University of Passau
Department of Informatics and Mathematics
IT-SEC 
   University of Passau  >  FIM  >  IT-SEC  > Publications      SiteMapSitemap  Seitenende

Publications of group members

2017

  • A. Bilzhause, H. C. Pöhls and K. Samelin. Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 12th International Conference on Availability, Reliability and Security (ARES SECPID 2017), Conference Publishing Services (CPS), Sept., 2017.  This is a pre-print. pdf...  bibtex ...
     
  • H. C. Pöhls and B. Petschkuhn. Towards compactly encoded signed IoT messages. In IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2017), IEEE, Jun., 2017.  This is a pre-print. Original will be available on IEEE Explore. pdf...  bibtex ...
     
  • H. C. Pöhls and T. Länger. Einsetzbare Kryptografie für die Cloud. In Zeitschrift für Datenrecht und Informationssicherheit (digma), 17 (1): 78-81, Mar., 2017. bibtex ...
     
  • M. T. Beck, J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig. Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. In Proc. of 22nd Australasian Conference on Information Security and Privacy (ACISP 2017), pages 437-452, Springer, Jul., 2017.  This is the full version from ePrint. doi...  pdf...  bibtex ...
     
  • J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig. Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. In Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), pages 152-182, IACR, Mar., 2017.  Full version from ePrint. doi...  pdf...  bibtex ...
     
  • V. Angelakis, E. Tragos, H. C. Pöhls, A. Kapovits and A. Bassi, Ed. Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions. Springer International Publishing, 2017. doi...  pdf...  bibtex ...
     

2016

  • Parra R. J. D., Schreckling, D. and Posegga,Joachim. Addressing Data-Centric Security Requirements for IoT-Based Systems. In 2016 International Workshop on Secure Internet of Things (SIoT), pages 1-10, September, 2016. doi...  bibtex ...
     
  • G. Moldovan, E. Z. Tragos, A. Fragkiadakis, H. C. Pöhls and D. Calvo. An IoT middleware for enhanced security and privacy: the RERUM approach. In Proc. of 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), IEEE, Nov., 2016.  This is a pre-print. pdf...  bibtex ...
     
  • C. Frädrich, H. C. Pöhls, W. Popp, N. Rakotondravony and K. Samelin. Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud and IoT. In Proc. of Information and Communications Security (ICICS 2016), Springer, Nov., 2016.  This is the full version. The original publication is available at springerlink.com pdf...  bibtex ...
     
  • J. Bauer, R. C. Staudemeyer, H. C. Pöhls and A. Fragkiadakis. ECDSA on things: IoT integrity protection in practise. In Proc. of Information and Communications Security (ICICS 2016), Springer, Nov., 2016.  This is a pre-print. pdf...  bibtex ...
     
  • A. Fragkiadakis, G. Oikonomou, H. C. Pöhls, E. Z. Tragos and M. Wójcik. Securing Communications Among Severely Constrained, Wireless Embedded Devices. In Engineering Secure Internet of Things Systems, The Institute of Engineering and Technology, Oct., 2016. paper...  bibtex ...
     
  • T. Länger, H. C. Pöhls and S. Ghernaouti. Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. In Privacy Technologies and Policy - 4th Annual Privacy Forum (APF 2016), Springer, Sept., 2016.  This is a pre-print. pdf...  bibtex ...
     
  • T. Lorünser, D. Slamanig, T. Länger and H. C. Pöhls. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016), Conference Publishing Services (CPS), August, 2016.  This is a pre-print. pdf...  bibtex ...
     
  • A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin. Cryptographically Enforced Four-Eyes Principle. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016), Conference Publishing Services (CPS), August, 2016.  This is a pre-print. pdf...  bibtex ...
     
  • M. Mössinger, B. Petschkuhn, J. Bauer, R. C. Staudemeyer, M. Wójcik and H. C. Pöhls. Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. In Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016), IEEE, July, 2016. doi...  pdf...  bibtex ...
     
  • A. Kung, F. Kargl, S. Suppan, J. Cuellar, H. C. Pöhls, A. Kapovits, N. Notario and Y. S. Martin. A Privacy Engineering Framework for the Internet of Things. In Proc. of 9th edition of the international conference Computers, Privacy and Data Protection 2016 (CDPD 2016), January, 2016. bibtex ...
     
  • M. Mössinger. Measurement of Elliptic Curve Cryptography Implementations for Contiki on a Re-MOTE. Master thesis of IT-Security Group, University of Passau, March, 2016. bibtex ...
     
  • D. Derler, C. Hanser, H. C. Pöhls and D. Slamanig. Towards Authenticity and Privacy Preserving Accountable Workflows. In Privacy and Identity Management. Time for a Revolution? - Proc. of 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pages 170-186, Springer, Jun, 2016. doi...  pdf...  bibtex ...
     
  • E. Z. Tragos, J. B. Bernabe, R. C. Staudemeyer, J. Luis, H. Ramos, A. Fragkiadakis, A. Skarmeta, M. Nati and A. Gluhak. Trusted IoT in the complex landscape of governance, security, privacy, availability and safety. In Digitising the Industry - Internet of Things Connecting the Physical, Digital and Virtual Worlds, pages 1-30, 2016. bibtex ...
     
  • R. C. Staudemeyer, H. C. Pöhls and B. W. Watson. Security & Privacy for the Internet-of-Things communication in the SmartCity. In Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions, pages 28, Springer, 2016. bibtex ...
     
  • E. Z. Tragos, A. Fragkiadakis, V. Angelakis and H. C. Pöhls. Designing Secure IoT Architectures for Smart City Applications. In Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions, Springer, 2016. bibtex ...
     
  • T. Marktscheffel, W. Gottschlich, W. Popp, P. Werli, S. D. Fink, A. Bilzhause and H. de Meer. QR Code Based Mutual Authentication Protocol for Internet of Things. In Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016), IEEE, July, 2016. bibtex ...
     

2015

  • D. Schreckling, J. D. P. Rodriguez and J. Posegga. Data centric Security for IoT. In Proc. of 2nd EAI International Conference on IoT as a Service, Springer, October, 2015.  To appear soon bibtex ...
     
  • Fuchs, P. DoS Detection in NodeRED. Master thesis of IT-Security Group, University of Passau, November, 2015. pdf...  bibtex ...
     
  • Parra R. J. D. and Posegga, J. Why Servers Should Fear their Clients: Abusing Websockets in Browsers for DoS. In Proc. of 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2015. pdf...  bibtex ...
     
  • C. L. Nehaniv, J. Rhodes, A. Egri-Nagy, P. Dini, E. R. Morris, G. Horváth, F. Karimi, D. Schreckling and M. J. Schilstra. Symmetry structure in discrete models of biochemical systems: natural subsystems and the weak control hierarchy in a new model of computation driven by interactions. In Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 373 (2046), 2015. doi...  bibtex ...
     
  • Parra R. J. D., Schreckling, D. and Posegga, J. Identity Management in Platforms Offering IoT as a Service. In Internet of Things. User-Centric IoT, pages 281-288, Springer International Publishing, 2015. doi...  paper...  bibtex ...
     
  • J. García-Alfaro, J. Herrera-Joancomartí, E. Lupu, J. Posegga, A. Aldini, F. Martinelli and N. Suri, Ed. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. doi...  paper...  bibtex ...
     
  • N. T. L. Rakotondravony. Implementation of an accumulator-based Redactable Signature Scheme on a resource-constrained device. Master thesis of SUP'COM Tunis, co-supervised at University of Passau, August, 2015. bibtex ...
     
  • F.W.J. v. Geelkerken, H. C. Pöhls and S. Fischer-Hübner. The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014. In Proc. of 3rd International Academic Conference of Young Scientists on Law & Psychology 2015 (LPS 2015), pages 404-410, L'viv Polytechnic Publishing House, Nov., 2015. paper...  bibtex ...
     
  • D. Derler, H. C. Pöhls, K. Samelin and D. Slamanig. A General Framework for Redactable Signatures and New Constructions. In Proc. of 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), pages 3-19, Springer, Nov., 2015. doi...  pdf...  bibtex ...
     
  • T. Lorünser, C. B. Rodriguez, D. Demirel, S. Fischer-Hübner, T. Gross, T. Länger, M. d. Noes, H. C. Pöhls, B. Rozenberg and D. Slamanig. Towards a New Paradigm for Privacy and Security in Cloud Services. In New LEIT projects on Security-by-Design - 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Brussels, Belgium, April 28 - 29, Springer, Apr., 2015. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls. JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. In Proc. of the Workshop on Extending Seamlessly to the Internet of Things (esIoT), collocated at the IMIS-2012 International Conference (IMIS 2015), pages 306 - 312, IEEE, Jul., 2015.  The original publication is available at ieeexplore.ieee.org. doi...  pdf...  bibtex ...
     
  • G. Baldini, T. Peirce, M. Botterman, M. C. Talacchini, A. Pereira, M. Handte, D. Rotondi, H. C. Pöhls, O. Vermesan, A. Baddii, B. Copigneaux, Schreckling, D., L. Vigano, G. Steri, S. Piccione, P. Vlacheas, V. Stavroulaki, D. Kelaidonis, R. Neisse, E. Tragos, P. Smadja, C. Hennebert, M. Serrano, S. Severi, G. Abreu, P. T. Kirstein, S. Varakliotis and A. Skarmeta. Internet of Things -- Governance, Privacy and Security Issues. IERC, 2015. bibtex ...
     
  • E. Z. Tragos, H. C. Pöhls, R. C. Staudemeyer, D. Slamanig, A. Kapovits, S. Suppan, A. Fragkiadakis, G. Baldini, R. Neisse, P. Langendörfer, Z. Dyka and C. Wittke. Securing the Internet of Things - Security and Privacy in a Hyperconnected World. In Building the Hyperconnected Society - IoT Research and Innovation Value Chains, Ecosystems and Markets, pages 189-219, River Publishers, Jul., 2015. pdf...  bibtex ...
     
  • H. C. Pöhls and K. Samelin. Accountable Redactable Signatures. In Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), IEEE, Aug., 2015.  The original publication is going to be available soon at ieeexplore.ieee.org. pdf...  bibtex ...
     
  • K. v. d. Schyff and R. C. Staudemeyer. Monitoring Windows: An Open Source approach with Icinga and NSClient ++ using PowerShell. In Proc. of the Southern African Telecommunication Networks and Applications Conference (SATNAC 2015), pages 189-194, 2015. bibtex ...
     
  • R. C. Staudemeyer. Applying long short-term memory recurrent neural networks to intrusion detection. In South African Computer Journal, 56 (1): 136-154, jul, 2015. doi...  paper...  bibtex ...
     
  • R. C. Staudemeyer and J. Connan. Burning money with firewalls. In South African Computer Journal, 56 (July): 165-167, 2015. doi...  paper...  bibtex ...
     
  • B. Braun. Web-based Secure Application Control. Ph.D. Thesis, University of Passau, Germany, 2015. pdf...  bibtex ...
     
  • B. Braun, K. Pauli, J. Posegga and M. Johns. LogSec: Adaptive Protection for the Wild Wild Web. In the 2015 ACM Symposium on Applied Computing (SAC 2015) - to appear, April, 2015. bibtex ...
     

2014

  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls, B. Petschkuhn, J. Rückert and M. Mössinger. Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy and Performance. In IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2014), IEEE, 2014. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls and K. Samelin. On Updatable Redactable Signatures. In Proc. of the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014), Springer, 2014.  This is the full version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
     
  • E. Z. Tragos, V. Angelakis, A. Fragkiadakis, D. Gundlegard, S. Nechifor, G. Oikonomou, H. C. Pöhls and A. Gavras. Enabling Reliable and Secure IoT-based Smart City Applications. In Proc. of 1st International IEEE Workshop on Pervasive Systems for Smart Cities, IEEE, 2014. doi...  bibtex ...
     
  • H. C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E. Z. Tragos, R. D. Rodriguez and T. Mouroutis. RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects. In Proc. of the IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies, IEEE, 2014. doi...  bibtex ...
     
  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. On the Relation between Redactable and Sanitizable Signature Schemes. In Proc. of the 6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014), pages 113-130, Springer International Publishing, 2014.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls and M. Karwe. Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid. In Proc. of the 2nd Workshop on Smart Grid Security (SmartGridSec 2014), Springer International Publishing, 2014.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
     
  • R. C. Staudemeyer and C. W. Omlin. Extracting salient features for network intrusion detection using machine learning methods. In South African Computer Journal, 52 (July): 82-96, 2014. doi...  paper...  bibtex ...
     
  • B. Braun, J. Köstler, J. Posegga and M. Johns. A Trusted UI for the Mobile Web. In 29th IFIP International Information Security and Privacy Conference (IFIP SEC 2014), June, 2014. doi...  pdf...  bibtex ...
     
  • B. Braun, C. Gries, B. Petschkuhn and J. Posegga. Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. In 29th IFIP International Information Security and Privacy Conference (IFIP SEC 2014), June, 2014. doi...  pdf...  bibtex ...
     
  • B. Braun, J. Köstler, M. Johns and J. Posegga. PhishSafe: Leveraging Modern JavaScript API's for Transparent and Robust Protection. In Fourth ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2014), March, 2014. doi...  pdf...  bibtex ...
     

2013

  • C. Brzuska, H. C. Pöhls and K. Samelin. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures. In Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013), pages 12-30, Springer Berlin Heidelberg, 2013.  This is an preliminary version of the original publication. The original publication is available at springerlink.com. doi...  pdf...  bibtex ...
     
  • H. de Meer, H. C. Pöhls, J. Posegga and K. Samelin. Scope of Security Properties of Sanitizable Signatures Revisited. In Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013), pages 188-197, IEEE, Sept, 2013.  This is an preliminary version of the original publication. The original publication is available at ieeexplore.ieee.org. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. de Meer. Malleable Signatures for Resource Constrained Platforms. In Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, pages 18-33, Springer-Verlag, 2013.  This is an preliminary version of the original publication. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls. Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity. In Trust Management VII, pages 136-150, Springer Berlin Heidelberg, 2013.  This is the preliminary version of the original publication. doi...  pdf...  bibtex ...
     
  • R. C. Staudemeyer and T. Kucza. Das Nagios/Icinga Kochbuch. O'Reilly; Auflage: 1, 2013. bibtex ...
     
  • R. C. Staudemeyer and C. W. Omlin. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data. In Prof. of the conf. on South African Institute for Computer Scientists and Information Technologists (SAICSIT'13), pages 218-224, ACM Press, oct, 2013. doi...  paper...  bibtex ...
     
  • D. Hausknecht. Variability-aware data-flow Analysis for Smartphone Applications. Master thesis of Software Product-Lines Group and IT-Security Group, University of Passau, September, 2013. pdf...  bibtex ...
     
  • R. Wimmer. Proof-Carrying Android Applications to Validate Data-Centric User Policies. Master thesis of IT-Security Group, University of Passau, July, 2013.  (to be published) bibtex ...
     
  • B. Mandler, F. Antonelli, R. Kleinfeld, C. Pedrinaci, D. Carrera, A. Gugliotta, D. Schreckling, I. Carreras, D. Raggett, M. Pous, C. V. Villares and V. Trifa. COMPOSE - A journey from the Internet of Things to the Internet of Services. In Workshop: Cloud Computing Project and Initiatives - CCPI'13, March 26th, 2013, 2013. bibtex ...
     
  • D. Schreckling, S. Huber, F. Höhne and J. Posegga. URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. In Proc. of the 7th Workshop in Information Security Theory and Practice (WISTP 2013), Springer-Verlag, 2013.  (to appear) bibtex ...
     
  • B. Braun, C. v. Pollak and J. Posegga. A Survey on Control-Flow Integrity Means in Web Application Frameworks. In 18th Nordic Conference on Secure IT Systems (NordSec 2013), October, 2013. doi...  pdf...  bibtex ...
     
  • B. Braun, P. Gemein, H. P. Reiser and J. Posegga. Control-Flow Integrity in Web Applications. In International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Lecture Notes in Computer Science (LNCS), Springer, February, 2013. doi...  pdf...  bibtex ...
     

2012

  • C. Brzuska, H. C. Pöhls and K. Samelin. Non-Interactive Public Accountability for Sanitizable Signatures. In Proc. of the 9th European PKI Workshop: Research and Applications (EuroPKI 2012), pages 178, Springer-Verlag, 2012.  This is an extended and revised version of the original publication. pdf...  bibtex ...
     
  • I. Askoxylakis, H. C. Pöhls and J. Posegga, Ed. Proc. of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP 2012). doi...  bibtex ...
     
  • F. Höhne, H. C. Pöhls and K. Samelin. Rechtsfolgen editierbarer Signaturen. In Datenschutz und Datenrecht (DuD), Volume 36 (6): 485-491, Juni, 2012. pdf...  bibtex ...
     
  • H. C. Pöhls, K. Samelin, J. Posegga and H. de Meer. Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction. In Proc. of the International Conference on Security and Cryptography (SECRYPT 2012), pages 113-125, SciTePress, 2012. pdf...  bibtex ...
     
  • H. C. Pöhls and F. Höhne. Sticky Signatures: Legal Advantages of Redactable Signatures and Credentials in the Food Supply Chain. In Proc. of the 5th Interdisciplinary Conference on Current Issues in IT Security 2012, Dunker & Humblot, Berlin, 2012. bibtex ...
     
  • K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. de Meer. On Structural Signatures for Tree Structured Data. In Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Springer, 2012.  This is an extended and revised version of the original publication. The original publication is available at www.springerlink.com doi...  pdf...  bibtex ...
     
  • K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. de Meer. Redactable Signatures for Independent Removal of Structure and Content. In Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, April, 2012. pdf...  bibtex ...
     
  • H. C. Pöhls and F. Höhne. The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. In Proc. of 7th International Workshop on Security and Trust Management (STM 2011), pages 175-192, Springer, June, 2012. pdf...  bibtex ...
     
  • R. C. Staudemeyer. The importance of time: Modelling network intrusions with long short-term memory recurrent neural networks. Ph.D. Thesis, 2012. pdf...  bibtex ...
     
  • P. Dini, C. L. Nehaniv, A. Egri-Nagy, M. J. Schilstra, D. Schreckling, J. Posegga, G. Horvath and A. J. Munro. Biological and Mathematical Basis of Interaction Computing. In International Journal of Unconventional Computing, 8 (4): 283-287, 2012. paper...  bibtex ...
     
  • D. Schreckling, J. Posegga, J. Köstler and M. Schaff. Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. In Proceedings of the 6th Workshop in Information Security Theory and Practice, WISTP'12, Springer Verlag, June, 2012.  To appear. bibtex ...
     
  • D. Schreckling, J. Posegga and D. Hausknecht. Constroid: Data-Centric Access Control for Android. In Proceedings of the 27th Symposium on Applied Computing (SAC): Computer Security Track, 2012.  To appear. bibtex ...
     
  • M. Johns, S. Lekies, B. Braun and B. Flesch. BetterAuth: Web Authentication Revisited. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC 2012), December, 2012. doi...  pdf...  bibtex ...
     
  • B. Braun, S. Kucher, M. Johns and J. Posegga. A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities. In Trust, Privacy and Security in Digital Business (TrustBus '12), pages 17-29, Lecture Notes in Computer Science (LNCS), Springer, September, 2012. doi...  pdf...  bibtex ...
     
  • B. Braun, P. Gemein, B. Höfling, M. M. Maisch and A. Seidl. Angriffe auf OpenID und ihre strafrechtliche Bewertung. In Datenschutz und Datensicherheit - DuD, 36: 502-509, July, 2012. doi...  pdf...  bibtex ...
     

2011

  • M. Johns, B. Braun, M. Schrank and J. Posegga. Reliable Protection Against Session Fixation Attacks. In Proceedings of the 2011 ACM Symposium on Applied Computing (SAC 2011), pages 1531-1537, ACM, 2011. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls, A. Bilzhause, K. Samelin and J. Posegga. Sanitizable Signed Privacy Preferences for Social Networks. In Proc. of GI Workshop on Privacy and Identity Management for Communities - Communities for Privacy and Identity Management (DICCDI 2011), GI, October, 2011. pdf...  bibtex ...
     
  • H. C. Pöhls, K. Samelin and J. Posegga. Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. In Proc. of 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), Springer, June, 2011. pdf...  bibtex ...
     
  • D. Schreckling and J. Posegga. Adaptive Security Architectures for Global Sensing Applications. In Electronic Communications of the EASST, 37, 2011. paper...  bibtex ...
     
  • J. Posegga and D. Schreckling. Next Generation Mobile Application Security: Android and Beyond. In IT-Sicherheit zwischen Regulierung und Innovation: Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit, Vieweg+Teubner Verlag, February, 2011. bibtex ...
     

2010

  • H. C. Pöhls. Why Showing one TLS Certificate is not enough? Towards a Browser Feedback for Multiple TLS Certificate Verifications. In Proc. of GI Sicherheit 2010 - Gesellschaft für Informatik, GI, October, 2010. pdf...  bibtex ...
     
  • F. Höhne and H. C. Pöhls. Staatliche Schutzpflichten für die IT-Infrastruktur. In Proc. of D-A-CH Security 2010, September, 2010. bibtex ...
     
  • F. Höhne and H. C. Pöhls. Grund und Grenzen staatlicher Schutzpflichten für die IT-Infrastruktur. In Tagungsband der 11. Herbstakademie der Deutschen Stiftung für Recht und Informatik (DSRI): Digitale Evolution - Herausforderungen für das Informations- und Medienrecht, OlWIR Oldenburger Verlag für Wirtschaft, Informatik und Recht, September, 2010. bibtex ...
     
  • R. Herkenhöner, M. Jensen, H. C. Pöhls and H. de Meer. Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions. In IEEE 2010 International Workshop on WebService and Business Process Security (WSBPS 2010), IEEE, Juli, 2010. doi...  pdf...  bibtex ...
     
  • D. Schreckling and T. Marktscheffel. An Artificial Immune System Approach for Artificial Chemistries Based on Set Rewriting. In Proceedings of 9th Annual Conference in Artificial Immune Systems (ICARIS), Edinburgh, UK, July 26-29, pages 250-263, Springer, July, 2010.  Best paper award. doi...  bibtex ...
     
  • E. Altman, P. Dini, D. Miorandi and D. Schreckling, Ed. Paradigms for Biologically-Inspired Autonomic Networks and Services -- The BIONETS Project eBook. BIONETS Consortium, March, 2010. pdf...  bibtex ...
     
  • P. Dini and D. Schreckling. On Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In Paradigms for Biologically-Inspired Autonomic Networks and Services, pages 67-104, BIONETS Consortium, March, 2010. bibtex ...
     
  • P. Dini, D. Schreckling and G. Horváth. Algebraic and Categorical Framework for Interaction Computing and Symbiotic Security. In Paradigms for Biologically-Inspired Autonomic Networks and Services, pages 105-176, BIONETS Consortium, March, 2010. bibtex ...
     
  • M. Schrank, B. Braun, M. Johns and J. Posegga. Session Fixation  n the Forgotten Vulnerability?. In Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, pages 341-352, Lecture Notes in Informatics (LNI), Springer, 2010. doi...  pdf...  bibtex ...
     
  • P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis and D. Sauveron, Ed. Proceedings of 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices (WISTP 2010), Passau, Germany, April 12-14, 2010. doi...  bibtex ...
     
  • M. Johns, C. Beyerlein, R. Giesecke and J. Posegga. Secure Code Generation for Web Applications. In Proceedings of 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy, February 3-4, 2010., pages 96-113, Springer, 2010. doi...  bibtex ...
     
  • P. Dini and D. Schreckling. A Research Framework for Interaction Computing. In Digital Ecosystems, Third International Conference, OPAALS 2010, Springer, March, 2010. bibtex ...
     

2009

  • M. Johns. Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting. Ph.D. Thesis, University of Passau, 2009. pdf...  bibtex ...
     
  • I. Carreras, L. Bassbouss, D. Linner, H. Pfeffer, V. Simon, E. Varga, D. Schreckling, J. Huusko and H. Rivas. BIONETS: Self Evolving Services in Opportunistic Networking Environments. In Proceedings of the 4th International Conference on Bio-Inspired Models of Network, Information and Computing Systems (BIONETICS 2009), ICST, December, 2009. bibtex ...
     
  • R. C. Staudemeyer and C. W. Omlin. Feature set reduction for automatic network intrusion detection with machine learning algorithms. In Proc. of the Southern African Telecommunication Networks and Applications Conference (SATNAC'09), pages 6, 2009. pdf...  bibtex ...
     
  • D. Schreckling and P. Dini. Distributed online evolution: An algebraic problem?. In IEEE Congress on Evolutionary Computation (CEC2009), pages 1430-1439, IEEE, May, 2009. bibtex ...
     

2008

  • Johns, M., Engelmann, B. and Posegga, J. XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. In ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference, pages 335-344, IEEE Computer Society, 2008. doi...  bibtex ...
     
  • B. Braun and H. C. Pöhls. Authenticity: The missing link in the social semantic web. In INFORMATIK 2008 Beherrschbare Systeme - dank Informatik, Digitale Soziale Netze 2008, Lecture Notes in Informatics (LNI), Springer, 2008. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In Proc. of Information and Communications Security (ICICS) 2008, pages 279-293, Springer, 2008. doi...  pdf...  bibtex ...
     
  • H. C. Pöhls. ConCert: Content Revocation using Certificates. In GI Sicherheit 2008 - Gesellschaft für Informatik, pages 149-162, GI, April, 2008. pdf...  bibtex ...
     
  • H. C. Pöhls and L. Westphal. Die "Untiefen" der neuen XML-basierten Dokumentenformate. In 15. DFN CERT Workshop Sicherheit in vernetzten Systemen, February, 2008. pdf...  bibtex ...
     
  • T. Meyer, D. Schreckling, C. Tschudin and L. Yamamoto. Robustness to Code and Data Deletion in Autocatalytic Quines. In Transactions on Computational Systems Biology X, pages 20-40, Springer, 2008. doi...  bibtex ...
     
  • P. Dini and D. Schreckling. Notes on Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In Proceedings of 2nd International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008, pages 83-90, February, 2008. doi...  bibtex ...
     
  • B. Braun. SAVE: Static Analysis on Versioning Entities. In SESS '08: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, pages 25-32, ACM, 2008. doi...  pdf...  bibtex ...
     

2007

  • M. Johns. On JavaScript Malware and related threats - Web page based attacks revisited. In Journal in Computer Virology, Springer Paris, 4 (3): 161-178, December, 2007. doi...  pdf...  bibtex ...
     
  • M. Johns and J. Winter. Protecting the Intranet Against "JavaScript Malware" and Related Attacks. In Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), pages 40 - 59, Springer, July, 2007. pdf...  bibtex ...
     
  • M. Johns and C. Beyerlein. SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation. In 22nd ACM Symposium on Applied Computing (SAC 2007), Security Track, pages 284 - 291, ACM, March, 2007. doi...  pdf...  bibtex ...
     
  • M. Johns and D. Schreckling. Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis. In Datenschutz und Datensicherheit - DuD, 31 (12): 888-893, December, 2007. doi...  bibtex ...
     
  • D. Bliefernicht and D. Schreckling. Highly Adaptive Cryptographic Suites for Autonomic WSNs. In Proceedings of 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS'07, pages 287-294, December, 2007. doi...  bibtex ...
     
  • L. Yamamoto, D. Schreckling and T. Meyer. Self-replicating and self-modifying programs in fraglets. In Proceedings of 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS'07, pages 159-167, December, 2007. doi...  bibtex ...
     
  • P. Dini and D. Schreckling. More Notes on Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In OPAALS Workshop, November, 2007. bibtex ...
     
  • D. Schreckling and M. Johns. CISAT: Integration von sicherheitszentrierter statischer Analyse in den Enwicklungsprozess. In 14. DFN-CERT Workshop Sicherheit in vernetzten Systemen, February, 2007. pdf...  bibtex ...
     
  • B. Braun. FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. In Proceedings of The Second International Conference on Availability, Reliability and Security (ARES'07), pages 967-974, IEEE Computer Society, 2007. doi...  pdf...  bibtex ...
     
  • Domingo-Ferrer, J., Posegga, J., Sebé, F. and Torra, V. Advances in smart cards. In Computer Networks, 51 (9): 2219-2222, jun, 2007. doi...  bibtex ...
     

2006

  • M. Johns. SessionSafe: Implementing XSS Immune Session Handling. In European Symposium on Research in Computer Security (ESORICS 2006), pages 444-460, Springer, September, 2006. pdf...  bibtex ...
     
  • M. Johns and J. Winter. RequestRodeo: Client Side Protection against Session Riding. In Proceedings of the OWASP Europe 2006 Conference, refereed papers track, Report CW448, pages 5 - 17, Departement Computerwetenschappen, Katholieke Universiteit Leuven, May, 2006. pdf...  bibtex ...
     
  • H. C. Pöhls and J. Posegga. Smartcard Firewalls Revisited. In Proc. 7th Intern. Conf. on Smart Card Research and Applications, pages 179-191, Springer Verlag, Apri 19-21, 2006. pdf...  bibtex ...
     

2005

  • D. Umuhoza, R. C. Staudemeyer and C. W. Omlin. A metric of trust for ad-hoc networks using direct source routing algorithms. In Proc. of the Southern African Telecommunication Networks and Applications Conference (SATNAC'05), pages 1-9, 2005. pdf...  bibtex ...
     
  • R. C. Staudemeyer, D. Umuhoza and C. W. Omlin. Attacker models, traffic analysis and privacy threats in IP networks. In 12th Int. Conf. on Telecommunications (ICT'05), pages 7, 2005. bibtex ...
     
  • J. Posegga and J. Seedorf. Voice Over IP: Unsafe at any Bandwidth?. In Proc. EURESCOM Summit 2005: Ubiquitous Services and Applications, VDE Verlag, April 27--29, 2005. pdf...  bibtex ...
     

2004

  • T. Walter, L. Bussard, J. Haller, R. Kilian-Kehr, J. Posegga and P. Robinson. Secure Mobile Business Applications: Framework, Architecture and Implementation. In Information Security Technical Report Journal, 9 (4): 6-22, 2004. pdf...  bibtex ...
     

Older publications

  • R. C. Staudemeyer. Technische Grundlagen des Nomadic Computing., 2002. bibtex ...
     
  • R. C. Staudemeyer, S. Heidl, H. Busch and M. Stolle. Teleimmersion -- Erfahrungen mit der Gigabit-Ethernet-Strecke zwischen Berlin und Hannover. In DFN-Mitteilungen, 58(3): 7-9, 2002. bibtex ...
     
  • R. Killian-Kehr and J. Posegga. Smart Cards in Interaction: Towards Trustworthy Digital Signatures. In Proc. CARDIS, Springer Verlag, 2002. doi...  pdf...  bibtex ...
     
