Zum Inhalt

Methodologies for Trustworthiness

The empirical determination of system properties, for example by testing software, is very limited in its informative value. Trustworthiness must already be considered in the system specification and in the system design process. This requires new methods that can be used to incorporate the desired level of trustworthiness into the system specification. These methods must be implementable using procedures that can be automated and executed by machines.

The work on these methods aims to design systems that are trustworthy from the outset ("by design") in the long term. To achieve this, BI relies on formal methods, which involve rigorous mathematical considerations and proofs, rather than empirical procedures such as measurements or tests.
As a general principle, the BI pursues a holistic approach that spans multiple phases of the lifecycle of these systems - from standardization, design and implementation through to deployment and runtime.

As a general principle, BI pursues a holistic approach that covers several phases of the life cycle of these systems - from standardization, design and implementation to deployment and runtime. Our current focus is on methods for the design and implementation of trustworthy systems. Specifically, these are methods for the formal and automatable specification of systems, programming languages and compilers that implement these specifications, and methods for the formal verification of the results generated by the compiler. These topics are dealt with by the groups Trustworthy Data Processing and Verified System Design Automation.
 

Projects

3D representation of a digital server system with illuminated security icons symbolising protection and data encryption.
02.12.2024

Formula-V: Building a Fully Verified and Trustworthy IT system

The Formula-V project demonstrates how formal verification can lead to particularly trustworthy IT systems. Using mathematically grounded methods, both software and hardware are verified to ensure security and reliability from the very beginning. The aim is to shape digital technologies that are secure by design and to set new standards in system development. (Duration: 12/2024 – 12/2028)

Read more

 A drone flies over fields and forests. On its front is has a label with a white cross on a red background suggesting that it is used for some kind of medical reason. A drone flies over fields and forests. On its front is a sign with a white cross on a red background, indicating that it is being used for medical purposes. There is an antenna tower in the background. A drone flies over fields and forests. On its front is a sign with a white cross on a red background, indicating that it is being used for medical purposes. There is an antenna tower in the background.
01.11.2023

InnoDCon: Secure Drone Navigation via Mobile Networks

How can drones fly securely beyond the operator’s line of sight? The InnoDCon project explores how mobile and satellite networks, post-quantum cryptography, and real-time signal data can ensure safe, stable drone operations—for logistics, medical use, and agriculture. The project emphasizes open, future-ready technologies. (Duration: 11/2023 – 06/2025)

Read more

01.01.2023

Hexa-X-II: Secure 6G Communication for the Future

As part of the Hexa-X-II project, the Barkhausen Institut is developing security solutions for the next generation of 6G communication. The focus is on physical layer security, data privacy for mission-critical communication, and automated security decisions. With these approaches, the institute is strengthening the trustworthiness and efficiency of future 6G networks. (Duration: 01/2023 - 06/2025)

Read more

31.12.2022

6G-ReS: Secure and resilient 5G/6G systems

6G-ReS project focuses on developing resilient 5G/6G systems for crisis communication. Using the O-RAN standard, open interfaces and 'zero trust' security can be ensured, enabling robust communication in the face of targeted attacks and natural disasters. BI investigates the O-Ran standard for the Radio Access Network (RAN, which relies on the use of virtualization and promotes open interfaces and interoperability. (Duration: 12/2022 - 06/2025)

Read more

15.11.2022

KOMSENS-6G

The goal of KOMSENS-6G is to add another core functionality to the 6th generation (6G) mobile communications system: radio sensing. BI will develop radio frequency hardware for Joint Communication and Sensing and will also focus on security and privacy of such systems. (Duration: 11/2022 - 11/2025)

Read more

01.10.2022

6G-ICAS4Mobility - Combining communication and radar?

The aim of ICAS4Mobility is to combine communication and radar and integrate them into a common system for the future 6G mobile communications standard. Barkhausen Institut is investigating privacy aspects and options for securing captured sensor data against manipulations. (Duration: 10/2022 - 09/2025)

Read more

01.10.2021

6G Platform

6G is already the sixth generation of mobile communications. The Barkhausen Institut participates in the research and development of 6G by being part of the 6G Platform project. Within the project, the BI conducts research on trustworthiness issues and designs new formats of science communication. (Duration: 10/2021 - 09/2025)

Read more

01.01.1970

5G Lab Germany Forschungsfeld Lausitz

In this project, the Barkhausen Institut is researching secure communication channels for autonomous driving. The project focuses on data protection, end-to-end encryption and trustworthy data processing in cloud environments. (Duration: 2021-2022)

Read more

Publications

Rudi Schneider, Marcus Rossel, Kœhler Thomas, Andrés Goens, Michel Steuwer, Slotted E-Graphs: First-Class Support for (Bound) Variables in E-Graphs, PLDI, 2025

Download PDF

@conference{
slotted_egraphs_2025,
title = "Slotted E-Graphs: First-Class Support for (Bound) Variables in E-Graphs",
author = "Rudi Schneider, Marcus Rossel, Kœhler Thomas, Andrés Goens, Michel Steuwer",
year = "2025",
booktitle = "PLDI",
pages = "23"
}

Max Kurze, A Framework for Modular and Compositional Reasoning in Kôika, 2025

Download PDF

@mastersthesis{
max_kurze_msc_thesis,
title = "A Framework for Modular and Compositional Reasoning in Kôika",
author = "Max Kurze",
year = "2025",
school = "Technische Universität Dresden",
month = "March",
url = "https://zenodo.org/records/15073479"
}

Garvit Chhabra, A formally-verified Network-on-Chip in Coq, 2025

Download PDF

@mastersthesis{
garvit_chabra_msc_thesis,
title = "A formally-verified Network-on-Chip in Coq",
author = "Garvit Chhabra",
year = "2025",
school = "Technische Universität Dresden",
month = "January",
url = "https://zenodo.org/records/15004685"
}

Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell, Privacy Modeling and Enhancement Methodology for JCAS-Enabled Railway Applications, 39th International Conference on Advanced Information Networking and Applications (AINA), 2025 , Download PDF

@inproceedings{
ZoDK_25,
title = "Privacy Modeling and Enhancement Methodology for JCAS-Enabled Railway Applications",
author = "Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell",
year = "2025",
booktitle = "39th International Conference on Advanced Information Networking and Applications (AINA)"
}

Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell, Privacy Analysis and Enhancement for Joint Communication and Sensing Applications, 21st International Wireless Communications & Mobile Computing Conference (IWCMC), 2025 , Download PDF

@inproceedings{
ZoDa_25,
title = "Privacy Analysis and Enhancement for Joint Communication and Sensing Applications",
author = "Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell",
year = "2025",
booktitle = "21st International Wireless Communications & Mobile Computing Conference (IWCMC)"
}

Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell, Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach, IEEE Symposium on Security and Privacy, The Deep Learning Security and Privacy Workshop (DLSP 2025), 2025 , Download PDF

@conference{
priv_pfl_2025,
title = "Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach",
author = "Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell",
year = "2025",
booktitle = "IEEE Symposium on Security and Privacy, The Deep Learning Security and Privacy Workshop (DLSP 2025)"
}

Prajnamaya Dass, µ-Trust: Trustworthy and Transparent Service Composition for Microservice-Based IoT Systems, IEEE Systems Journal, 2025

@article{
micro_trust_2025,
title = "µ-Trust: Trustworthy and Transparent Service Composition for Microservice-Based IoT Systems",
author = "Prajnamaya Dass",
year = "2025",
journal = "IEEE Systems Journal"
}

Padmanava Sen, Prajnamaya Dass, Stefan Köpsell, Gerhard Fettweis, RF Hardware Reconfigurability for Privacy-Preserving Integrated Sensing and Communication, 5th IEEE International Symposium on Joint Communications & Sensing (JC&S), 2025 , Download PDF

@article{
PaDa_24,
title = "RF Hardware Reconfigurability for Privacy-Preserving Integrated Sensing and Communication",
author = "Padmanava Sen, Prajnamaya Dass, Stefan Köpsell, Gerhard Fettweis",
year = "2025",
journal = "5th IEEE International Symposium on Joint Communications & Sensing (JC&S)"
}

Yevhen Zolotavkin, Yurii Baryshev, Jannik Mähn, Vitalii Lukichov, Stefan Köpsell, Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems, Computer Networks, 2025

@article{
ZOLOTAVKIN2025110972,
title = "Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems",
author = "Yevhen Zolotavkin, Yurii Baryshev, Jannik Mähn, Vitalii Lukichov, Stefan Köpsell",
year = "2025",
journal = "Computer Networks",
volume = "257",
note = "https://doi.org/10.1016/j.comnet.2024.110972"
}

Kenneth-Raphael Keil, Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke, Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity, Open Identity Summit 2024, 2024

Access PDF

@article{
Keil_24,
title = "Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity",
author = "Kenneth-Raphael Keil, Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke",
year = "2024",
journal = "Open Identity Summit 2024",
author_text = "Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke"
}

Prajnamaya Dass, Marcel Daniel Sven Kevin Gräfenstein, Stefan Köpsell, Navigating Privacy Challenges in Mission Critical Communication: Insights for 6G Networks, 29th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2024 , Download PDF

Download PDF

@article{
DaGK_24,
title = "Navigating Privacy Challenges in Mission Critical Communication: Insights for 6G Networks",
author = "Prajnamaya Dass, Marcel Daniel Sven Kevin Gräfenstein, Stefan Köpsell",
year = "2024",
journal = "29th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"
}

Prajnamaya Dass, Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell, Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects, 12th Annual Privacy Forum (APF), 2024 , Download PDF

@article{
DaUN_24,
title = "Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects",
author = "Prajnamaya Dass, Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell",
year = "2024",
journal = "12th Annual Privacy Forum (APF)",
author_text = "Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell"
}

Sebastian Ertel, Max Kurze, Michael Raitza, On the Potential of Coq as the Platform of Choice for Hardware Design, Coq Workshop, 2024

Download PDF

@inproceedings{
ertelCOQ2024,
title = "On the Potential of Coq as the Platform of Choice for Hardware Design",
author = "Sebastian Ertel, Max Kurze, Michael Raitza",
year = "2024",
booktitle = "Coq Workshop",
url = "https://coq-workshop.gitlab.io/2024/files/EA4.pdf"
}

Muhammad Umar, Martin Laabs, Niels Neumann, Dirk Plettemeier, A Low-Cost 60 GHz Modular Front-end Design for Channel Sounding, IEEE Transactions on Components, Packaging and Manufacturing Technology, 2024

Download PDF

@article{
umar_tcpmt,
title = "A Low-Cost 60 GHz Modular Front-end Design for Channel Sounding",
author = "Muhammad Umar, Martin Laabs, Niels Neumann, Dirk Plettemeier",
year = "2024",
journal = "IEEE Transactions on Components, Packaging and Manufacturing Technology",
volume = "11",
doi = "10.1109/TCPMT.2024.3353332"
}

Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten, Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024 , Download PDF

@inproceedings{
RoPa_2024,
title = "Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal",
author = "Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)",
author_text = "Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten"
}

Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell, Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security, Global Information Infrastructure and Networking Symposium (GIIS'24), 2024

@inproceedings{
BaBoK_2024,
title = "Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security",
author = "Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell",
year = "2024",
booktitle = "Global Information Infrastructure and Networking Symposium (GIIS'24)"
}

Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell, Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024

@inproceedings{
BoBaK_2024,
title = "Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach",
author = "Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)"
}

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss, Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis, ACM Computing Surveys, ACM Computing Surveys, 2023 , Download PDF

@article{
JeZoD_2023,
title = "Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis",
author = "Jongkil Jeong, Yevhen Zolotavkin, Robin Doss",
year = "2023",
journal = "ACM Computing Surveys",
booktitle = "ACM Computing Surveys",
month = "January",
number = "1",
volume = "55"
}

Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell, Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation, 9th International Conference on Information Systems Security and Privacy (ICISSP'23), 2023 , Download PDF

@inproceedings{
ZoBa_2024,
title = "Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation",
author = "Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell",
year = "2023",
booktitle = "9th International Conference on Information Systems Security and Privacy (ICISSP'23)"
}

Stefano Tomasin, Hongliang Zhang, Arsenia Chorti, Vincent Poor, Challenge-Response Physical Layer Authentication Over Partially Controllable Channels, IEEE Communications Magazine, 2022 , Download PDF

@article{
AC_Comm-Magazine2022,
title = "Challenge-Response Physical Layer Authentication Over Partially Controllable Channels",
author = "Stefano Tomasin, Hongliang Zhang, Arsenia Chorti, Vincent Poor",
year = "2022",
journal = "IEEE Communications Magazine"
}

Miroslav Mitev, André Barreto, Minh Thuy Pham, Maximilian Matthé, Gerhard Fettweis, Filterbank Secret Key Generation Rates in Multipath Channels, IEEE Global Communications Conference (Globecom) 2022, 2022 , Download PDF

@conference{
Mitev_Globecom2022,
title = "Filterbank Secret Key Generation Rates in Multipath Channels",
author = "Miroslav Mitev, André Barreto, Minh Thuy Pham, Maximilian Matthé, Gerhard Fettweis",
year = "2022",
booktitle = "IEEE Global Communications Conference (Globecom) 2022",
publisher = "IEEE"
}

Miroslav Mitev, Arsenia Chorti, Mahdi Shakiba-Herfeh, Martin Reed, Sajjad Baghaee, A Physical Layer, Zero-round-trip-time, Multi-factor Authentication Protocol, IEEE Access, 2022

@article{
Mitev_Access_2022,
title = "A Physical Layer, Zero-round-trip-time, Multi-factor Authentication Protocol",
author = "Miroslav Mitev, Arsenia Chorti, Mahdi Shakiba-Herfeh, Martin Reed, Sajjad Baghaee",
year = "2022",
journal = "IEEE Access"
}

Miroslav Mitev, André Barreto, Minh Thuy Pham, Gerhard Fettweis, Secret Key Generation Rates over Frequency Selective Channels, IEEE Vehicular Technology Conference (VTC-Spring), 2022 , Download PDF

@inproceedings{
Mitev_2022_VTCS,
title = "Secret Key Generation Rates over Frequency Selective Channels",
author = "Miroslav Mitev, André Barreto, Minh Thuy Pham, Gerhard Fettweis",
year = "2022",
booktitle = "IEEE Vehicular Technology Conference (VTC-Spring)",
address = "Helsinki, Finland",
month = "June"
}

Arsenia Chorti, André Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard Fettweis, Vincent Poor, Context-Aware Security for 6G Wireless: The Role of Physical Layer Security, IEEE Communications Standards Magazine, 2022

@article{
chorti2022_commstd,
title = "Context-Aware Security for 6G Wireless: The Role of Physical Layer Security",
author = "Arsenia Chorti, André Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard Fettweis, Vincent Poor",
year = "2022",
journal = "IEEE Communications Standards Magazine"
}

Minh Thuy Pham, André Barreto, Miroslav Mitev, Maximilian Matthé, Gerhard Fettweis, Secure Communications in Line-of-Sight Scenarios by Rotation-based Secret Key Generation, IEEE International Conference on Communications (ICC), 2022 , Download PDF

@conference{
Pham2022_ICC,
title = "Secure Communications in Line-of-Sight Scenarios by Rotation-based Secret Key Generation",
author = "Minh Thuy Pham, André Barreto, Miroslav Mitev, Maximilian Matthé, Gerhard Fettweis",
year = "2022",
booktitle = "IEEE International Conference on Communications (ICC)",
address = "Seoul, South Korea",
month = "MAy"
}

Simone del Prete, Franco Fuschini, Marina Barbirolli, Marco Zoli, André Barreto, A Study on Physical Layer Security Through Ray Tracing Simulations, European Conference on Antennas and Propagation (EUCAP), 2022

@inproceedings{
delPrete_2022_EUCAP,
title = "A Study on Physical Layer Security Through Ray Tracing Simulations",
author = "Simone del Prete, Franco Fuschini, Marina Barbirolli, Marco Zoli, André Barreto",
year = "2022",
booktitle = "European Conference on Antennas and Propagation (EUCAP)",
address = "Madrid, Spain",
month = "March"
}

Tim Lackorzynski, Hermann Härtig, Stefan Köpsell, Secure and Efficient Tunneling of MACsec for Modern Industrial Use Case, Annual Computer Security Applications Conference (ACSAC), Industrial Control System Security Workshop (ICSS), 2021 , Download PDF

@inproceedings{
Lack_2021,
title = "Secure and Efficient Tunneling of MACsec for Modern Industrial Use Case",
author = "Tim Lackorzynski, Hermann Härtig, Stefan Köpsell",
year = "2021",
booktitle = "Annual Computer Security Applications Conference (ACSAC), Industrial Control System Security Workshop (ICSS)"
}

