Subverting Linux’ Integrity Measurement Architecture F Bohling, T Mueller, M Eckel, J Lindemann Proceedings of the 15th International Conference on Availability …, 2020 | 11 | 2020 |
Secure attestation of virtualized environments M Eckel, A Fuchs, J Repp, M Springer ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020 | 8 | 2020 |
A resilient network node for the industrial Internet of Things L Jäger, D Lorych, M Eckel Proceedings of the 17th International Conference on Availability …, 2022 | 5 | 2022 |
Reference interaction models for remote attestation procedures H Birkholz, M Eckel, W Pan, E Voit draft-ietf-rats-referenceinteraction-models-05, 2021 | 5 | 2021 |
Ensuring the integrity and security of network equipment is critical in the fight against cyber attacks M Eckel, T Laffey Network Security 2020 (9), 18-19, 2020 | 4 | 2020 |
Implementing a security architecture for safety-critical railway infrastructure M Eckel, D Kuzhiyelil, C Krauß, M Zhdanova, S Katzenbeisser, J Cosic, ... 2021 International Symposium on Secure and Private Execution Environment …, 2021 | 3 | 2021 |
Userspace Software Integrity Measurement M Eckel, T Riemann Proceedings of the 16th International Conference on Availability …, 2021 | 2 | 2021 |
Remote Attestation with Constrained Disclosure M Eckel, DR George, B Grohmann, C Krauß Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Evaluating the applicability of hardware trust anchors for automotive applications C Plappert, D Lorych, M Eckel, L Jäger, A Fuchs, R Heddergott Computers & Security 135, 103514, 2023 | | 2023 |
A Generic IoT Quantum-Safe Watchdog Timer Protocol M Eckel, T Gutsche, H Lauer, A Rein Proceedings of the 18th International Conference on Availability …, 2023 | | 2023 |
Virtualised network security is not a one-size-fits-all approach M Eckel, T Laffey Network Security 2022 (5), 2022 | | 2022 |
IT-Sicherheitsarchitektur für die nächste Generation der Leit-und Sicherheitstechnik C Krauß, M Zhdanova, M Eckel, S Katzenbeisser, M Heinrich, D Kuzhiyelil, ... Deine Bahn, 57-61, 2020 | | 2020 |
IT-Sicherheitsarchitektur für die nächste Generation der Leit-und Sicherheitstechnik M Heinrich, C Krauß, M Zhdanova, M Eckel, S Katzenbeisser, D Kuzhiyelil, ... | | 2020 |
Softwaredesign für Dynamische Integritätsmessungen bei Linux KO Detken, M Jahnke, T Rix, A Rein, M Eckel D.A.CH Security 2017, 2017 | | 2017 |
On the practical Application of a Trusted Information Agent M Eckel Mittelhessen University of Applied Sciences, 2014 | | 2014 |
EvidenceCam – Android based approach to provide non-repudiation for digital evidence N Kuntze, H Stephan, C Rudolph, M Ried, M Jäger IEEE International Workshop on Systematic Approaches to Digital Forensic …, 2011 | | 2011 |
Component Technologies on Google Android M Eckel Mittelhessen University of Applied Sciences, 2010 | | 2010 |
Entwicklung einer Datenbanklesekomponente für Datenberechnungsnetzwerke im Kontext des Flow-Based Programming Frameworks M Eckel Mittelhessen University of Applied Sciences, 2009 | | 2009 |
Originalaufsatze-Schichten und Oberflachen-Schlusse-Know-how fur das nachste Jahrtausend M Eckel, H Holeczek, M Metzner, W Leonhard, T Lux Werkstattstechnik-Forschung und Entwicklung fur die Produktion 89 (4), 174-180, 1999 | | 1999 |
Schichten und Oberflächen-Schlüssel-Know-how für das nächste Jahrtausend M Eckel, H Holeczek, M Metzner, W Leonhard, T Lux | | 1999 |