TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 59.

Baier, Harald (2015):
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
In: it - Information Technology, 6, DOI: 10.1515/itit-2015-0023,
[Article]

Buchmann, Nicolas and Baier, Harald (2015):
Elektronische Identifizierung und vertrauenswürdige Dienste.
In: D.A.C.H. Security 2015, [Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Pras, Aiko and Baier, Harald (2015):
Real-time DDoS Defense: A collaborative Approach at Internet Scale.
[Article]

Steinberger, Jessica and Sperotto, Anna and Pras, Aiko and Baier, Harald (2015):
Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale.
In: Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015), Internet Architecture Board, [Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Baier, Harald and Pras, Aiko (2015):
Collaborative Attack Mitigation and Response: A Survey.
In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management, Ottawa (Canada), ISBN 978-3-901882-76-0,
[Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Golling, Mario and Baier, Harald and Pras, Aiko (2015):
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
p. 9, [Article]

Ossenbühl, Sven and Steinberger, Jessica and Baier, Harald (2015):
Towards automated incident handling: How to select an appropriate response against a network-based attack?
p. 17, In Proceedings of 9th Int, [Article]

Schehlmann, Lisa and Abt, Sebastian and Baier, Harald (2014):
Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking.
In: Proceedings of 1st International Workshop on Management of SDN and NFV Systems (ManSDN/NFV 2014), [Conference or Workshop Item]

Buchmann, Nicolas and Baier, Harald (2014):
Towards a more secure and scalable verifying PKI of eMRTD.
In: Journal of Computer Security, pp. 1025-1049, 22, (6), [Article]

Buchmann, Nicolas and Rathgeb, Christian and Baier, Harald and Busch, Christoph (2014):
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14), [Article]

Breitinger, Frank and Liu, Huajian and Winter, Christian and Baier, Harald and Rybalchenko, Alexey and Steinebach, Martin
Gladyshev, Pavel and Marrington, Andrew and Baggili, Ibrahim (eds.) (2014):
Towards a Process Model for Hash Functions in Digital Forensics.
In: Digital Forensics & Cyber Crime (ICDF2C 2013), 5th ICST International Conference, September 26–27, 2013, Moscow, Russia, Springer, Moscow, Russia, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 132, ISBN 978-3-319-14288-3 (print) and 978-3-319-14289-0 (e-book),
DOI: 10.1007/978-3-319-14289-0_12,
[Conference or Workshop Item]

Schehlmann, Lisa and Baier, Harald (2013):
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
In: INFORMATIK 2013: 43. Jahrestagung der Gesellschaft für Informatik, Darmstadt, [Conference or Workshop Item]

Buchmann, Nicolas and Peeters, Roel and Baier, Harald and Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, In: 1, [Conference or Workshop Item]

Breitinger, Frank and Stivaktakis, Georgios and Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13, [Article]

Breitinger, Frank and Astebøl, Knut Petter and Baier, Harald and Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]

Steinberger, Jessica and Schehlmann, Lisa and Abt, Sebastian and Baier, Harald
Doyen, Guillaume and Waldburger, Martin and Čeleda, Pavel and Sperotto, Anna and Stiller, Burkhard (eds.) (2013):
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet, Springer Berlin Heidelberg, pp. 49-60, DOI: 10.1007/978-3-642-38998-6_7,
[Book Section]

Steinberger, Jessica and Baier, Harald
Horster, Patrick (ed.) (2013):
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013, pp. 313-323, [Book Section]

Rathgeb, Christian and Breitinger, Frank and Busch, Christoph and Baier, Harald (2013):
On the Application of Bloom Filters to Iris Biometrics.
In: IET Biometrics, [Article]

Buchmann, Nicolas and Baier, Harald (2013):
Towards a more secure and scalable verifying PKI of eMRTD.
In: EuroPKI 2013, [Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4, [Article]

Roos, Björn and Baier, Harald (2012):
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
In: DACH Security 2012, ISBN 978-3-00-039221-4,
[Conference or Workshop Item]

Knauer, Julian and Baier, Harald (2012):
Zur Sicherheit von ATA-Festplattenpasswörtern.
In: DACH Security 2012, [Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA), [Article]

Breitinger, Frank and Baier, Harald and Beckingham, Jesse (2012):
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo), [Article]

Baier, Harald and Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), ISBN 978-1-84102-316-8,
[Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL), pp. 89-101, [Article]

Baier, Harald and Dichtelmüller, Christian (2012):
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
In: DACH Security 2012, [Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2011):
Performance Issues about Context-Triggered Piecewise Hashing.
In: 3rd International ICST Conference on Digital Forensics & Cyber Crime, Dublin, [Conference or Workshop Item]

