Ver­öf­fent­li­chun­gen

Da­ten­schutz­ver­let­zun­gen bei In­ter­net­zu­gän­gen via Sa­tel­lit

2005 - Ul­rich Gre­ve­ler, Andre Adels­bach,

Da­ten­schutz­nach­rich­ten, 01/2005, pp. 4-7. [PDF]

Ef­fec­tive Pro­tec­tion Against Phis­hing and Web Spoo­fing

2005 - Se­bas­ti­an Gajek, Rolf Opp­li­ger

9th IFIP TC-6 TC-11 Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty (CM­S2005), LNCS 3677. pp 32-42. Co­py­rights Sprin­ger-Ver­lag, Hei­del­berg Ber­lin. [Sprin­ger] [Bib­tex] [PDF]

Em­bed­ding Trust into Cars—Se­cu­re Soft­ware De­li­very and In­stal­la­ti­on

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Chris­ti­an Stüb­le, Ul­rich Huber,

Third Work­shop on Em­bed­ded Se­cu­ri­ty in Cars (escar 2005), Co­lo­gne, Ger­ma­ny, No­vem­ber 29-30, 2005. Con­fe­rence pre­sen­ta­ti­on [pdf]

En­for­cing Re­gio­nal DRM for Mul­ti­me­dia Broad­casts with and wi­thout Trusted Com­pu­ting

2005 - Ul­rich Gre­ve­ler,

First In­ter­na­tio­nal Con­fe­rence on Di­gi­tal Rights Ma­nage­ment, Syd­ney 2005 to ap­pe­ar: Sprin­ger LNCS. [PDF]

Fair DRM - Er­mög­li­chen von Pri­vat­ko­pi­en und Schutz di­gi­ta­ler Waren

2005 - Jörg Schwenk, Ul­rich Gre­ve­ler, Andre Adels­bach,

ac­cep­ted for 9. Deut­scher IT-Si­cher­heits­kon­gress des BSI, Mai 2005.

First Sum­ma­ry Re­port on Asym­me­tric Wa­ter­mar­king

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, P. Bas, S. Kat­zen­beis­ser (Eds.), M. Barni, A. De Rosa

ECRYPT, Net­work of Ex­cel­lence in Cryp­to­lo­gy, Pro­ject De­li­ver­a­ble (D.​WVL.3), 2005. [pdf]

How Pay-TV be­co­mes E-Com­mer­ce

2005 - Ul­rich Gre­ve­ler,

7th In­ter­na­tio­nal IEEE Con­fe­rence on E-Com­mer­ce Tech­no­lo­gy, Mu­nich 2005, IEEE Press P2277, ISBN 0-7695-2277-7. [PDF]

Iden­ti­täts­miss­brauch im On­line­ban­king

2005 - Jörg Schwenk, Se­bas­ti­an Gajek, Chris­toph We­ge­ner,

Da­ten­schutz und Da­ten­si­cher­heit, Aus­ga­be 11, 2005.

Key Agree­ment for He­te­ro­ge­neous Mo­bi­le Ad-Hoc Groups

2005 - Mark Ma­nu­lis,

in Pro­cee­dings of 11th In­ter­na­tio­nal Con­fe­rence on Par­al­lel and Di­stri­bu­ted Sys­tems (ICPADS 2005), Vo­lu­me 2, In­ter­na­tio­nal Work­shop on Se­cu­ri­ty in Net­works and Di­stri­bu­ted Sys­tems (SNDS 2005), pp. 290-294. IEEE Com­pu­ter So­cie­ty, 2005. [IEEE CS Link] [PDF] [Bib­tex]

Non-In­ter­ac­tive Wa­ter­mark De­tec­tion for a Cor­re­la­ti­on-Ba­sed Wa­ter­mar­king Sche­me

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

ac­cep­ted for 9th IFIP TC-6 TC-11 Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty, 19-21 Sep­tem­ber 2005, Salz­burg, Aus­tria; to ap­pe­ar in LNCS.
Seite: