Login / Signup
Paul Duplys
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 10
Top Topics
Key Agreement
Fuzzy Logic
Desirable Characteristics
Intrusion Detection
Top Venues
HOST
GLOBECOM Workshops
IACR Cryptol. ePrint Arch.
TrustED@CCS
</>
Publications
</>
Niclas Ilg
,
Paul Duplys
,
Dominik Sisejkovic
,
Michael Menth
A survey of contemporary open-source honeypots, frameworks, and tools.
J. Netw. Comput. Appl.
220 (2023)
Tobias Gehrmann
,
Paul Duplys
Intrusion Detection for SOME/IP: Challenges and Opportunities.
DSD
(2020)
Christopher Huth
,
Daniela Becker
,
Jorge Guajardo
,
Paul Duplys
,
Tim Güneysu
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access
5 (2017)
Christopher Huth
,
Daniela Becker
,
Jorge Guajardo
,
Paul Duplys
,
Tim Güneysu
LWE-based lossless computational fuzzy extractor for the Internet of Things.
HOST
(2017)
Christopher Huth
,
Aydin Aysu
,
Jorge Guajardo
,
Paul Duplys
,
Tim Güneysu
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
ICISC
(2016)
Christopher Huth
,
René Guillaume
,
Paul Duplys
,
Kumaragurubaran Velmurugan
,
Tim Güneysu
On the Energy Cost of Channel Based Key Agreement.
TrustED@CCS
(2016)
Christopher Huth
,
Paul Duplys
,
Tim Güneysu
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
PerCom Workshops
(2016)
Christopher Huth
,
René Guillaume
,
Thomas Strohm
,
Paul Duplys
,
Irin Ann Samuel
,
Tim Güneysu
Information reconciliation schemes in physical-layer security: A survey.
Comput. Networks
109 (2016)
Christopher Huth
,
Daniela Becker
,
Jorge Guajardo
,
Paul Duplys
,
Tim Güneysu
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch.
2016 (2016)
Christopher Huth
,
Jan Zibuschka
,
Paul Duplys
,
Tim Güneysu
Securing systems on the Internet of Things via physical properties of devices and communications.
SysCon
(2015)
Smriti Gopinath
,
René Guillaume
,
Paul Duplys
,
Andreas Czylwik
Reciprocity enhancement and decorrelation schemes for PHY-based key generation.
GLOBECOM Workshops
(2014)
Eberhard Böhl
,
Paul Duplys
Fault attack resistant deterministic random bit generator usable for key randomization.
IOLTS
(2011)
Paul Duplys
,
Eberhard Böhl
,
Wolfgang Rosenstiel
Key randomization using a power analysis resistant deterministic random bit generator.
IOLTS
(2010)
Paul Duplys
,
Eberhard Böhl
Linear and nonlinear MISR operations for safety and security in automotive applications.
IOLTS
(2009)
Eberhard Böhl
,
Paul Duplys
Nonlinear compression functions using the MISR approach for security purposes in automotive applications.
IOLTS
(2009)
Paul Duplys
,
Roland J. Weiss
,
Jürgen Ruf
,
Thomas Kropf
,
Wolfgang Rosenstiel
Monitoring-based Formal Hardware Verification.
MBMV
(2006)