Veröffentlichungen

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation [Springer Link]

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

accepted for GI Fachtagung "Sicherheit 2005", 5-8 April 2005, Regensburg.

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

GI Fachtagung "Sicherheit 2005", Regensburg, April 2005, LNI Proceedings P-62, pp. 257-268. [PDF]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005. [Springer Link]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267. [pdf]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Accepted for ACM DRM 2005.

Trustworthy Visualisation and Verification of Multiple XML-Signatures

2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adelsbach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Moderne Verfahren der Kryptographie

2004 - Jörg Schwenk, Klaus-Dieter Wolfenstetter, Albrecht, Beutelsbacher

[Amazon]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

2004 - Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Security and Watermarking of Multimedia Contents V, SPIE Electronic Imaging 2003. [pdf]

Die digitale Signatur

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble

In J. Balfanz, J. Wendenburg (Hrsg.): Digitale Signaturen in der Praxis, AWV Verlag, 2003.

Watermark Detection with Zero-Knowledge Disclosure

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser

ACM Multimedia Systems Journal, Special Issue on Multimedia Security. [Springer Link]

Cryptographic Semantics For The Algebraic Models

2002 - Andre Adelsbach, Christian Stüble, S. Creese, B. Pfitzmann, P. Ryan, W. Simmonds, S. Steinbrechner, M. Steiner, M. Waidner

MAFTIA Deliverable D8, February 2002 [pdf]

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser

XI European Signal Processing Conference, Volume I, pp. 446-449. [pdf]

Final Report on Verification and Assessment

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble,

MAFTIA Deliverable D22, Project IST-1999-11583, January 2002.

Customer Identification for MPEG Video based on Digital Fingerprinting.

2001 - Jörg Schwenk, Enrico Hauer, Jana Dittman, Eva Saar, Claus Vielhauer

Proc. IEEE Pacific-Rim Conference on Multimedia (PCM-2001).

Optimized Self-Synchronizing Mode of Operation

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann

8th International Workshop on Fast Software Encryption, Yokohama, April 2001, LNCS, Springer-Verlag.

Tree based Key Agreement for Multicast.

2001 - Jörg Schwenk, T. Martin, R. Schaffelhofer

Proc. Communications and Multimedia Security 2001, Mai 2001, Darmstadt.

Zero-Knowledge Watermark Detection and Proof of Ownership

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Information Hiding: Fourth International Workshop, LNCS 2137, Springer-Verlag, Berlin, 2001, pp. 273-288. [Springer Link]

Anonymous fingerprinting with direct non-repudiation

2000 - Andre Adelsbach,

In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT‘2000, volume 1976 of Lecture Notes in Computer Science, pages 401-414, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.

Conditional Access for Business TV.

2000 - Jörg Schwenk,

Fernseh- und Kino-Technik 6/2000.

Proving ownership of digital content

2000 - Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann

In Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH ’99, volume 1768 of Lecture Notes in Computer Science, pages 126-141, Dresden, Germany, October 2000. Springer-Verlag, Berlin Germany.

Combining digital watermarks and collusion secure fingerprints for digital images.

1999 - Jörg Schwenk, A. Behr, Jana Dittman, J. Ueberberg, P Schmitt, M. Stabenau

Proc. Electronic Imaging'99, San Jose, USA.

How to securely broadcast a secret.

1999 - Jörg Schwenk,

In: B. Preneel (Ed.): Proceedings Communications an Multimedia Security '99, Kluwer Academic Publishers, 1999.

Public Key Encryption and Digital Signatures based on Permutation Polynomials.

1998 - Jörg Schwenk, Klaus Huber,

Electronics Letters, Vol 34 No. 8, 1998, 759-760.

Establishing a Key Hierarchy for Conditional Access without Encryption.

1996 - Jörg Schwenk,

Proc. IFIP Communications and Multimedia Security 1996, Chapman & Hall, London.

Public Key Encryption and Signature Schemes Based on Polynomials over Zn.

1996 - Jörg Schwenk, J. Eisfeld

Proc. EUROCRYPT 96, Ed. Ueli Maurer, Springer LNCS 1070 (1996), 60-71.

A Classification of Abelian Quasigroups

1995 - Jörg Schwenk,

Rendiconti di Matematica, Serie VII, Volume 15, Roma (1995), 161-172
Seite: