default search action
Christian T. Zenger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. IEEE Trans. Inf. Forensics Secur. 19: 5090-5105 (2024) - [c19]Khan Reaz, Thibaud Ardoin, Lea R. Muth, Marian Margraf, Gerhard Wunder, Mahsa Kholghi, Kai Jansen, Christian T. Zenger, Julian Schmidt, Enrico Köppe, Zoran Utkovski, Igor Bjelakovic, Mathis Schmieder, Olaf Dressel:
Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities. NetAISys@MobiSys 2024: 25-30 - [i9]Khan Reaz, Thibaud Ardoin, Lea R. Muth, Marian Margraf, Gerhard Wunder, Mahsa Kholghi, Kai Jansen, Christian T. Zenger, Julian Schmidt, Enrico Köppe, Zoran Utkovski, Igor Bjelakovic, Mathis Schmieder, Olaf Dressel:
Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities. CoRR abs/2408.13124 (2024) - 2023
- [i8]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation. CoRR abs/2303.07015 (2023) - 2022
- [j4]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? IEEE Wirel. Commun. 29(4): 146-153 (2022) - [c18]Paul Staat, Harald Elders-Boll, Markus Heinrichs, Christian T. Zenger, Christof Paar:
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces. AsiaCCS 2022: 208-221 - [c17]Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar:
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. SP 2022: 1722-1736 - [c16]Paul Staat, Kai Jansen, Christian T. Zenger, Harald Elders-Boll, Christof Paar:
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. WISEC 2022: 60-72 - [i7]Paul Staat, Kai Jansen, Christian T. Zenger, Harald Elders-Boll, Christof Paar:
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. CoRR abs/2202.06554 (2022) - 2021
- [c15]Chu Li, Jeremy Brauer, Aydin Sezgin, Christian T. Zenger:
Kalman Filter Based MIMO CSI Phase Recovery for COTS Wifi Devices. ICASSP 2021: 4820-4824 - [c14]Pascal Zimmer, Roland Weinreich, Christian T. Zenger, Aydin Sezgin, Christof Paar:
Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links. ICC 2021: 1-7 - [c13]Paul Staat, Harald Elders-Boll, Markus Heinrichs, Rainer Kronberger, Christian T. Zenger, Christof Paar:
Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. PIMRC 2021: 745-751 - [i6]Paul Staat, Harald Elders-Boll, Markus Heinrichs, Christian T. Zenger, Christof Paar:
Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces. CoRR abs/2107.01709 (2021) - [i5]Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar:
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. CoRR abs/2112.09014 (2021) - [i4]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? CoRR abs/2112.10043 (2021) - 2020
- [i3]Paul Staat, Harald Elders-Boll, Markus Heinrichs, Rainer Kronberger, Christian T. Zenger, Christof Paar:
Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. CoRR abs/2010.06613 (2020) - [i2]Pascal Zimmer, Roland Weinreich, Christian T. Zenger, Aydin Sezgin, Christof Paar:
Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links. CoRR abs/2010.07194 (2020)
2010 – 2019
- 2019
- [c12]Hendrik Vogt, Chu Li, Aydin Sezgin, Christian T. Zenger:
On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels. WIFS 2019: 1-6 - 2017
- [b1]Christian T. Zenger:
Physical-layer security for the internet of things. Ruhr University Bochum, Germany, 2017 - [j3]Heiko Koepke, Thorben Lenze, Mario Pietersz, Christian T. Zenger:
IoT-Schlüsselmanagement. Datenschutz und Datensicherheit 41(10): 617-622 (2017) - [c11]Christian T. Zenger, Mario Pietersz, Andreas Rex, Jeremy Brauer, Falk-Peter Dressler, Christian Baiker, Daniel Theis, Christof Paar:
Implementing a real-time capable WPLS testbed for independent performance and security analyses. ACSSC 2017: 9-13 - [i1]Christian T. Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin, Christof Paar:
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version). CoRR abs/1701.03904 (2017) - 2016
- [j2]Christian T. Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Christof Paar:
Authenticated key establishment for low-resource devices exploiting correlated random channels. Comput. Networks 109: 105-123 (2016) - [c10]Christian T. Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin, Christof Paar:
The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions. GLOBECOM Workshops 2016: 1-6 - [c9]Christian T. Zenger, Mario Pietersz, Christof Paar:
Preventing relay attacks and providing perfect forward secrecy using PHYSEC on 8-bit µC. ICC Workshops 2016: 110-115 - [c8]Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar:
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. WISEC 2016: 109-120 - 2015
- [j1]Christian T. Zenger, Jan Zimmer, Christof Paar:
Security Analysis of Quantization Schemes for Channel-based Key Extraction. EAI Endorsed Trans. Security Safety 2(6): e5 (2015) - [c7]Christian T. Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar:
On-line Entropy Estimation for Secure Information Reconciliation. MobiQuitous 2015: 254-259 - [c6]Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar:
Exploiting the Physical Environment for Securing the Internet of Things. NSPW 2015: 44-58 - [c5]René Guillaume, Fredrik Winzer, Andreas Czylwik, Christian T. Zenger, Christof Paar:
Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios. VTC Fall 2015: 1-5 - 2014
- [c4]Christian T. Zenger, Abhijit K. Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Christof Paar:
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms. BalkanCryptSec 2014: 103-120 - [c3]Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, Christof Paar, Gerhard Wunder:
A Novel Key Generating Architecture for Wireless Low-Resource Devices. SIoT 2014: 26-34 - 2013
- [c2]Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. Privacy Enhancing Technologies 2013: 40-59 - [c1]Timo Kasper, Alexander Kühn, David F. Oswald, Christian T. Zenger, Christof Paar:
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. RFIDSec 2013: 34-53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint