Author image not provided
 Benedikt Driessen

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.00
Citation Count25
Publication count5
Publication years2008-2016
Available for download3
Average downloads per article361.33
Downloads (cumulative)1,084
Downloads (12 Months)107
Downloads (6 Weeks)9
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
July 2016 WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 65,   Downloads (Overall): 131

Full text available: PDFPDF
In this work, we constructively combine adaptive wormholes with channel-reciprocity based key establishment (CRKE), which has been proposed as a lightweight security solution for IoT devices and might be even more important for the 5G Tactile Internet and its embedded low-end devices. We present a new secret key generation protocol ...
Keywords: adaptive wormhole, channel reciprocity-based key establishment, untrusted relay, internet of things, wireless physical-layer security, 5g, tactile internet

2 published by ACM
December 2013 ACM Transactions on Information and System Security (TISSEC): Volume 16 Issue 3, November 2013
Publisher: ACM
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 28,   Downloads (Overall): 317

Full text available: PDFPDF
General-purpose communication systems such as GSM and UMTS have been in the focus of security researchers for over a decade now. Recently also technologies that are only used under more specific circumstances have come into the spotlight of academic research and the hacker scene alike. A striking example of this ...
Keywords: Mobile security, cryptanalysis, satellite phone systems, stream cipher, binary analysis, real-world attack

July 2012 WAIFI'12: Proceedings of the 4th international conference on Arithmetic of Finite Fields
Publisher: Springer-Verlag
Citation Count: 0

This paper presents intermediate results of our investigations into the potential of analog hardware for the purpose of solving linear equation (LES) systems which are of quadratic form and binary. Based on the assumption that we can efficiently solve binary LES over the rationals with sufficient precision, we present a ...

May 2012 SP '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Citation Count: 6

There is a rich body of work related to the security aspects of cellular mobile phones, in particular with respect to the GSM and UMTS systems. To the best of our knowledge, however, there has been no investigation of the security of satellite phones (abbr. sat phones). Even though a ...
Keywords: Mobile Security, Satellite Phone Systems, Cryptanalysis, Binary Analysis

5 published by ACM
March 2008 WiSec '08: Proceedings of the first ACM conference on Wireless network security
Publisher: ACM
Citation Count: 15
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 636

Full text available: PDFPDF
For many foreseen applications of Wireless Sensor Networks (WSN) - for example monitoring the structural health of a bridge - message integrity is a crucial requirement. Usually, security services such as message integrity are realized by symmetric cryptography only, because asymmetric cryptography is often stated as impracticable for WSN. However, ...

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us