Nazar, Assem and Seeger, Mark and Baier, Harald (2011):
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
In: 16th Nordic Conference in Secure IT Systems (NordSec 2011), Springer-Verlag, Tallinn, Estonia, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Baier, Harald and Brand, Achim and Dichtelmüller, Christian and Roos, Björn (2011):
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
In: DACH Security 2011, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Baier, Harald and Breitinger, Frank (2011):
Security Aspects of Piecewise Hashing in Computer Forensics.
In: 6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011), [Conference or Workshop Item]

Baier, Harald and Busch, Christoph
Hochschule Darmstadt (3094) (Corporate Creator) (2010):
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung, [Book Section]

Riedmüller, Reinhard and Seeger, Mark and Wolthusen, Stephen and Baier, Harald and Busch, Christoph (2010):
Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection.
In: 2nd International Workshop on Security and Communication Networks (IWSCN 2010), [Conference or Workshop Item]

Seeger, Mark and Wolthusen, Stephen and Busch, Christoph and Baier, Harald (2010):
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
In: 9th Information Security South Africa (ISSA 2010), [Conference or Workshop Item]

Kemetmüller, Christoph and Seeger, Mark and Baier, Harald and Busch, Christoph (2010):
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
In: Eighth International Network Conference (INC 2010), [Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
In: Tagungsband Informatik 2009, LNI, [Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009, LNI, [Conference or Workshop Item]

Baier, Harald and Karatsiolis, Vangelis (2009):
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI, Springer, [Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2005):
Awareness by Doing. Ein neues Konzept zur Sensibilisierung von {IT}-Anwendern.
[Other]

Straub, Tobias and Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
(TI-5/04), [Report]

Straub, Tobias and Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of {PKI}-enabled Applications.
In: EUROPKI 2004, Springer, 3093, [Conference or Workshop Item]

Baier, Harald and Ruppert, Markus (2004):
Interoperable and Flexible Digital Signatures for {E-Government} and {E-Commerce}.
(TI-6/04), [Report]

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
Aus- und Weiterbildung in IT-Sicherheit.
Ingelheim, SecuMedia Verl., In: IT-Sicherheit im verteilten Chaos : Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003 / Bundesamt für Sicherheit in der Informationstechnik.- Ingelheim : SecuMedia Verl., 2003.- 531 S.- ISBN 3-922746-49-7.- S. 179-190, [Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
{Aus-} und Weiterbildung in {IT}-Sicherheit.
(TI-2/03), [Report]

Baier, Harald (2003):
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
(TI-7/03), [Report]

Baier, Harald and Köhler, Günter (2003):
How to Compute the Coefficients of the Elliptic Modular Function {j(z)}.
(TI-4/03), [Report]

Baier, Harald (2002):
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-2116],
[Ph.D. Thesis]

Baier, Harald (2002):
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Baier, Harald (2002):
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universität Darmstadt, [Ph.D. Thesis]

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
In: INDOCRYPT 2001 - Second International Conference on Cryptology in India, Springer, Chennai, India, In: LNCS, ISBN 3-540-43010-5,
[Conference or Workshop Item]

Baier, Harald (2001):
Efficient computation of Fourier series and singular moduli with application in cryptography.
Darmstadt, Techn. Univ., FB Informatik, No.TI-, [Book]

Baier, Harald (2001):
Efficient computation of singular moduli with application in cryptography.
Berlin [u.a.], Springer, In: Fundamentals of computation theory: Proceedings of the 13th International Symposium FCT 2001 <13, 2001, Riga, Latvia>. - Berlin [u.a.]: Springer, 2001 (Lecture notes in computer science; 2138). S. 71-82, [Conference or Workshop Item]

Baier, Harald (2001):
Elliptic curves of prime order over optimal extension fields for use in cryptography.
Berlin [u.a.], Springer, In: Progress in cryptology: Indocrypt 2001: Proceedings of the 2nd International Conference on Cryptology in India, Chennai 2001. - Berlin [u.a.]: Springer, 2001 (Lecture notes in computer science; 2247). S. 99-107, [Conference or Workshop Item]

Baier, Harald (2001):
Efficient Computation of Fourier Series and Singular Moduli with Application in Cryptography.
(TI-7/01), [Report]

Baier, Harald and Buchmann, Johannes (2001):
Efficient Construction of Cryptographically Strong Elliptic Curves.
(TI-2/01), [Report]

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
(TI-11/01), [Report]

Baier, Harald and Buchmann, Johannes (2000):
Efficient Construction of Cryptographically Strong Elliptic Curves.
In: INDOCRYPT 2000 - First International Conference in Cryptology in India, Springer, Calcutta, India, In: LNCS, ISBN 3-540-41452-5,
[Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes (2000):
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202, Berlin, Heidelberg (u.a.), Springer, [Book Section]

This list was generated on Sat Jul 20 00:32:54 2019 CEST.