
Sebastian N. Peters- M.Sc., M.Sc.
- Fraunhofer Institute for Applied and Integrated Security AISEC
Sebastian N. Peters
- M.Sc., M.Sc.
- Fraunhofer Institute for Applied and Integrated Security AISEC
About
8
Publications
515
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Current institution
Fraunhofer Institute for Applied and Integrated Security AISEC
Publications
Publications (8)
X.509 certificates play a crucial role in establishing secure com-munication over the internet by enabling authentication and dataintegrity. Equipped with a rich feature set, the X.509 standard isdefined by multiple, comprehensive ISO/IEC documents. Due to itsinternet-wide usage, there are different implementations in mul-tiple programming language...
X.509 certificates play a crucial role in establishing secure communication over the internet by enabling authentication and data integrity. Equipped with a rich feature set, the X.509 standard is defined by multiple, comprehensive ISO/IEC documents. Due to its internet-wide usage, there are different implementations in multiple programming languag...
Public key infrastructures (PKIs) are a cornerstone for the security of modern information systems. They also offer a wide range of security mechanisms to industrial automation and control systems (IACS) and can represent an important building block for concepts like zero trust architectures and defense in depth. Hence, the ISA/IEC 62443 series of...
Built on top of UDP, the relatively new QUIC protocol serves as the baseline for modern web protocol stacks. Equipped with a rich feature set, the protocol is defined by a 151 pages strong IETF standard complemented by several additional documents. Enabling fast updates and feature iteration, most QUIC implementations are implemented as user space...
While the digitization of power distribution grids brings many benefits, it also introduces new vulnerabilities for cyber-attacks. To maintain secure operations in the emerging threat landscape, detecting and implementing countermeasures against cyber-attacks are paramount. However, due to the lack of publicly available attack data against Smart Gr...