Publications

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

2005 - Jörg Schwenk, Ulrich Greveler, Andre Adelsbach,

accepted for 9. Deutscher IT-Sicherheitskongress des BSI, Mai 2005.

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

Heating mechanisms in low temperature plasmas

2005 - Thomas Mussenbrock

Workshop on Low Temperature Plasmas, Yokohama, Japan 2005

Identitätsmissbrauch im Onlinebanking

2005 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

Datenschutz und Datensicherheit, Ausgabe 11, 2005.

IEE Proceedings on Computer & Digital Techniques

2005 - M. McLoone, Chris­tof Paar, R. Woods (Eds.)

Special Issue on Cryptographic Algorithms and Architectures for System-on-Chip, 2005.

Multilaterally Secure Computing Platforms – in your office, car and at home

2005 - Ahmad-Reza Sadeghi, Christian Stüble,

1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, International Exchange Centre, Tokyo, Japan, September 2005.

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

2005 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft

DuD Heft 9-05, Trusted Computing News.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe

Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Nonlinear heating in capacitive rf discharges

2005 - Thomas Mussenbrock

Workshop on Physics and Application of Low and High Temperature Plasmas, Fukuoka, Japan (2005)

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

9. Deutscher IT-Sicherheitskongress des BSI, 2005.

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation [Springer Link]

Proving a WS-Federation Passive Requestor Profile with a Browser Model

2005 - Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann

Accepted for Workshop on Secure Web Services (SWS) 2005. [ACM Link]

Secure Data Management in Trusted Computing

2005 - Ahmad-Reza Sadeghi, Christian Stüble, Ulrich Kühn, Klaus Kursawe, Stefan Lucks

Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 3659, Pages 324-338, Springer Verlag, 2005. [Springer Link]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005. [Springer Link]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267. [pdf]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]

Simplified Hardness Proofs in the Generic Group Model

2005 - Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter

osition paper accepted for Western European Workshop on Research in Cryptology (WEWoRC 2005).

Sokrates - A Compiler Framework for Zero-Knowledge Protocols

2005 - Ahmad-Reza Sadeghi, Markus Rohe, Jan Camenisch

Position paper accepted for Western European Workshop on Research in Cryptology (WEWoRC 2005).

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Accepted for ACM DRM 2005.

Towards Multilateral Security On DRM Platforms

2005 - Ahmad-Reza Sadeghi, Christian Stüble,

The First Information Security Practice and Experience Conference (ISPEC 2005). [Springer Link]

Towards multilaterally secure computing platforms - with open source and trusted computing

2005 - Ahmad-Reza Sadeghi, Christian Stüble,

Information Security Technical Report, Elesevier, Volume 10, Issue 2, 2005, Pages 83-95.

Towards Secure Computing Platforms with Open-Source and Trusted Computing

2005 - Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, Marcel Selhorst

9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), Mai 2005.

Trustworthy Visualisation and Verification of Multiple XML-Signatures

2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]
Page: