Ver­öf­fent­li­chun­gen

Pro­per­ty-Ba­sed Ta­ming of Lying Mo­bi­le Nodes.

2006 - Ah­mad-Re­za Sa­de­ghi, Mark Ma­nu­lis,

in Pro­cee­dings of 20th IEEE In­ter­na­tio­nal Con­fe­rence on Ad­van­ced In­for­ma­ti­on Net­wor­king and Ap­p­li­ca­ti­ons (AINA 2006), IEEE In­ter­na­tio­nal Work­shop on Trusted and Au­to­no­mic Com­pu­ting Sys­tems (TACS 2006), 18-20 April, Vi­en­na, Aus­tria. [IEEE CS Link] [PDF] [Bib­tex]

Re­ver­sed Re­s­pon­si­bi­li­ties: Brow­ser Au­then­ti­ca­ti­on in­s­tead of Ser­ver Au­then­ti­ca­ti­on.

2006 - Jörg Schwenk, Se­bas­ti­an Gajek,

Work­shop on Trans­pa­ren­cy and Usa­bi­li­ty of Web Au­then­ti­ca­ti­on, New York (USA), 2006.

SSL-VA-Au­then­ti­fi­zie­rung als Schutz vor Phis­hing und Phar­ming.

2006 - Jörg Schwenk, Se­bas­ti­an Gajek, Chris­toph We­ge­ner,

ac­cep­ted for Si­cher­heit - Schutz und Zu­ver­läs­sig­keit, Fe­bru­ary 20, 2006, Mag­d­e­burg, Ger­ma­ny. [PDF]

Tree-ba­sed Group Key Agree­ment Frame­work for Mo­bi­le Ad-Hoc Net­works.

2006 - Lijun Liao, Mark Ma­nu­lis,

in Pro­cee­dings of 20th IEEE In­ter­na­tio­nal Con­fe­rence on Ad­van­ced In­for­ma­ti­on Net­wor­king and Ap­p­li­ca­ti­ons (AINA 2006), 2nd In­ter­na­tio­nal Work­shop on Se­cu­ri­ty in Net­works and Di­stri­bu­ted Sys­tems (SNDS 2006), 18-20 April, Vi­en­na, Aus­tria. [IEEE CS Link] [PDF] [Bib­tex]

Se­cu­ri­ty En­gi­nee­ring for Ze­ro-know­ledge Wa­ter­mark De­tec­tion

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

Spe­cial Ses­si­on on Media Se­cu­ri­ty, WI­A­MIS 2005, 13-15 April 2005, Mon­treux, Swit­z­er­land.

A Broad­cast En­cryp­ti­on Sche­me with Free-Ri­ders but Un­con­di­tio­nal Se­cu­ri­ty

2005 - Ul­rich Gre­ve­ler, Andre Adels­bach,

First In­ter­na­tio­nal Con­fe­rence on Di­gi­tal Rights Ma­nage­ment, Syd­ney 2005 to ap­pe­ar: Sprin­ger LNCS. [PDF]

An­ony­mous Data Broad­cas­ting by Mi­suse of Sa­tel­li­te ISPs

2005 - Ul­rich Gre­ve­ler, Andre Adels­bach, Sven Lö­sch­ner

Pro­cee­dings of 22C3 Chaos Com­pu­ter Club (CCC) Con­gress, Ber­lin, 2005, to ap­pe­ar. [PDF]

Com­ple­men­ting Ze­ro-Know­ledge Wa­ter­mark De­tec­tion: Pro­ving Pro­per­ties of Em­bed­ded In­for­ma­ti­on Wi­thout Re­vea­ling it

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

to ap­pe­ar in ACM Mul­ti­me­dia Sys­tems Jour­nal.

Cont­ri­bu­to­ry Group Key Agree­ment Pro­to­cols, Re­vi­si­ted for Mo­bi­le Ad-Hoc Groups

2005 - Mark Ma­nu­lis,

in Pro­cee­dings of the 2nd IEEE In­ter­na­tio­nal Con­fe­rence on Mo­bi­le Ad-hoc and Sen­sor Sys­tems (MASS 2005), In­ter­na­tio­nal Work­shop on Wire­less and Sen­sor Net­works Se­cu­ri­ty (WSNS 2005), 07-10 No­vem­ber 2005, Wa­shing­ton, USA. [IEEE CS Link] [Bib­tex] [PDF]
Seite: