default search action
Holger Bock
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c37]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-quantum Security for the Extended Access Control Protocol. SSR 2023: 22-52 - [i1]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2023: 352 (2023) - 2022
- [c36]Alexander Köberl, Holger Bock, Christian Steger:
A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts. DSC 2022: 1-8 - [c35]Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger:
Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). TrustCom 2022: 646-655
2010 – 2019
- 2017
- [j8]Norbert Druml, Jürgen Schilling, Walther Pachler, Bernhard Roitner, Thomas Ruprechter, Holger Bock, Gerald Holweg:
Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC. Microprocess. Microsystems 53: 120-129 (2017) - [c34]Thomas Ulz, Thomas Pieber, Christian Steger, Sarah Haas, Rainer Matischek, Holger Bock:
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors. DSD 2017: 229-236 - [c33]Thomas Ulz, Thomas Pieber, Christian Steger, Rainer Matischek, Holger Bock:
Towards trustworthy data in networked control systems: A hardware-based approach. ETFA 2017: 1-8 - [c32]Thomas Ulz, Thomas Pieber, Christian Steger, Sarah Haas, Holger Bock, Rainer Matischek:
Bring your own key for the industrial Internet of Things. ICIT 2017: 1430-1435 - [c31]Thomas Ulz, Thomas Pieber, Christian Steger, Christian M. Lesjak, Holger Bock, Rainer Matischek:
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration. RFID 2017: 41-46 - 2016
- [c30]Jürgen Schilling, Walther Pachler, Bernhard Roitner, Thomas Ruprechter, Holger Bock, Gerald Holweg, Norbert Druml:
Secured Miniaturized System-in-Package Contactless and Passive Authentication Devices Featuring NFC. DSD 2016: 439-445 - [c29]Hannes Plank, Matthias Almer, Robert Lobnik, Christian Steger, Thomas Ruprechter, Holger Bock, Josef Haid, Gerald Holweg, Norbert Druml:
OptiSec3D - A new Paradigm in Secure Communication and Authentication featuring Time-of-Flight. EWSN 2016: 335-340 - [c28]Christian M. Lesjak, Holger Bock, Daniel M. Hein, Martin Maritsch:
Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT. INDIN 2016: 706-713 - 2014
- [c27]Manuel Menghin, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Development Framework for Model Driven Architecture to Accomplish Power-Aware Embedded Systems. DSD 2014: 122-128 - [c26]Norbert Druml, Manuel Menghin, Adnan Kuleta, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems. DSD 2014: 372-378 - [c25]Christian M. Lesjak, Thomas Ruprechter, Josef Haid, Holger Bock, Eugen Brenner:
A secure hardware module and system concept for local and remote industrial embedded system identification. ETFA 2014: 1-7 - [c24]Christian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner:
ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. ICITST 2014: 171-177 - [c23]Manuel Menghin, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Set of Power-Management Patterns for Mobile Embedded Systems. VikingPLoP 2014: 5:1-5:13 - 2013
- [j7]Norbert Druml, Manuel Menghin, Christian Steger, Holger Bock, Josef Haid:
A secure zero-energy NFC solution for everyday electronic devices. Elektrotech. Informationstechnik 130(7): 224-229 (2013) - [j6]Manuel Menghin, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Using field strength scaling to save energy in mobile HF-band RFID-systems. EURASIP J. Embed. Syst. 2013: 4 (2013) - [j5]Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid:
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors. J. Inf. Secur. Appl. 18(2-3): 138-147 (2013) - [j4]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid, Thomas Aichinger, Christiane Ulbricht:
Case study on multiple fault dependability and security evaluations. Microprocess. Microsystems 37(2): 218-227 (2013) - [j3]Armin Krieg, Christopher Preschern, Johannes Grinschgl, Christian Steger, Christian Kreiner, Reinhold Weiss, Holger Bock, Josef Haid:
Power And Fault Emulation for Software Verification and System Stability Testing in Safety Critical Environments. IEEE Trans. Ind. Informatics 9(2): 1199-1206 (2013) - [c22]Andrea Höller, Christopher Preschern, Christian Steger, Christian Kreiner, Armin Krieg, Holger Bock, Josef Haid:
Automatized high-level evaluation of security properties for RTL hardware designs. WESS 2013: 6:1-6:8 - [c21]Norbert Druml, Manuel Menghin, Daniel Kroisleitner, Christian Steger, Reinhold Weiss, Armin Krieg, Holger Bock, Josef Haid:
Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems. DSD 2013: 337-344 - [c20]Norbert Druml, Manuel Menghin, Tobias Rauter, Christian Steger, Reinhold Weiss, Christian Bachmann, Holger Bock, Josef Haid:
Power and Thermal Fault Effect Exploration Framework for Reader/Smart Card Designs. DSD 2013: 898-906 - [c19]Manuel Menghin, Norbert Druml, Manuel Trebo Fioriello, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
PtNBridge - A Power-Aware and Trustworthy Near Field Communication Bridge to Embedded Systems. DSD 2013: 907-914 - [c18]Manuel Menghin, Norbert Druml, Christopher Preschern, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Introduction of design pattern(s) for power-management in embedded systems. EuroPLoP 2013: 1:1-1:12 - [c17]Norbert Druml, Manuel Menghin, Christian Steger, Reinhold Weiss, Andreas Genser, Holger Bock, Josef Haid:
Emulation-Based Test and Verification of a Design's Functional, Performance, Power, and Supply Voltage Behavior. PDP 2013: 328-335 - [c16]Norbert Druml, Manuel Menghin, Daniel Kroisleitner, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Emulation-based design evaluation of reader/smart card systems. RSP 2013: 80-86 - 2012
- [j2]Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
POWER-MODES: POWer-EmulatoR- and MOdel-Based DEpendability and Security Evaluations. ACM Trans. Reconfigurable Technol. Syst. 5(4): 19:1-19:21 (2012) - [c15]Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Hardware-Accelerated Workload Characterization for Power Modeling and Fault Injection. Asian Test Symposium 2012: 149-154 - [c14]Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
System side-channel leakage emulation for HW/SW security coverification of MPSoCs. DDECS 2012: 139-144 - [c13]Norbert Druml, Manuel Menghin, Christian Steger, Reinhold Weiss, Andreas Genser, Holger Bock, Josef Haid:
Adaptive Field Strength ScalingL: A Power Optimization Technique for Contactless Reader / Smart Card Systems. DSD 2012: 616-623 - [c12]Armin Krieg, Johannes Grinschgl, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
PROCOMON: An Automatically Generated Predictive Control Signal Monitor. DSD 2012: 654-660 - [c11]Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Andreas Genser, Holger Bock, Josef Haid:
Characterization and handling of low-cost micro-architectural signatures in MPSoCs. ETS 2012: 1-6 - [c10]Armin Krieg, Johannes Grinschgl, Holger Bock, Josef Haid:
Acceleration of fault attack emulation by consideration of fault propagation. FPT 2012: 239-242 - [c9]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Efficient fault emulation based on post-injection fault effect analysis (PIFEA). MWSCAS 2012: 526-529 - [c8]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Efficient fault emulation using automatic pre-injection memory access analysis. SoCC 2012: 277-282 - [c7]Marc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter:
Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. TrustBus 2012: 238-239 - [c6]Norbert Druml, Manuel Menghin, Rejhan Basagic, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
NIZE - a Near Field Communication interface enabling zero energy standby for everyday electronic devices. WiMob 2012: 261-267 - 2011
- [c5]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Modular Fault Injector for Multiple Fault Dependability and Security Evaluations. DSD 2011: 550-557 - [c4]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Automatic saboteur placement for emulation-based multi-bit fault injection. ReCoSoC 2011: 1-8 - 2010
- [j1]Maximilian Hofer, Christoph Böhm, Holger Bock:
Identifikation, Authentifizierung und Schlüsselgenerierung mittels Physical Uncloneable Functions - Übersicht und Anwendungsgebiete. Elektrotech. Informationstechnik 127(4): 72-77 (2010)
2000 – 2009
- 2004
- [c3]Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer:
A Low-Cost ECC Coprocessor for Smartcards. CHES 2004: 107-118 - [c2]Holger Bock, Marco Bucci, Raimondo Luzzi:
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. CHES 2004: 268-281 - 2003
- [c1]Markus Hütter, Holger Bock, Michael Scheppler:
A New Reconfigurable Architecture for Single Cycle Context Switching. IPDPS 2003: 186
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint