TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 68.

Alkassar, Ammar and Heuser, Stephan and Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Dmitrienko, Alexandra and Gessner, Dennis and Sadeghi, Ahmad-Reza and Schulz, Steffen and Stüble, Christian and Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-298, 5, [Article]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-294, 34, (5), [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Cabuk, Serdar and Dalton, Chris and Eriksson, Konrad and Kuhlmann, Dirk and Ramasamy, Hari Govind and Ramunno, Gianluca and Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, pp. 89-121, 18, (1), [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Zhan, Jing and Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, In: LNCS, 5471, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Husseiki, Rani and Gasmi, Yacine and Stewin, Patrick and Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: Information Security, 11th International Conference (ISC 2008), In: LNCS, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Osterhues, André and Wolf, Marko and Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wolf, Christopher and Stüble, Christian and Asokan, N. and Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: 10th International Conference on Information Security (ISC 2007), Springer Verlag, Valparaíso, Chile, In: LNCS, 4779, [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Ramasamy, Hari Govind and Schulz, Stefan and Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Springer Verlag, Hong Kong, China, In: LNCS, 4610, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Selhorst, Marcel and Stüble, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian and Wachsmann, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Wolf, Marko and Scheibel, Michael (2006):
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Chen, Liquen and Landfermann, Rainer and Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06), [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Alkassar, Ammar and Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), Antwerpen, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Multilaterally Secure Computing Platforms - in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, Tokyo, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Kühn, Ulrich and Kursawe, Klaus and Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer Verlag, In: LNCS, 3659, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar and Stüble, Christian and Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, pp. 83-95, 10, (2), [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, pp. 83-95, 10, (2), [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin
Lemke, Kerstin and Wolf, Marko and Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
Springer Verlag, In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin
Lemke, Kerstin and Wolf, Marko and Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza and Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), pp. 548-554, 9, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW), White Point Beach Resort, Nova Scotia, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Altmeyer, Oliver and Selhorst, Marcel
Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361, [Book Section]

Altmeyer, Oliver and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian
Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361, [Book Section]

Sadeghi, Ahmad-Reza and Günnewig, Dirk and Rannenberg, Kai and Stüble, Christian
Koenig, Christian and Neu­mann, An­dre­as and Katz­sch­mann, To­bi­as (eds.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, [Book Section]

Stüble, Christian and Himmelein, Gerald (2003):
Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15, [Article]

Alkassar, Ammar and Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference, Boston, USA, [Conference or Workshop Item]

Stüble, Christian and Kursawe, Klaus (2003):
Improving End-user Security and Trustworthiness of TCG Platforms.
In: 33. GI-Fachtagung, Frankfurt, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Taming "Trusted Computing" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03), Springer-Verlag, Cheju Island, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar and Stüble, Christian (2003):
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop, Ascona, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Schneider, Markus and Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Schneider, Markus and Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD), Vieweg Verlag, pp. 556-560, [Book Section]

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Stüble, Christian and Lange, Steffen and Nonnengart, Andreas and Vogt, Roland (2002):
Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC).
In: 3rd International Common Criteria Conference, Ottawa, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alkassar, Ammar and Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference, [Conference or Workshop Item]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01, [Conference or Workshop Item]

Stüble, Christian and Pfitzmann, Birgit and Riordan, James and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, Vieweg Verlag, pp. 1-18, [Book Section]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Stüble, Christian and Pfitzmann, Birgit (2001):
PERSEUS: A Quick Open-source Path to Secure Signatures.
In: 2nd Workshop on Microkernel-based Systems, Banff, Canada, [Conference or Workshop Item]

Stüble, Christian and Weber, Arnd (2000):
From Security Instruments to Secure End-User Systems.
In: World Markets Series - Wireless Technology 2000, pp. 207-209, [Article]

Stüble, Christian (1999):
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge, Vieweg Verlag, pp. 272-284, [Book Section]

This list was generated on Sat Oct 12 00:34:37 2019 CEST.