Follow
Jan Zimmer
Jan Zimmer
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Authenticated key establishment for low-resource devices exploiting correlated random channels
CT Zenger, M Pietersz, J Zimmer, JF Posielek, T Lenze, C Paar
Computer Networks 109, 105-123, 2016
542016
Security analysis of quantization schemes for channel-based key extraction
C Zenger, J Zimmer, C Paar
EAI Endorsed Transactions on Security and Safety 2 (6), 267-272, 2015
482015
Exploiting the physical environment for securing the internet of things
CT Zenger, J Zimmer, M Pietersz, JF Posielek, C Paar
Proceedings of the 2015 New Security Paradigms Workshop, 44-58, 2015
392015
The passive eavesdropper affects my channel: Secret-key rates under real-world conditions
C Zenger, H Vogt, J Zimmer, A Sezgin, C Paar
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
372016
On-line entropy estimation for secure information reconciliation
C Zenger, J Zimmer, JF Posielek, C Paar
proceedings of the 12th EAI International Conference on Mobile and …, 2015
102015
Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet
CT Zenger, J Zimmer, M Pietersz, B Driessen, C Paar
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
92016
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version)
C Zenger, H Vogt, J Zimmer, A Sezgin, C Paar
arXiv preprint arXiv:1701.03904, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–7