Search - IFIP Open Digital Library Access content directly

Filter your results

24 results
Structure: Internal structure identifier : 466808
Image document

Runtime Firmware Product Lines Using TPM2.0

Andreas Fuchs , Christoph Krauss , Jürgen Repp
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.248-261, ⟨10.1007/978-3-319-58469-0_17⟩
Conference papers hal-01649005v1
Image document

On the Creation of Reliable Digital Evidence

Thomas Kemmerich , Nicolai Kuntze , Carsten Rudolph , Aaron Alva , Barbara Endicott-Popovsky , et al.
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.3-17, ⟨10.1007/978-3-642-33962-2_1⟩
Conference papers hal-01523718v1
Image document

A Formal Notion of Trust - Enabling Reasoning about Security Properties

Andreas Fuchs , Sigrid Gürgens , Carsten Rudolph
4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.200-215, ⟨10.1007/978-3-642-13446-3_14⟩
Conference papers hal-01061328v1
Image document

Privacy in Distributed Commercial Applications

Nicolai Kuntze , Carsten Rudolph
9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.214-224, ⟨10.1007/978-3-642-15479-9_21⟩
Conference papers hal-01058263v1
Image document

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion

Huajian Liu , Yiyao Li , Martin Steinebach
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers hal-01492836v1
Image document

A Novel Approach for Generating Synthetic Datasets for Digital Forensics

Thomas Göbel , Thomas Schäfer , Julien Hachenberger , Jan Türr , Harald Baier
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers hal-03657236v1
Image document

Using Approximate Matching to Reduce the Volume of Digital Data

Frank Breitinger , Christian Winter , York Yannikos , Tobias Fink , Michael Seefried
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers hal-01393769v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems

Julian Schutte , Nicolai Kuntze , Andreas Fuchs , Atta Badii
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-102, ⟨10.1007/978-3-642-15257-3_9⟩
Conference papers hal-01054578v1
Image document

Automating Video File Carving and Content Identification

York Yannikos , Nadeem Ashraf , Martin Steinebach , Christian Winter
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers hal-01460607v1
Image document

Decision Support for Mobile App Selection via Automated Privacy Assessment

Jens Wettlaufer , Hervais Simo
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.292-307, ⟨10.1007/978-3-030-42504-3_19⟩
Conference papers hal-03378976v1
Image document

Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy

Michael Kreutzer , Hervais Simo , Peter Franke
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.58-77, ⟨10.1007/978-3-030-72465-8_4⟩
Conference papers hal-03703761v1
Image document

Comparison of cyber attacks on services in the clearnet and darknet

York Yannikos , Quang Anh Dang , Martin Steinebach
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers hal-03764381v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Hash-Based File Content Identification Using Distributed Systems

York Yannikos , Jonathan Schluessler , Martin Steinebach , Christian Winter , Kalman Graffi
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.119-134, ⟨10.1007/978-3-642-41148-9_8⟩
Conference papers hal-01460625v1
Image document

Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks

Kai-Oliver Detken , Hervais Simo Fhom , Richard Sethmann , Günther Diederich
Third IFIP TC6 International Conference on Wireless Communications and Information Technology in Developing Countries (WCITD) / IFIP TC 6 International Network of the Future Conference (NF) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.158-169, ⟨10.1007/978-3-642-15476-8_16⟩
Conference papers hal-01054748v1
Image document

Secure Attestation of Virtualized Environments

Michael Eckel , Andreas Fuchs , Jürgen Repp , Markus Springer
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.203-216, ⟨10.1007/978-3-030-58201-2_14⟩
Conference papers hal-03440811v1
Image document

Data Corpora for Digital Forensics Education and Research

York Yannikos , Lukas Graner , Martin Steinebach , Christian Winter
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.309-325, ⟨10.1007/978-3-662-44952-3_21⟩
Conference papers hal-01393787v1
Image document

Preserving Confidentiality in Component Compositions

Andreas Fuchs , Sigrid Gürgens
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.33-48, ⟨10.1007/978-3-642-39614-4_3⟩
Conference papers hal-01492775v1
Image document

Detecting Fraud Using Modified Benford Analysis

Christian Winter , Markus Schneider , York Yannikos
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.129-141, ⟨10.1007/978-3-642-24212-0_10⟩
Conference papers hal-01569557v1
Image document

Trust in Peer-to-Peer Content Distribution Protocols

Nicolai Kuntze , Carsten Rudolph , Andreas Fuchs
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers hal-01056065v1
Image document

Advanced Remote Firmware Upgrades Using TPM 2.0

Andreas Fuchs , Christoph Krauss , Jürgen Repp
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.276-289, ⟨10.1007/978-3-319-33630-5_19⟩
Conference papers hal-01369561v1
Image document

On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios

Nicolai Kuntze , Carsten Rudolph
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.630-644, ⟨10.1007/978-3-319-18467-8_42⟩
Conference papers hal-01345154v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1