  • D. Basin, S. Friedrich, M. Gawkowski and J. Posegga. Bytecode Model Checking: An Experimental Analysis. In ESOP 2002: SPIN Workshop, Springer Verlag, 2002. pdf...  bibtex ...
     
  • R. Kehr, J. Posegga, R. Schmitz and P. Windirsch. Mobile Security for Internet Applications. In Arbeitskonferenz Kommunikationssicherheit 2001, Springer Verlag, 2001. pdf...  bibtex ...
     
  • G. Karjoth and J. Posegga. Mobile Agents and Telcos' Nightmares. In Annales des Telecommunications, 55 (7/8): 29-41, 2000. pdf...  bibtex ...
     
  • S. Guthery, R. Kehr and J. Posegga. How to Turn a GSM SIM into a Web Server. In Proc. IFIP Fourth Working Conference on Smart Card Research and Applications (CARDIS 2000), Kluwer Academic Publishers, 2000.  (awarded ``Best Paper'' at CARDIS) pdf...  bibtex ...
     
  • S. Guthery, R. Kehr, J. Posegga and H. Vogt. GSM SIMs as Web Servers. In Seventh Intern. Conf. on Intelligence in Services and Networks, Short Paper, Februar, 2000. pdf...  bibtex ...
     
  • J. Posegga. Secure Mobile Commerce: A Plug an Pay Approach. In Proc. Micro.tec 2000, VDE Verlag, September, 2000. bibtex ...
     
  • D. Gabbay, M. D'Agostino, R. Hähnle and J. Posegga, Ed. Handbook of Tableau-based Methods in Automated Deduction. Kluwer Academic Publishers, 1999. bibtex ...
     
  • J. Posegga. Jini: Infrastruktur für dynamische Dienste in verteilten Systemen. In Informatik-Spektrum, 22 (1), 1999.  (Rubrik: Aktuelles Schlagwort) pdf...  bibtex ...
     
  • R. Kehr, J. Posegga and H. Vogt. PCA: Jini-based Personal Card Assistant. In CQRE-Secure, Springer Verlag, November, 1999. doi...  pdf...  bibtex ...
     
  • A. Munch-Ellingsen, P. S. Malm, J. Posegga, R. Kehr, G. Privat, R. Airiau and A. Hardwick. Smart Devices. EURESCOM GmbH, Heidelberg, Germany, December, 1999. pdf...  bibtex ...
     
  • D. Basin, S. Friedrich, J. Posegga and H. Vogt. Java Bytecode Verification by Model Checking (System Abstract). In Proc. Conf. on Computer Aided Verification, Springer LNCS, 1999. pdf...  bibtex ...
     
  • J. Posegga and P. H. Schmitt. Implementing Tableau-based Deduction. In Handbook of Tableau-based Methods in Automated Deduction, Kluwer Academic Publishers, 1999. bibtex ...
     
  • J. Posegga. Die Sicherheitsaspekte von Java. In Informatik-Spektrum, 21 (1): 16-22, 1998. pdf...  bibtex ...
     
  • M. Kaiserswerth and J. Posegga. Java auf Chipkarten. In Informatik-Spektrum, 21 (1): 27-28, 1998. pdf...  bibtex ...
     
  • T. Margaria, B. Steffen, R. Rückert and J. Posegga, Ed. Services and Visualization: Towards User Friendly Design. bibtex ...
     
  • J. Posegga and H. Vogt. Byte Code Verification for Java Smart Cards Based on Model Checking. In 5th European Symposium on Research in Computer Security (ESORICS), Springer Verlag, 1998. pdf...  bibtex ...
     
  • R. Goré, J. Posegga, A. Slater and H. Vogt. cardTAP: The First Theorem Prover on a Smart Card. In Proc. Conference on Automated Deduction (CADE), Springer Verlag, 1998. pdf...  bibtex ...
     
  • J. Posegga. Java Smart Cards as a Platform for Electronic Commerce. In Electronic Commerce: International IFIP/GI Working Conference on Trends in Distributed Systems and Electronic Commerce, pages 175-182, dpunkt Verlag, Heidelberg, 1998. pdf...  bibtex ...
     
  • R. Goré, J. Posegga, A. Slater and H. Vogt. cardTAP: Automated Deduction on a smart card. In Proc. 1998 Joint Australian Artificial Intelligence Conference, Springer Verlag, July, 1998. pdf...  bibtex ...
     
  • J. Posegga. Java Smartcards (invited talk). In Proc. Comdex Enterprise: Telecom/IT-Forum, Softbank Comdex, Inc., oct, 1998. bibtex ...
     
  • J. Posegga and H. Vogt. Java Byte Code Verification using Model Checking. In Proc. OOPSLA Workshop on Formal Underpinnings of Java, 1998. pdf...  bibtex ...
     
  • J. Posegga. Java in Telecoms -- Challenges and Oportunities (invited talk). In Proc. Object World '97, Softbank Comdex, Inc., apr, 1997. bibtex ...
     
  • J. Posegga and P. H. Schmitt. Deduction with First-order Shannon Graphs. In Journal of Logic and Computation, 5 (6): 697-729, 1996. bibtex ...
     
  • B. Beckert and J. Posegga. Logic Programming as a Basis for Lean Automated Deduction. In Journal of Logic Programming, 28 (3): 231-236, Sept., 1996. pdf...  bibtex ...
     
  • B. Beckert and J. Posegga. leanEA: A Lean Evolving Algebra Compiler. In Proceedings, Annual Conference of the European Association for ComputerScience Logic (CSL'95), Paderborn, Germany, pages 64-85, Springer, 1996. bibtex ...
     
  • P. Baumgartner, R. Hähnle and J. Posegga, Ed. Proc. 4th Workshop on Theorem Proving with Analytic Tableaux and Related Methods. bibtex ...
     
  • J. Posegga and K. Schneider. A First-Order Calculus Based on Propositional BDDs. In Leonie Dreschler-Fischer, Simone Pribbenow (Ed.): KI-95 Activities, Gesellschaft f. Informatik, Bonn, sep, 1995. pdf...  bibtex ...
     
  • J. Posegga and P. H. Schmitt. Automated Deduction with Shannon Graphs. In Journal of Logic and Computation. In, 5: 697-729, 1995. pdf...  bibtex ...
     
  • B. Beckert and J. Posegga. leanEA: A Poor Man's EvolvingAlgebra Compiler. In Andreas Krall, Ulrich Geske (Ed): 11. Workshop Logische Programmierung, GMD-Studien Nr. 270, sep, 1995. pdf...  bibtex ...
     
  • B. Beckert and J. Posegga. leanTaP: Lean Tableau-based Deduction. In Journal of Automated Reasoning, 15 (3): 339-358, 1995. pdf...  bibtex ...
     
  • B. Beckert and J. Posegga. leanTaP: Lean Tableau-Based Theorem Proving. In Proc. of 12th Conference on Automated Deduction, Springer, Jun, 1994. pdf...  bibtex ...
     
  • B. Beckert and J. Posegga. Lean Theorem Proving: Maximal Efficiency from Minimal Means. In Working Notes, AISB Workshop ``Automated Reasoning: Closing the Gap betweenTheory and Practice'', Leeds, England, pages 7-8, apr, 1994. pdf...  bibtex ...
     
  • J. Goubault and J. Posegga. BDDs and Automated Deduction. In Proc. 8th International Symposium on Methodologies for Intelligent Systems, Springer, Oct, 1994. pdf...  bibtex ...
     
  • J. Posegga. Deduktion mit Shannongraphen für Prädikatenlogik erster Stufe. Infix Verlag, Sankt Augustin, 1993. bibtex ...
     
  • J. Posegga. Compiling Proof Search in Semantic Tableaux. In Proc. 7th International Symposium on Methodologies for Intelligent Systems, pages 67-77, Springer, Jun, 1993. pdf...  bibtex ...
     
  • J. Posegga and K. Schneider. Deduction with First-order BDDs. In Basin et.al.: Proc. 2nd Workshop on Theorem Proving with Analytic Tableaux and Related Methods, Marseilles, France. Max-Planck-Institut für Informatik, Saarbrücken, Germany, 1993. bibtex ...
     
  • J. Posegga. Compiling Tableau-Based Deduction for General Formulae. In Workshop PTTP-basiertes Theorembeweisen, Universität Koblenz-Landau, 1993. bibtex ...
     
  • J. Posegga. First-order Deduction with Binary Decision Diagrams.  submitted pdf...  bibtex ...
     
  • D. Basin, B. Fronhöfer, R. Hähnle, J. Posegga and C. Schwind, Ed. Proc. 2nd Workshop on Theorem Proving with Analytic Tableaux and Related Methods. bibtex ...
     
  • J. Posegga and B. Ludäscher. Towards First-order Deduction Based on Shannon Graphs. In Proc. German Workshop on Artificial Intelligence, Springer, 1992. bibtex ...
     
  • H. Müller, G. Moerkotte and J. Posegga. Aspects of Consistency Driven Planning. In Proc. Third International Workshop on the Deductive Approach to Information Systems and Databases, Sept, 1992. bibtex ...
     
  • J. Posegga. First-order Shannon Graphs. In Proc. Workshop on Theorem Proving with Analytic Tableau and Related Methods, published by: Universität Karlsruhe, Institut für Logik, Komplexität und Deduktionssysteme, technical report 8/92, Mar, 1992. bibtex ...
     
  • J. Posegga. First-order Shannon Graphs. In Intern. Conf. on Fifth Generation Computer Systems / Workshop on Automated Deduction, June, 1992. bibtex ...
     
  • H. Müller, G. Moerkotte and J. Posegga. Consistency Driven Planning. In Proc. 5th Portuguese Conference on Artificial Intelligence, Springer, Oct, 1991. bibtex ...
     
  • G. Moerkotte and J. Posegga. Consistency Driven Planning. In 5th GI-Workshop ``Planen und Konfigurieren'', 1991. bibtex ...
     
  • J. Dix, J. Posegga and P.H. Schmitt. Modal Logic for AI Planning. In First International Conference on Expert Planning Systems, Jul, 1990. pdf...  bibtex ...
     
  • G. Moerkotte and J. Posegga. Towards the Integration of Deductive Databases and Planning Systems. In GI-Workshop ``Planen und Konfigurieren'', published by Forschungsinstitut für anwedungsorientierte Wissensverarbeitung (technical report), 1990. bibtex ...
     

 

  Impressum Last modified: 24/02/2015 - 18:13:49 by hcp  Seitenanfang