Theo dõi
Erik Tews
Erik Tews
Email được xác minh tại utwente.nl - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Practical attacks against WEP and WPA
E Tews, M Beck
Proceedings of the second ACM conference on Wireless network security, 79-86, 2009
4652009
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
International workshop on information security applications, 188-202, 2007
3832007
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1902013
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014
1382014
Side channels in the McEliece PKC
F Strenzke, E Tews, HG Molter, R Overbeck, A Shoufan
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
1182008
Attacks on the WEP protocol
E Tews
822007
Disguised chromium browser: Robust browser, flash and canvas fingerprinting protection
P Baumann, S Katzenbeisser, M Stopczynski, E Tews
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
472016
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
452010
A privacy protection system for HbbTV in Smart TVs
M Ghiglieri, E Tews
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 357-362, 2014
432014
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
422009
Privacy-preserving whole genome sequence processing through proxy-aided ORAM
N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014
382014
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics
VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ...
arXiv preprint arXiv:1806.04042, 2018
372018
Improving feedback and classroom interaction using mobile phones
H Bär, E Tews, G Rößling
Proceedings of Mobile Learning, 55-62, 2005
372005
In-depth evaluation of redirect tracking and link usage
M Koop, E Tews, S Katzenbeisser
Proceedings on Privacy Enhancing Technologies, 2020
282020
Breaking dvb-csa
E Tews, J Wälde, M Weiner
Western European workshop on research in cryptology, 45-61, 2011
242011
Trust the wire, they always told me! on practical non-destructive wire-tap attacks against ethernet
M Schulz, P Klapper, M Hollick, E Tews, S Katzenbeisser
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
222016
Lost and found: stopping bluetooth finders from leaking private information
M Weller, J Classen, F Ullrich, D Waßmann, E Tews
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
202020
Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss
T Meurs, M Junger, E Tews, A Abhishta
2022 APWG symposium on electronic crime research (eCrime), 1-13, 2022
172022
Mop-2-mop–mobile private microblogging
M Senftleben, M Bucicoiu, E Tews, F Armknecht, S Katzenbeisser, ...
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
172014
HbbTV-I Know What You Are Watching
M Ghiglieri, F Oswald, E Tews
Deutscher IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, 2013
17*2013
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20