University of Passau
Department of Informatics and Mathematics
IT-SEC 
   University of Passau  >  FIM  >  IT-SEC  >  Members > Henrich C. Pöhls      SiteMapSitemap  Seitenende

Dipl.-Inform., M.Sc. Information Security Henrich C. Pöhls

Picture of Henrich C. Poehls
Contact Details

S/MIME (local) / PGP-Key / PGP-Key (local)
PGP-Fingerprint:
13a2 45ed 4fdc 2a66 f99e 1e29 e98e 021a 937a f4f2
or:
e51d cf96 455f bdae b2f2 5e12 e23d d538 1a9d 49ec

S/MIME-Fingerprint (SHA1):
D2:C8:A1:73:60:27:63:F0:D1:3A:7C:7A:E2:B1:16:4F:C9:67:18:DA

 
Tel: +49-851-509-3217
Fax: +49-851-509-3212

Room: 136 (ITZ)

Office Address 

University of Passau
Innstrasse 43
94032 Passau
Germany

Research Interest

Publications

  • A. Bilzhause, H. C. Pöhls and K. Samelin. Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 12th International Conference on Availability, Reliability and Security (ARES SECPID 2017), Conference Publishing Services (CPS), Sept., 2017.  This is a pre-print. pdf...  bibtex ...
  • H. C. Pöhls and B. Petschkuhn. Towards compactly encoded signed IoT messages. In IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2017), IEEE, Jun., 2017.  This is a pre-print. Original will be available on IEEE Explore. pdf...  bibtex ...
  • H. C. Pöhls and T. Länger. Einsetzbare Kryptografie für die Cloud. In Zeitschrift für Datenrecht und Informationssicherheit (digma), 17 (1): 78-81, Mar., 2017. bibtex ...
  • M. T. Beck, J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig. Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. In Proc. of 22nd Australasian Conference on Information Security and Privacy (ACISP 2017), pages 437-452, Springer, Jul., 2017.  This is the full version from ePrint. doi...  pdf...  bibtex ...
  • J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig. Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. In Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), pages 152-182, IACR, Mar., 2017.  Full version from ePrint. doi...  pdf...  bibtex ...
  • G. Moldovan, E. Z. Tragos, A. Fragkiadakis, H. C. Pöhls and D. Calvo. An IoT middleware for enhanced security and privacy: the RERUM approach. In Proc. of 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE, Nov., 2016.  This is a pre-print. pdf...  bibtex ...
  • C. Frädrich, H. C. Pöhls, W. Popp, N. Rakotondravony and K. Samelin. Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud and IoT. In Proc. of Information and Communications Security (ICICS 2016), Springer, Nov., 2016.  This is the full version. The original publication is available at springerlink.com pdf...  bibtex ...
  • J. Bauer, R. C. Staudemeyer, H. C. Pöhls and A. Fragkiadakis. ECDSA on things: IoT integrity protection in practise. In Proc. of Information and Communications Security (ICICS 2016), Springer, Nov., 2016.  This is a pre-print. pdf...  bibtex ...
  • T. Länger, H. C. Pöhls and S. Ghernaouti. Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. In Privacy Technologies and Policy - 4th Annual Privacy Forum (APF 2016), Springer, Sept., 2016.  This is a pre-print. pdf...  bibtex ...
  • T. Lorünser, D. Slamanig, T. Länger and H. C. Pöhls. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016), Conference Publishing Services (CPS), August, 2016.  This is a pre-print. pdf...  bibtex ...
  • A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin. Cryptographically Enforced Four-Eyes Principle. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016), Conference Publishing Services (CPS), August, 2016.  This is a pre-print. pdf...  bibtex ...
  • M. Mössinger, B. Petschkuhn, J. Bauer, R. C. Staudemeyer, M. Wójcik and H. C. Pöhls. Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. In Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016), IEEE, July, 2016. doi...  pdf...  bibtex ...
  • A. Kung, F. Kargl, S. Suppan, J. Cuellar, H. C. Pöhls, A. Kapovits, N. Notario and Y. S. Martin. A Privacy Engineering Framework for the Internet of Things. In Proc. of 9th edition of the international conference Computers, Privacy and Data Protection 2016 (CDPD 2016), January, 2016. bibtex ...
  • D. Derler, C. Hanser, H. C. Pöhls and D. Slamanig. Towards Authenticity and Privacy Preserving Accountable Workflows. In Privacy and Identity Management. Time for a Revolution? - Proc. of 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pages 170-186, Springer, Jun, 2016. doi...  pdf...  bibtex ...
  • F.W.J. v. Geelkerken, H. C. Pöhls and S. Fischer-Hübner. The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014. In Proc. of 3rd International Academic Conference of Young Scientists on Law & Psychology 2015 (LPS 2015), pages 404-410, L'viv Polytechnic Publishing House, Nov., 2015. paper...  bibtex ...
  • D. Derler, H. C. Pöhls, K. Samelin and D. Slamanig. A General Framework for Redactable Signatures and New Constructions. In Proc. of 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), pages 3-19, Springer, Nov., 2015. doi...  pdf...  bibtex ...
  • T. Lorünser, C. B. Rodriguez, D. Demirel, S. Fischer-Hübner, T. Gross, T. Länger, M. d. Noes, H. C. Pöhls, B. Rozenberg and D. Slamanig. Towards a New Paradigm for Privacy and Security in Cloud Services. In New LEIT projects on Security-by-Design - 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Brussels, Belgium, April 28 - 29, Springer, Apr., 2015. doi...  pdf...  bibtex ...
  • H. C. Pöhls. JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. In Proc. of the Workshop on Extending Seamlessly to the Internet of Things (esIoT), collocated at the IMIS-2012 International Conference (IMIS 2015), pages 306 - 312, IEEE, Jul., 2015.  The original publication is available at ieeexplore.ieee.org. doi...  pdf...  bibtex ...
  • H. C. Pöhls and K. Samelin. Accountable Redactable Signatures. In Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), IEEE, Aug., 2015.  The original publication is going to be available soon at ieeexplore.ieee.org. pdf...  bibtex ...
  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions. doi...  pdf...  bibtex ...
  • H. C. Pöhls, B. Petschkuhn, J. Rückert and M. Mössinger. Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy and Performance. In IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2014), IEEE, 2014. doi...  pdf...  bibtex ...
  • H. C. Pöhls and K. Samelin. On Updatable Redactable Signatures. In Proc. of the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014), Springer, 2014.  This is the full version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
  • E. Z. Tragos, V. Angelakis, A. Fragkiadakis, D. Gundlegard, S. Nechifor, G. Oikonomou, H. C. Pöhls and A. Gavras. Enabling Reliable and Secure IoT-based Smart City Applications. In Proc. of 1st International IEEE Workshop on Pervasive Systems for Smart Cities, IEEE, 2014. doi...  bibtex ...
  • H. C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E. Z. Tragos, R. D. Rodriguez and T. Mouroutis. RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects. In Proc. of the IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies, IEEE, 2014. doi...  bibtex ...
  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. On the Relation between Redactable and Sanitizable Signature Schemes. In Proc. of the 6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014), pages 113-130, Springer International Publishing, 2014.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
  • H. C. Pöhls and M. Karwe. Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid. In Proc. of the 2nd Workshop on Smart Grid Security (SmartGridSec 2014), Springer International Publishing, 2014.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
  • C. Brzuska, H. C. Pöhls and K. Samelin. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures. In Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013), pages 12-30, Springer Berlin Heidelberg, 2013.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. Scope of Security Properties of Sanitizable Signatures Revisited. In Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013), pages 188-197, IEEE, Sept, 2013.  This is an preliminary version of the original publication. The original publication is available at ieeexplore.ieee.org. doi...  pdf...  bibtex ...
  • H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. de Meer. Malleable Signatures for Resource Constrained Platforms. In Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, pages 18-33, Springer-Verlag, 2013.  This is an preliminary version of the original publication. doi...  pdf...  bibtex ...
  • H. C. Pöhls. Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity. In Trust Management VII, pages 136-150, Springer Berlin Heidelberg, 2013.  This is the preliminary version of the original publication. doi...  pdf...  bibtex ...
  • C. Brzuska, H. C. Pöhls and K. Samelin. Non-Interactive Public Accountability for Sanitizable Signatures. In Proc. of the 9th European PKI Workshop: Research and Applications (EuroPKI 2012), pages 178, Springer-Verlag, 2012.  This is an extended and revised version of the original publication. pdf...  bibtex ...
  • I. Askoxylakis, H. C. Pöhls and J. Posegga, Ed. Proc. of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP 2012). doi...  bibtex ...
  • F. Höhne, H. C. Pöhls and K. Samelin. Rechtsfolgen editierbarer Signaturen. In Datenschutz und Datenrecht (DuD), Volume 36 (6): 485-491, Juni, 2012. pdf...  bibtex ...
  • H. C. Pöhls, K. Samelin, J. Posegga and H. de Meer. Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction. In Proc. of the International Conference on Security and Cryptography (SECRYPT 2012), pages 113-125, SciTePress, 2012. pdf...  bibtex ...
  • H. C. Pöhls and F. Höhne. Sticky Signatures: Legal Advantages of Redactable Signatures and Credentials in the Food Supply Chain. In Proc. of the 5th Interdisciplinary Conference on Current Issues in IT Security 2012, Dunker & Humblot, Berlin, 2012. bibtex ...
  • K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. de Meer. On Structural Signatures for Tree Structured Data. In Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Springer, 2012.  This is an extended and revised version of the original publication. The original publication is available at www.springerlink.com doi...  pdf...  bibtex ...
  • K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. de Meer. Redactable Signatures for Independent Removal of Structure and Content. In Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, April, 2012. pdf...  bibtex ...
  • H. C. Pöhls and F. Höhne. The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. In Proc. of 7th International Workshop on Security and Trust Management (STM 2011), pages 175-192, Springer, June, 2012. pdf...  bibtex ...
  • H. C. Pöhls, A. Bilzhause, K. Samelin and J. Posegga. Sanitizable Signed Privacy Preferences for Social Networks. In Proc. of GI Workshop on Privacy and Identity Management for Communities - Communities for Privacy and Identity Management (DICCDI 2011), GI, October, 2011. pdf...  bibtex ...
  • H. C. Pöhls, K. Samelin and J. Posegga. Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. In Proc. of 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), Springer, June, 2011. pdf...  bibtex ...
  • H. C. Pöhls. Why Showing one TLS Certificate is not enough? Towards a Browser Feedback for Multiple TLS Certificate Verifications. In Proc. of GI Sicherheit 2010 - Gesellschaft für Informatik, GI, October, 2010. pdf...  bibtex ...
  • F. Höhne and H. C. Pöhls. Staatliche Schutzpflichten für die IT-Infrastruktur. In Proc. of D-A-CH Security 2010, September, 2010. bibtex ...
  • F. Höhne and H. C. Pöhls. Grund und Grenzen staatlicher Schutzpflichten für die IT-Infrastruktur. In Tagungsband der 11. Herbstakademie der Deutschen Stiftung für Recht und Informatik (DSRI): Digitale Evolution - Herausforderungen für das Informations- und Medienrecht, OlWIR Oldenburger Verlag für Wirtschaft, Informatik und Recht, September, 2010. bibtex ...
  • R. Herkenhöner, M. Jensen, H. C. Pöhls and H. de Meer. Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions. In IEEE 2010 International Workshop on WebService and Business Process Security (WSBPS 2010), IEEE, Juli, 2010. doi...  pdf...  bibtex ...
  • B. Braun and H. C. Pöhls. Authenticity: The missing link in the social semantic web. In INFORMATIK 2008 Beherrschbare Systeme - dank Informatik, Digitale Soziale Netze 2008, Lecture Notes in Informatics (LNI), Springer, 2008. doi...  pdf...  bibtex ...
  • H. C. Pöhls. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In Proc. of Information and Communications Security (ICICS) 2008, pages 279-293, Springer, 2008. doi...  pdf...  bibtex ...
  • H. C. Pöhls. ConCert: Content Revocation using Certificates. In GI Sicherheit 2008 - Gesellschaft für Informatik, pages 149-162, GI, April, 2008. pdf...  bibtex ...
  • H. C. Pöhls and L. Westphal. Die "Untiefen" der neuen XML-basierten Dokumentenformate. In 15. DFN CERT Workshop Sicherheit in vernetzten Systemen, February, 2008. pdf...  bibtex ...
  • H. C. Pöhls and J. Posegga. Smartcard Firewalls Revisited. In Proc. 7th Intern. Conf. on Smart Card Research and Applications, pages 179-191, Springer Verlag, Apri 19-21, 2006. pdf...  bibtex ...

Chapters and Books

  • V. Angelakis, E. Tragos, H. C. Pöhls, A. Kapovits and A. Bassi, Ed. Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions. Springer International Publishing, 2017. doi...  pdf...  bibtex ...
  • A. Fragkiadakis, G. Oikonomou, H. C. Pöhls, E. Z. Tragos and M. Wójcik. Securing Communications Among Severely Constrained, Wireless Embedded Devices. In Engineering Secure Internet of Things Systems, The Institute of Engineering and Technology, Oct., 2016. paper...  bibtex ...
  • R. C. Staudemeyer, H. C. Pöhls and B. W. Watson. Security & Privacy for the Internet-of-Things communication in the SmartCity. In Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions, pages 28, Springer, 2016. bibtex ...
  • E. Z. Tragos, A. Fragkiadakis, V. Angelakis and H. C. Pöhls. Designing Secure IoT Architectures for Smart City Applications. In Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions, Springer, 2016. bibtex ...
  • G. Baldini, T. Peirce, M. Botterman, M. C. Talacchini, A. Pereira, M. Handte, D. Rotondi, H. C. Pöhls, O. Vermesan, A. Baddii, B. Copigneaux, Schreckling, D., L. Vigano, G. Steri, S. Piccione, P. Vlacheas, V. Stavroulaki, D. Kelaidonis, R. Neisse, E. Tragos, P. Smadja, C. Hennebert, M. Serrano, S. Severi, G. Abreu, P. T. Kirstein, S. Varakliotis and A. Skarmeta. Internet of Things -- Governance, Privacy and Security Issues. IERC, 2015. bibtex ...
  • E. Z. Tragos, H. C. Pöhls, R. C. Staudemeyer, D. Slamanig, A. Kapovits, S. Suppan, A. Fragkiadakis, G. Baldini, R. Neisse, P. Langendörfer, Z. Dyka and C. Wittke. Securing the Internet of Things - Security and Privacy in a Hyperconnected World. In Building the Hyperconnected Society - IoT Research and Innovation Value Chains, Ecosystems and Markets, pages 189-219, River Publishers, Jul., 2015. pdf...  bibtex ...
  • I. Askoxylakis, H. C. Pöhls and J. Posegga, Ed. Proc. of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP 2012). doi...  bibtex ...

Technical Reports

  • G. Oikonomou, R. C. Staudemeyer, A. Fragkiadakis, M. Wójcik, E. Tragos, G. Papadopoulos, H. C. Pöhls, D. Gundlegaard, V. Angelakis, S. Katuri, J. Bauer, B. Petschkuhn, P. Charalampidis, G. Stamatakis, M. Surligas and A. Makrogiannakis. Laboratory Evaluation Results (RERUM Deliverable D5.2)., 2016. pdf...  bibtex ...
  • D. Ruiz-López, J. Cuellar, R. C. Staudemeyer, P. Charalampidis, A. Fragkiadakis, P. Kasinathan, H. C. Pöhls, S. Suppan, E. Tragos and R. Weber. Modelling the trustworthiness of the IoT (RERUM Deliverable D3.3)., 2016. bibtex ...
  • D. Ruiz, C. Reyes, A. Fragkiadakis, E. Tragos, V. Siris, A. Traganitis, P. Charalampides, H. C. Pöhls, B. Petschkuhn, J. Bauer, K. Fischer, J. Gessner, S. Suppan, J. Cuellar, M. Wójcik and G. Oikonomou. Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities (RERUM Deliverable D3.1)., 2015. pdf...  bibtex ...
  • D. Demirel, D. Derler, C. Hanser, H. C. Pöhls, D. Slamanig and G. Traverso. Overview of Functional and Malleable Signature Schemes (PRISMACLOUD Deliverable D4.4)., 2015. pdf...  bibtex ...
  • H. C. Pöhls, J. Cuellar, R. Weber, R. C. Staudemeyer, S. Suppan, E. Tragos, A. Fragkiadakis, M. Wójcik, J. Bauer, B. Petschkuhn and D. Ruiz. Privacy enhancing techniques in Smart City applications (RERUM Deliverable D3.2)., 2015. pdf...  bibtex ...
  • H. de Meer, M. Liedel, H. C. Pöhls, J. Posegga and K. Samelin. Indistinguishability of One-Way Accumulators. Technical Report of Faculty of Computer Science and Mathematics (FIM), University of Passau, Number MIP-1210, 2012. pdf...  bibtex ...
  • K. Samelin, H. C. Pöhls, J. Posegga and H. de Meer. Redactable vs. Sanitizable Signatures. Technical Report of Faculty of Computer Science and Mathematics (FIM), University of Passau, Number MIP-1208, 2012. bibtex ...
  • H. C. Pöhls, K. Samelin, J. Posegga and H. de Meer. Transparent Mergeable Redactable Signatures with Signer Commitment and Applications. Technical Report of Faculty of Computer Science and Mathematics (FIM), University of Passau, Number MIP-1206, August, 2012. pdf...  bibtex ...
  • H. C. Pöhls, K. Samelin, J. Posegga and H. de Meer. Length-Hiding Redactable Signatures from One-Way Accumulators in O(n). Technical Report of Faculty of Computer Science and Mathematics (FIM), University of Passau, Number MIP-1201, 2012. pdf...  bibtex ...
  • H. C. Pöhls. Authenticity and Revocation of Web Content using Signed Microformats and PKI. Technical Report of University of Hamburg, Department of Informatics, Number B-276-07, February, 2007. pdf...  bibtex ...

Selected Talks

  • H. C. Pöhls. Anwendung von Editierbaren Signaturen --- Kryptographische Eigenschaften und mögliche Rechtsfolgen. Talk at the CAST-Workshop "Sichere digitale Archivierung", Darmstadt, Germany, 2016.
  • H. C. Pöhls. Towards compactly encoded signed IoT messages. Talk at the IEEE CAMAD Conference 2016, Lund, Sweden, 2016.
  • H. C. Pöhls. IoT End-to-End Integrity and the Role of Message Encoding. Talk at the Invited presentation at the Department of Science and Technology, Linkoeping University, Sweden, Linkoeping, Sweden, 2016.
  • H. C. Pöhls. Privacy and Security in communications for Smart City applications. Talk at the Invited lecture at the Department of Science and Technology, Linkoeping University, Sweden (Course: TNK-115: Smart Cities), Linkoeping, Sweden, 2015.
  • H. C. Pöhls. Integrity -- Definitions, Pitfalls, and Importance for the Internet of Things. Talk at the Keynote at IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies (WCNC'14), Istanbul, Turkey, 2014. pdf... 
  • H. C. Pöhls. No Integrity, thanks --- Verifiable Explicit Consented Undecidability of Integrity. Talk at the Conference on Information Security Conference 2012 (ISC'12), Passau, Germany, 2012. pdf... 
  • H. C. Pöhls. Authenticity and Confidentiality - A 'óne-night stand'' in TLS?. Talk at the OWASP säker applikationsutveckling at internetdagarna 2011, Stockholm, Sweden, 2011.
  • H. C. Pöhls. Integrity Protection for Authorized Changes - Sanitizable Signatures with Transparency or Detectability. Talk at the KTH Royal Institiute of Technology - School of Computer Science and Communication (CSC), Stockholm, Sweden, 2011.
  • H. C. Pöhls. The State of XML Digital Signatures. Talk at the OWASP AppSec Brazil 2010, Campinas, Brazil, 2010. pdf... 
  • H. C. Pöhls. BitFlip: Determine a Data's Signature Coverage from within the Application. Talk at the OWASP AppSec Research 2010, Stockholm, Sweden, 2010. video(flv)...  pdf... 
  • H. C. Pöhls. Digital Signatures and Context-Loss - How Digital Signatures might facilitate Data Protection Claims in SOA. Talk at the hgi-Seminar at the University of Bochum, Bochum, Germany, 2009.
  • H. C. Pöhls. Authenticity for Web Content - Why the web's transport security era must end?. Talk at the 3rd Workshop on Multimedia, Distributed and Pervasive Systems (MDPS), Passau, Germany, 2009. pdf... 
  • H. C. Pöhls. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. Talk at the 10th International Conference on Information and Communications Security (ICICS) 2008, Birmingham, UK, 2008. pdf... 
  • D. Schreckling and H. C. Pöhls. Data Driven and Data Centric Security. Talk at the 3rd CREATE-NET Workshop, Cavalese, Italy, 2006.

Further Activities

Supervised Theses

  • Future:
    • M.Sc. / B.Sc.: Adaption, Implementation and Performance Evaluation of Malleable Signature Algorithms on Constraint Devices
    • M.Sc. / B.Sc.: Digital Signature Applications and Implementations in Cloud Environments
    • If you are thinking of another thesis topic that falls within my area of interest, please contact me.
  • Ongoing:
    • B.Sc. thesis: Signing and Redacting XML Documents: An Implementation extending the Java Cryptography Architecture (working title)
    • B.Sc. thesis: Modelling Cloud Service Properties for Cryptographic Enhanced Cloud Services (working title)
    • B.Sc. thesis: Authentication in IoT (working title)
  • Finished:
    • M.Sc. thesis: Efficient Signature and Certified Key Encoding in the Internet of Things (by Benedikt Petschkuhn)
    • M.Sc. thesis: Measurement of Elliptic Curve Cryptography Implementations for Contiki on a Re-MOTE (by Max Mössinger)
    • Final year project report from SUPCOM Tunis: Implementation of an accumulator-based Redactable Signature Scheme on a resource-constrained device (by Noelle Rakotondravony)
    • M.Sc. thesis: Steps and Challenges in Certificate based Entity Authentication - Illustrated with Practical Implementations of TLS (by Markus Doering)
    • M.Sc. thesis: Property based Policies for Malleable Signatures - Exemplified by a Web Service Proxy use case (by Arne Bilzhause)
    • M.Sc. thesis: Sanitizable Signatures on Smart Cards - An Implementation on Java Card, Performance Evaluation and Analysis of Suitability for Selected Sanitizable Signature Schemes (by Stefan Peters)
    • B.Sc. thesis: Certifed Allowed Content Usage - Towards Secondary Usage Control in the Web 2.0 (by Markus Doering)
    • B.Sc. thesis: Bit Flip tests to find the signature's black-spots (by Matthias von Treuberg)
    • B.Sc. thesis: Gesicherte Zusammenführung und Zuordnung von textuellen Inhalten zu Autoren am Beispiel von Google Wave (by Frederic Mücke)
    • M.Sc. thesis: Sanitizing Signed XML-Documents (by Kai Samelin)
    • B.Sc. thesis: Implementation of a signature- and a verification-component for verifiable signed content (by Timo Siegle)
    • Diploma thesis: Information hiding in XML based documents (by L. Westphal)
    • Diploma thesis: Implementing content revocation using microformats and certificate revocation as building blocks (by H. Niklaus)
    • Bachelor thesis: Firewall on a Smartcard - A preview on a possible implementation (by F. Kessler & Z. Mados)

Projects

  • RERUM: Leading the Security Workpackage (WP3) (2013-2016)
  • PRISMACLOUD: Leading the Composition of next-generation secure cloud services (WP7) (2015-2018)
  • RESCUE IT: Leading the Security Workpackage (WP5) (2010-2013)
  • BADO: Privacy Preserving Evaluation of Medical-Drug-Usage Data (2007)

Teaching @University of Passau

  • Summer term 2012
    • Seminar: Real Life Security
  • Winter term 2011/12
    • Seminar: Real Life Security
  • Summer term 2011
    • Seminar: Real Life Security
  • Winter term 2010/11
    • Seminar: IT Security unleashed
  • Summer term 2010
    • Seminar: IT Security unleashed 2.0
  • Winter term 2009/10
    • Seminar (IT-Security and IT-Security-Law): Interdisziplinäres Seminar zur Informationssicherheit unter Berücksichtigung juristischer Aspekte
    • Praktikum: Sicherheits-Infrastrukturen
  • Summer term 2009
    • Seminar: IT Security unleashed
    • ProSeminar: Was Sie schon immer über IT-Sicherheit wissen wollten aber nie zu fragen wagten
  • Winter term 2008/09
    • Praktikum: Sicherheits-Infrastrukturen
    • Seminar: IT-Sicherheit

Teaching @University of Hamburg

  • Summer term 2008
    • Project: Network Security
    • Exam for GSS-Lecture
  • Winter term 2007/08
    • Project: Software Security (Part I)
    • Schnupperstudium Informatik (Projekt: Asymmetrische Verschlüsselung von Emails)
    • Seminar: Sicherheit in mobilen und ubiquitären Systemen
    • Oberseminar: Fortgeschrittene IT-Sicherheit
    • Exercises for VIS-Lecture
  • Summer term 2007
    • Project: Software Security (Part II)
    • Seminar: IT Sicherheit
    • Exercises for GSS-Lecture
  • Winter term 2006/07
    • Project: Software Security (Part I)
    • Schnupperstudium Informatik (Projekt: Asymmetrische Verschlüsselung am Beispiel SSL)
    • Seminar: IT Sicherheit
    • Oberseminar: Fortgeschrittene IT-Sicherheit
  • Summer term 2006
    • Project: Software Security (Part II)
    • Project: Network Security ("Netzwerksicherheit")
    • Seminar: IT Sicherheit
  • Winter term 2005/06
    • Exercises in Technische Informatik 3 (T3)
  • Summer term 2005
    • Exercises for GBI-Lecture
    • Seminar: Internet Sicherheit
    • Exercises in Praktische Informatik 2 (P2)
  • Winter term 2004/05
    • Project: Network Security ("Netzwerksicherheit")
    • Projekt-Seminar: Aktuelle Probleme der IT- & Netzsicherheit - Security in wLANs
    • Exercises in Praktische Informatik 1 (P1)
  • Summer term 2004
    • Exercises in Praktische Informatik 2 (P2)
  • Winter term 2003/04
    • Praktikum: Reverse Engineering

Short Bio

 

 
  Impressum Last modified: 07/04/2017 - 12:26:14 by hcp  Seitenanfang