TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 68.

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1), pp. 89-121. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09,
[Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS, 4779, In: 10th International Conference on Information Security (ISC 2007), pp. 53-70,
Springer Verlag, Valparaíso, Chile, [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127,
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS, 4610, In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), pp. 372-384,
Springer Verlag, Hong Kong, China, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), pp. 47-56,
ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
pp. 47-56, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006):
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06),
[Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06),
[Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06),
Antwerpen, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005),
Cologne, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society,
Tokyo, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 324-338,
Springer Verlag, [Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
pp. 51-67, Springer Verlag, Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., pp. 51-67,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC),
Tucson, Arizona, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9, pp. 548-554. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW),
White Point Beach Resort, Nova Scotia, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, [Book Section]

Stüble, Christian ; Himmelein, Gerald (2003):
Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15, [Article]

Alkassar, Ammar ; Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference,
Boston, USA, [Conference or Workshop Item]

Stüble, Christian ; Kursawe, Klaus (2003):
Improving End-user Security and Trustworthiness of TCG Platforms.
In: 33. GI-Fachtagung,
Frankfurt, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Taming "Trusted Computing" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03),
Springer-Verlag, Cheju Island, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003):
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop,
Ascona, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Stüble, Christian ; Lange, Steffen ; Nonnengart, Andreas ; Vogt, Roland (2002):
Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC).
In: 3rd International Common Criteria Conference,
Ottawa, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alkassar, Ammar ; Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01,
[Conference or Workshop Item]

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, pp. 1-18, Vieweg Verlag, [Book Section]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Stüble, Christian ; Pfitzmann, Birgit (2001):
PERSEUS: A Quick Open-source Path to Secure Signatures.
In: 2nd Workshop on Microkernel-based Systems,
Banff, Canada, [Conference or Workshop Item]

Stüble, Christian ; Weber, Arnd (2000):
From Security Instruments to Secure End-User Systems.
In: World Markets Series - Wireless Technology 2000, pp. 207-209. [Article]

Stüble, Christian (1999):
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge, pp. 272-284, Vieweg Verlag, [Book Section]

This list was generated on Tue Jul 27 02:26:41 2021 CEST.