Alessandro Santorsola, Marco Zoli, André Barreto, Vincenzo Petruzzelli, Giovanna Calò, Effect of Radio Channel and Antennas on Physical-Layer-Security Key Exchange, IEEE Access, 2021 , Download PDF

@article{
Santorsola20210,
title = "Effect of Radio Channel and Antennas on Physical-Layer-Security Key Exchange",
author = "Alessandro Santorsola, Marco Zoli, André Barreto, Vincenzo Petruzzelli, Giovanna Calò",
year = "2021",
journal = "IEEE Access",
url = "https://ieeexplore.ieee.org/document/9628090",
doi = "10.1109/ACCESS.2021.3131616"
}

Miroslav Mitev, Arsenia Chorti, Elena Belmega, Vincent Poor, Protecting physical layer secret key generation from active attacks, MDPI Entropy, 2021

@article{
Mitev_2021_Entropy,
title = "Protecting physical layer secret key generation from active attacks",
author = "Miroslav Mitev, Arsenia Chorti, Elena Belmega, Vincent Poor",
year = "2021",
journal = "MDPI Entropy"
}

Marco Zoli, Miroslav Mitev, André Barreto, Gerhard Fettweis, Estimation of the Secret Key Rate in Wideband Wireless Physical-Layer-Security, International Symposium on Wireless Communication Systems (ISWCS), 2021 , Download PDF

@inproceedings{
Zoli_2021_ISWCS,
title = "Estimation of the Secret Key Rate in Wideband Wireless Physical-Layer-Security",
author = "Marco Zoli, Miroslav Mitev, André Barreto, Gerhard Fettweis",
year = "2021",
booktitle = "International Symposium on Wireless Communication Systems (ISWCS)"
}

Marco Zoli, André Barreto, Gerhard Fettweis, Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study, IEEE Vehicular Technology Conference (VTC-Spring), 2021

@conference{
Zoli_2021_vtcs,
title = "Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study",
author = "Marco Zoli, André Barreto, Gerhard Fettweis",
year = "2021",
booktitle = "IEEE Vehicular Technology Conference (VTC-Spring)",
address = "Helsinki, Finland",
number = "April"
}

Stephan Escher, Markus Sontowski, Stefan Köpsell, How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme, Proceedings VTC2021-Spring, 2021 , Download PDF

@inproceedings{
EsKS_2021,
title = "How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme",
author = "Stephan Escher, Markus Sontowski, Stefan Köpsell",
year = "2021",
booktitle = "Proceedings VTC2021-Spring"
}

Saumya Dwivedi, Marco Zoli, André Barreto, Padmanava Sen, Gerhard Fettweis, Secure Joint Communications and Sensing using Chirp Modulation, 6G Wireless Summit (6G SUMMIT), 2020 , Download PDF

@conference{
Dwivedi_2020_6gsummit,
title = "Secure Joint Communications and Sensing using Chirp Modulation",
author = "Saumya Dwivedi, Marco Zoli, André Barreto, Padmanava Sen, Gerhard Fettweis",
year = "2020",
booktitle = "6G Wireless Summit (6G SUMMIT)",
address = "Levi, Finland",
month = "March",
url = "https://doi.org/10.1109/6GSUMMIT49458.2020.9083884",
doi = "10.1109/6GSUMMIT49458.2020.9083884"
}

Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS), 2020

@inproceedings{
LaGH_2020,
title = "Enabling and Optimizing MACsec for Industrial Environments",
author = "Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig",
year = "2020",
booktitle = "Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS)",
publisher = "IEEE",
pages = "1--4",
doi = "10.1109/WFCS47810.2020.9114434",
url = "https://doi.org/10.1109/WFCS47810.2020.9114434"
}

Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis, Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation, EURASIP Journal on Wireless Communications and Networking, 2020 , Download PDF

@article{
Zoli_2020_JWCN,
title = "Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation",
author = "Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis",
year = "2020",
journal = "EURASIP Journal on Wireless Communications and Networking",
month = "June",
number = "114",
pages = "24",
url = "https://doi.org/10.1186/s13638-020-01712-6",
doi = "10.1186/s13638-020-01712-6"
}
Zum Seitenanfang