ...

Debnath, Rubi;Hortig, Philipp;Zhao, Luxi;Steinhorst, Sebastian
Quantifying the Impact of Frame Preemption on Combined TSN Shapers
CoRR
2024
abs/2401.13631

Mehr ...

Finkenzeller, Andreas;Butowski, Oliver;Regnath, Emanuel;Hamad, Mohammad;Steinhorst, Sebastian
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis
CoRR
2024
abs/2401.10664