default search action
Andreas Fuchs 0002
Person information
- affiliation: Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany
- affiliation: Technical University of Darmstadt, Germany
Other persons with the same name
- Andreas Fuchs — disambiguation page
- Andreas Fuchs 0001 — University of Münster, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Dominik Lorych, Lukas Jäger, Andreas Fuchs:
Acceleration of DICE Key Generation using Key Caching. ARES 2024: 122:1-122:8 - 2023
- [j5]Christian Plappert, Dominik Lorych, Michael Eckel, Lukas Jäger, Andreas Fuchs, Ronald Heddergott:
Evaluating the applicability of hardware trust anchors for automotive applications. Comput. Secur. 135: 103514 (2023) - [c26]Christian Plappert, Andreas Fuchs:
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles. ACSAC 2023: 268-282 - [c25]Christian Plappert, Andreas Fuchs:
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles. ACSAC 2023: 283-297 - 2022
- [b1]Andreas Fuchs:
Engineering Trustworthy Systems by Minimizing and Strengthening their TCBs using Trusted Computing. Technical University of Darmstadt, Germany, 2022 - [c24]Christian Plappert, Andreas Fuchs, Ronald Heddergott:
Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain. ARES 2022: 38:1-38:11 - 2021
- [c23]Christian Plappert, Lukas Jäger, Andreas Fuchs:
Secure Role and Rights Management for Automotive Access and Feature Activation. AsiaCCS 2021: 227-241 - 2020
- [c22]Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova:
HIP: HSM-based identities for plug-and-charge. ARES 2020: 33:1-33:6 - [c21]Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova, Ronald Heddergott:
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure. CSCS 2020: 12:1-12:10 - [c20]Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova:
TrustEV: trustworthy electric vehicle charging and billing. SAC 2020: 1706-1715 - [c19]Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova:
Securing Electric Vehicle Charging Systems Through Component Binding. SAFECOMP 2020: 387-401 - [c18]Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer:
Secure Attestation of Virtualized Environments. SEC 2020: 203-216
2010 – 2019
- 2019
- [j4]Markus Heinrich, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. Secur. Commun. Networks 2019: 8348925:1-8348925:14 (2019) - 2017
- [c17]Lukas Jäger, Richard Petri, Andreas Fuchs:
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. ARES 2017: 95:1-95:8 - [c16]Andreas Fuchs, Christoph Krauß, Jürgen Repp:
Runtime Firmware Product Lines Using TPM2.0. SEC 2017: 248-261 - 2016
- [j3]Brahim Hamid, Sigrid Gürgens, Andreas Fuchs:
Security patterns modeling and formalization for pattern-based development of secure software systems. Innov. Syst. Softw. Eng. 12(2): 109-140 (2016) - [c15]Andreas Fuchs, Christoph Krauß, Jürgen Repp:
Advanced Remote Firmware Upgrades Using TPM 2.0. SEC 2016: 276-289 - 2015
- [c14]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. SEC 2015: 630-644 - 2014
- [c13]Luca Pino, George Spanoudakis, Andreas Fuchs, Sigrid Gürgens:
Generating Secure Service Compositions. CLOSER (Selected Papers) 2014: 81-99 - [c12]Luca Pino, George Spanoudakis, Andreas Fuchs, Sigrid Gürgens:
Discovering Secure Service Compositions. CLOSER 2014: 242-253 - 2013
- [c11]Andreas Fuchs, Sigrid Gürgens:
Preserving Confidentiality in Component Compositions. SC@STAF 2013: 33-48 - 2012
- [c10]Jörn Eichler, Andreas Fuchs, Nico Lincke:
Supporting Security Engineering at Design Time with Adequate Tooling. CSE 2012: 194-201 - [c9]Carsten Rudolph, Andreas Fuchs:
Redefining Security Engineering. NTMS 2012: 1-6 - 2011
- [j2]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. Inf. Media Technol. 6(3): 759-776 (2011) - [j1]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. J. Inf. Process. 19: 274-291 (2011) - 2010
- [c8]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
A Formal Notion of Trust - Enabling Reasoning about Security Properties. IFIPTM 2010: 200-215 - [c7]Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii:
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. SEC 2010: 90-102 - [c6]Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs:
Trust in Peer-to-Peer Content Distribution Protocols. WISTP 2010: 76-89
2000 – 2009
- 2009
- [c5]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. CSE (2) 2009: 781-786 - [c4]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Towards a Generic Process for Security Pattern Integration. DEXA Workshops 2009: 171-175 - [c3]Andreas Fuchs, Roland Rieke:
Identification of Security Requirements in Systems of Systems by Functional Security Analysis. WADS 2009: 74-96 - [c2]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
On the Security Validation of Integrated Security Solutions. SEC 2009: 190-201 - [p1]Sigrid Gürgens, Andreas Fuchs:
Security and Dependability Solutions for Networks and Devices. Security and Dependability for Ambient Intelligence 2009: 107-123 - [i1]Nicolai Kuntze, Jürgen Repp, Hervais Simo Fhom, Andreas Fuchs, Ine-Saf Benaissa:
Final Architecture Specification of security, privacy, and incentive mechanisms. CoRR abs/0911.3343 (2009) - 2008
- [c1]Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert:
Improving the scalability of platform attestation. STC 2008: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint