Skip to main content

DSI Publications

Conference Proceeding

On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs

IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2016
Alexander Wild, Georg T. Becker, Tim Güneysu (2016)
Subject(s)
Information technology and systems
Keyword(s)
Physical unclonable functions (PUFs), ring-oscillator, FPGA
Book Chapter

Zehn Jahre öffentliche IT. Ein als Rückblick getarnter Debattenbeitrag

In Zur Geschichte der kommunalen IT in Deutschland – 10 Jahre Bundes-Arbeitsgemeinschaft der Kommunalen IT-Dienstleister, edited by Helmut Merschmann, 105–114. Berlin: Vitako - Bundes-Arbeitsgemeinschaft der Kommunalen IT-Dienstleister.
Martin Schallbruch (2015)
Subject(s)
Technology, R&D management
Secondary Title
Zur Geschichte der kommunalen IT in Deutschland – 10 Jahre Bundes-Arbeitsgemeinschaft der Kommunalen IT-Dienstleister
Pages
105–114
ISBN
978-3-7392-0482-6
Report

Cyberreadiness in kleinen und mittleren Unternehmen [Cyber-readiness in small and medium sized companies]

Deutscher Industrie- und Handelskammertag (DIHK)
Sandro Gaycken, Rex Hughes (2015)
Subject(s)
Economics, politics and business environment; Ethics and social responsibility
Pages
79
Book Review

Krieg der Knöpfe [War of the buttons]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
cyber security, electronic warfare
Review of: @War – The Rise of the Military-Internet Complex by Shane Harris, Digitale Diktatur. Totalüberwachung, Datenmissbrauch, Cyberkrieg by Stefan Aust and Thomas Ammann.
Journal Pages
134–138
Report

National CSIRTs and their role in computer security incident response

New America Foundation and Global Public Policy Institute
Robert Morgus, Isabel Skierka, Mirko Hohmann, Tim Maurer (2015)
Subject(s)
Information technology and systems
Keyword(s)
Cyber security, incident response, critical infrastructures
Book Chapter

Digitale Souveränität

In Handwörterbuch Internationale Politik, 13th ed., edited by Wichard Woyke, Johannes Varwick, 45–49. Leverkusen: Verlag Barbara Budrich.
Isabel Skierka, Thorsten Benner (2015)
Subject(s)
Economics, politics and business environment
Keyword(s)
Digital sovereignty, industrial policy, digitalization, cyber security
Secondary Title
Handwörterbuch Internationale Politik
Edition
13th ed.,
Pages
45–49
ISBN
978-3825245184
Conference Proceeding

Biometrische Zugangskontrollen – Datenschutz, rechtliche Fragen, praktische Umsetzung [Biometrical access control - data protection, legal issues, and practical implementation]

Zeitschrift für Wett- und Glücksspielrecht 3: 5–8
Martin Schallbruch (2015)
Subject(s)
Technology, R&D management
Journal Pages
5–8
Conference Proceeding

The gap between promise and reality: On the insecurity of XOR Arbiter PUFs

Cryptographic Hardware and Embedded Systems - CHES 2015
Georg T. Becker (2015)
Subject(s)
Information technology and systems
Keyword(s)
Physical unclonable functions, machine learning, real-world attacks, XOR PUFs
Blog

Germany's cybersecurity law: Mostly harmless, but heavily contested

Council on Foreign Relations
Subject(s)
Economics, politics and business environment
Journal Article

Why Germany's cybersecurity law isn't working

Defense One
Subject(s)
Economics, politics and business environment