Ver­öf­fent­li­chun­gen

Sa­tel­li­te Com­mu­ni­ca­ti­on wi­thout Pri­va­cy - At­ta­cker's Pa­ra­di­se

2005 - Ul­rich Gre­ve­ler, Andre Adels­bach,

ac­cep­ted for GI Fach­ta­gung "Si­cher­heit 2005", 5-8 April 2005, Re­gens­burg.

Sa­tel­li­te Com­mu­ni­ca­ti­on wi­thout Pri­va­cy - At­ta­cker's Pa­ra­di­se

2005 - Ul­rich Gre­ve­ler, Andre Adels­bach,

GI Fach­ta­gung "Si­cher­heit 2005", Re­gens­burg, April 2005, LNI Pro­cee­dings P-62, pp. 257-268. [PDF]

Se­cu­re Soft­ware De­li­very and In­stal­la­ti­on in Em­bed­ded Sys­tems

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Ul­rich Huber,

ac­cep­ted for the First In­for­ma­ti­on Se­cu­ri­ty Prac­tice and Ex­pe­ri­ence Con­fe­rence (ISPEC 2005), 11-14 April 2005, Sin­ga­po­re.

Se­cu­re Soft­ware De­li­very and In­stal­la­ti­on in Em­bed­ded Sys­tems

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Ul­rich Huber,

In: K. Lemke, C. Paar and M. Wolf (eds.): Em­bed­ded Se­cu­ri­ty in Cars: Se­cu­ring Cur­rent and Fu­ture Au­to­mo­ti­ve IT Ap­p­li­ca­ti­ons, pp. 27-49, Sprin­ger-Ver­lag. 2005. [Sprin­ger Link]

Se­cu­re Soft­ware De­li­very and In­stal­la­ti­on in Em­bed­ded Sys­tems

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Ul­rich Huber,

Tech­ni­cal Re­port de­tai­ling the ISPEC 2005 con­fe­rence paper below.

Se­cu­re Soft­ware De­li­very and In­stal­la­ti­on in Em­bed­ded Sys­tems

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Ul­rich Huber,

Pre­sen­ted at the First In­for­ma­ti­on Se­cu­ri­ty Prac­tice and Ex­pe­ri­ence Con­fe­rence (ISPEC 2005).​Springer, LNCS 3439, pp. 255-267. [pdf]

Se­cu­re XMaiL or How to Get Rid of Le­ga­cy Code in Se­cu­re E-Mail Ap­p­li­ca­ti­ons

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolf­gang Kub­bilun

In CMS 2005: Pro­cee­dings of the 9th IFIP In­ter­na­tio­nal Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty, Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3677, pages 291-300, Sprin­ger, 2005. [Sprin­ger] [PDF] [Bib­tex]

Towards Mul­ti­la­te­ral Se­cu­re Di­gi­tal Rights Di­stri­bu­ti­on In­fra­struc­tu­res

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

ac­cep­ted for ACM DRM Work­shop'05, No­vem­ber 7, 2005, Alex­an­dria, Vir­gi­nia, USA.

Towards Mul­ti­la­te­ral Se­cu­re Di­gi­tal Rights Di­stri­bu­ti­on In­fra­struc­tu­res

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

Ac­cep­ted for ACM DRM 2005.

Trust­wor­thy Vi­sua­li­sa­ti­on and Ve­ri­fi­ca­ti­on of Mul­ti­ple XML-Si­gna­tu­res

2005 - Jörg Schwenk, Se­bas­ti­an Gajek, Wolf­gang Kub­bilun

In CMS 2005: Pro­cee­dings of the 9th IFIP In­ter­na­tio­nal Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty, Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3677, pages 311-320, Sprin­ger, 2005. [Sprin­ger]
Seite: