default search action
Michael Kasper
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c21]Vinay B. Y. Kumar, Naina Gupta, Anupam Chattopadhyay, Michael Kasper, Christoph Krauß, Ruben Niederhagen:
Post-Quantum Secure Boot. DATE 2020: 1582-1585
2010 – 2019
- 2019
- [c20]Nandish Chattopadhyay, Anupam Chattopadhyay, Sourav Sen Gupta, Michael Kasper:
Curse of Dimensionality in Adversarial Examples. IJCNN 2019: 1-8 - 2018
- [j3]Arnd Weber, Steffen Reith, Michael Kasper, Dirk Kuhlmann, Jean-Pierre Seifert, Christoph Krauß:
Souveränität und die IT-Wertschöpfungskette. Datenschutz und Datensicherheit 42(5): 291-293 (2018) - [c19]Arnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß:
Open Source Value Chains for Addressing Security Issues Efficiently. QRS Companion 2018: 599-606 - 2017
- [c18]Fernando Nobre, Michael Kasper, Christoffer R. Heckman:
Drift-correcting self-calibration for visual-inertial SLAM. ICRA 2017: 6525-6532 - 2016
- [c17]Michael Waidner, Michael Kasper:
Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution. DATE 2016: 1303-1308 - [c16]Juan M. Falquez, Michael Kasper, Gabe Sibley:
Inertial aided dense & semi-dense methods for robust direct visual odometry. IROS 2016: 3601-3607 - 2014
- [j2]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [c15]Juliane Krämer, Michael Kasper, Jean-Pierre Seifert:
The role of photons in cryptanalysis. ASP-DAC 2014: 780-787 - [c14]Michael Kasper, Nikolaus Correll, Tom Yeh:
Abstracting perception and manipulation in end-user robot programming using Sikuli. TePRA 2014: 1-6 - 2013
- [c13]Christian Brandt, Michael Kasper:
Don't Push It: Breaking iButton Security. FPS 2013: 369-387 - [c12]Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. INDOCRYPT 2013: 215-226 - 2012
- [c11]Michael Zohner, Michael Kasper, Marc Stöttinger:
Butterfly-Attack on Skein's Modular Addition. COSADE 2012: 215-230 - [c10]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. CT-RSA 2012: 365-382 - [c9]Michael Zohner, Michael Kasper, Marc Stöttinger, Sorin A. Huss:
Side channel analysis of the SHA-3 finalists. DATE 2012: 1012-1017 - 2011
- [c8]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis. DSD 2011: 674-681 - [c7]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. ISC 2011: 47-62 - [c6]Thomas Feller, Sunil Malipatlolla, Michael Kasper, Sorin A. Huss:
dcTPM: A Generic Architecture for Dynamic Context Management. ReConFig 2011: 211-216 - [i2]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. IACR Cryptol. ePrint Arch. 2011: 321 (2011) - 2010
- [c5]Michael Kasper, Werner Schindler, Marc Stöttinger:
A stochastic method for security evaluation of cryptographic FPGA implementations. FPT 2010: 146-153
2000 – 2009
- 2008
- [c4]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174 - 2007
- [c3]Michael Kasper:
Virtualisation of a SIM-Card using trusted computing. Informatiktage 2007: 171-178 - [i1]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the deployment of Mobile Trusted Modules. CoRR abs/0712.2113 (2007) - 2001
- [j1]Michael Kasper, Gernot Fricke, Katja Steuernagel, Ewald von Puttkamer:
A behavior-based mobile robot architecture for Learning from Demonstration. Robotics Auton. Syst. 34(2-3): 153-164 (2001) - 2000
- [c2]Frank Peters, Michael Kasper, Mirko Eßling, Ewald von Puttkamer:
Flächendeckendes Explorieren und Navigieren in a priori unbekannter Umgebung mit low-cost Robotern. AMS 2000: 157-164
1990 – 1999
- 1998
- [c1]Michael Kasper, Dirk Müller, Ewald von Puttkamer:
Ein verhaltensorientierter Ansatz zum flächendeckenden Fahren in a priori unbekannter Umgebung. AMS 1998: 180-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint