Veröffentlichungen

Client Authentication in Federations Using a Security Mode

2006 - Ahmad-Reza Sadeghi, Sebastian Gajek,

Accepted to be presented at Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication. [pdf]

Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.

2006 - Mark Manulis,

in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), 21-24 March, Taipei, Taiwan. [ACM Link] [PDF ] [Bibtex]

DRM für Multimedia-Broadcasts - wie sieht das PayTV der Zukunft aus?.

2006 - Ulrich Greveler,

in Patrick Horster (Hrsg.), D.A.CH Security 2006, Düsseldorf, März 2006, to appear. [PDF]

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

To appear in LNCS Transactions on Data Hiding and Multimedia Security. [Springer Link]

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ACISP 2006 paper below. A preliminary version is available from the authors:

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Accepted for 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 3-5, 2006. Published in Springer's LNCS 4058. [Springlink]

Key Agreement for Heterogeneous Ad-Hoc Groups

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

to appear in International Journal of Wireless and Mobile Computing (IJWMC), Inderscience.

Key Agreement for Heterogenous Mobile Ad-hoc Groups

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

To appear in Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing) Journal. [ACM Link]

Linkable Democratic Group Signatures

2006 - Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis,

Accepted for 2nd Information Security Practice and Experience Conference (ISPEC 2006), 11.-14. April, Hangzhou, China. [pdf]

Patentierung kryptographischer Verfahren, die an Hochschulen entwickelt wurden.

2006 - Ulrich Greveler,

GI Fachtagung "Sicherheit 2006", Magdeburg, Feb. 2006, LNI Proceedings P-77, pp. 329-332. [PDF]

Property-based Taming Lying Mobile Nodes

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

Accepted for International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) at 20th IEEE International ­Conference on Advanced Information Networking and Applications (AINA 2006), 18.-20. April, Vienna, Austria. [IEEE CS Link]

Property-Based Taming of Lying Mobile Nodes.

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Reversed Responsibilities: Browser Authentication instead of Server Authentication.

2006 - Jörg Schwenk, Sebastian Gajek,

Workshop on Transparency and Usability of Web Authentication, New York (USA), 2006.

SSL-VA-Authentifizierung als Schutz vor Phishing und Pharming.

2006 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

accepted for Sicherheit - Schutz und Zuverlässigkeit, February 20, 2006, Magdeburg, Germany. [PDF]

Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.

2006 - Lijun Liao, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Security Engineering for Zero-knowledge Watermark Detection

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Special Session on Media Security, WIAMIS 2005, 13-15 April 2005, Montreux, Switzerland.

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

2005 - Ulrich Greveler, Andre Adelsbach,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Anonymous Data Broadcasting by Misuse of Satellite ISPs

2005 - Ulrich Greveler, Andre Adelsbach, Sven Löschner

Proceedings of 22C3 Chaos Computer Club (CCC) Congress, Berlin, 2005, to appear. [PDF]

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

to appear in ACM Multimedia Systems Journal.

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia Systems Journal. [Springer Link]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), 07-10 November 2005, Washington, USA. [IEEE CS Link] [Bibtex] [PDF]

Datenschutzverletzungen bei Internetzugängen via Satellit

2005 - Ulrich Greveler, Andre Adelsbach,

Datenschutznachrichten, 01/2005, pp. 4-7. [PDF]

Effective Protection Against Phishing and Web Spoofing

2005 - Sebastian Gajek, Rolf Oppliger

9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677. pp 32-42. Copyrights Springer-Verlag, Heidelberg Berlin. [Springer] [Bibtex] [PDF]

Embedding Trust into Cars—Secure Software Delivery and Installation

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, November 29-30, 2005. Conference presentation [pdf]

Enforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing

2005 - Ulrich Greveler,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

2005 - Jörg Schwenk, Ulrich Greveler, Andre Adelsbach,

accepted for 9. Deutscher IT-Sicherheitskongress des BSI, Mai 2005.

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

How Pay-TV becomes E-Commerce

2005 - Ulrich Greveler,

7th International IEEE Conference on E-Commerce Technology, Munich 2005, IEEE Press P2277, ISBN 0-7695-2277-7. [PDF]

Identitätsmissbrauch im Onlinebanking

2005 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

Datenschutz und Datensicherheit, Ausgabe 11, 2005.

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Volume 2, International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290-294. IEEE Computer Society, 2005. [IEEE CS Link] [PDF] [Bibtex]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe

Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

9. Deutscher IT-Sicherheitskongress des BSI, 2005.

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation [Springer Link]

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

accepted for GI Fachtagung "Sicherheit 2005", 5-8 April 2005, Regensburg.

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

GI Fachtagung "Sicherheit 2005", Regensburg, April 2005, LNI Proceedings P-62, pp. 257-268. [PDF]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005. [Springer Link]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267. [pdf]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Accepted for ACM DRM 2005.

Trustworthy Visualisation and Verification of Multiple XML-Signatures

2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adelsbach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Moderne Verfahren der Kryptographie

2004 - Jörg Schwenk, Klaus-Dieter Wolfenstetter, Albrecht, Beutelsbacher

[Amazon]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.
Seite: