TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 59.

Baier, Harald (2015)
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
In: it - Information Technology, 6
doi: 10.1515/itit-2015-0023
Article

Buchmann, Nicolas ; Baier, Harald (2015)
Elektronische Identifizierung und vertrauenswürdige Dienste.
Conference or Workshop Item

Steinberger, Jessica ; Sperotto, Anna ; Pras, Aiko ; Baier, Harald (2015)
Real-time DDoS Defense: A collaborative Approach at Internet Scale.
Article

Steinberger, Jessica ; Sperotto, Anna ; Pras, Aiko ; Baier, Harald (2015)
Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale.
Conference or Workshop Item

Steinberger, Jessica ; Sperotto, Anna ; Baier, Harald ; Pras, Aiko (2015)
Collaborative Attack Mitigation and Response: A Survey.
Ottawa (Canada)
Conference or Workshop Item

Steinberger, Jessica ; Sperotto, Anna ; Golling, Mario ; Baier, Harald ; Pras, Aiko (2015)
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
Article

Ossenbühl, Sven ; Steinberger, Jessica ; Baier, Harald (2015)
Towards automated incident handling: How to select an appropriate response against a network-based attack?
Magdeburg (Germany)
Conference or Workshop Item

Schehlmann, Lisa ; Abt, Sebastian ; Baier, Harald (2014)
Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking.
Conference or Workshop Item

Buchmann, Nicolas ; Baier, Harald (2014)
Towards a more secure and scalable verifying PKI of eMRTD.
In: Journal of Computer Security, 22 (6)
Article

Buchmann, Nicolas ; Rathgeb, Christian ; Baier, Harald ; Busch, Christoph (2014)
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14)
Article

Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
eds.: Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (2014)
Towards a Process Model for Hash Functions in Digital Forensics.
Moscow, Russia
doi: 10.1007/978-3-319-14289-0_12
Conference or Workshop Item

Schehlmann, Lisa ; Baier, Harald (2013)
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
Darmstadt
Conference or Workshop Item

Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013)
Security considerations on extending PACE to a biometric-based connection establishment.
Conference or Workshop Item

Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article

Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article

Steinberger, Jessica ; Schehlmann, Lisa ; Abt, Sebastian ; Baier, Harald
eds.: Doyen, Guillaume ; Waldburger, Martin ; Čeleda, Pavel ; Sperotto, Anna ; Stiller, Burkhard (2013)
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet
doi: 10.1007/978-3-642-38998-6_7
Book Section

Steinberger, Jessica ; Baier, Harald
ed.: Horster, Patrick (2013)
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013
Book Section

Rathgeb, Christian ; Breitinger, Frank ; Busch, Christoph ; Baier, Harald (2013)
On the Application of Bloom Filters to Iris Biometrics.
In: IET Biometrics
Article

Buchmann, Nicolas ; Baier, Harald (2013)
Towards a more secure and scalable verifying PKI of eMRTD.
Conference or Workshop Item

Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article

Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article

Roos, Björn ; Baier, Harald (2012)
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
Conference or Workshop Item

Knauer, Julian ; Baier, Harald (2012)
Zur Sicherheit von ATA-Festplattenpasswörtern.
Conference or Workshop Item

Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article

Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article

Baier, Harald ; Brand, Achim (2012)
On the Investigation of Application Specific Data within Digital Forensics.
Conference or Workshop Item

Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article

Baier, Harald ; Dichtelmüller, Christian (2012)
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
Conference or Workshop Item

Breitinger, Frank ; Baier, Harald (2011)
Performance Issues about Context-Triggered Piecewise Hashing.
Dublin
Conference or Workshop Item

Nazar, Assem ; Seeger, Mark ; Baier, Harald (2011)
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
Tallinn, Estonia
Conference or Workshop Item

Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011)
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
Conference or Workshop Item

Baier, Harald ; Breitinger, Frank (2011)
Security Aspects of Piecewise Hashing in Computer Forensics.
Conference or Workshop Item

Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section

Riedmüller, Reinhard ; Seeger, Mark ; Wolthusen, Stephen ; Baier, Harald ; Busch, Christoph (2010)
Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection.
Conference or Workshop Item

Seeger, Mark ; Wolthusen, Stephen ; Busch, Christoph ; Baier, Harald (2010)
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Conference or Workshop Item

Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph (2010)
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
Conference or Workshop Item

Baier, Harald ; Straub, Tobias (2009)
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Conference or Workshop Item

Baier, Harald ; Straub, Tobias (2009)
A Note on the Protection Level of Biometric Data in Electronic Passports.
Conference or Workshop Item

Baier, Harald ; Karatsiolis, Vangelis (2009)
Validity Models of Electronic Signatures and their Enforcement in Practice.
Conference or Workshop Item

Baier, Harald ; Straub, Tobias (2005)
Awareness by Doing. Ein neues Konzept zur Sensibilisierung von {IT}-Anwendern.
Other

Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
Report

Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the Usability and the Utility of {PKI}-enabled Applications.
Conference or Workshop Item

Baier, Harald ; Ruppert, Markus (2004)
Interoperable and Flexible Digital Signatures for {E-Government} and {E-Commerce}.
Report

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
Aus- und Weiterbildung in IT-Sicherheit.
Conference or Workshop Item

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
{Aus-} und Weiterbildung in {IT}-Sicherheit.
Report

Baier, Harald (2003)
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
Report

Baier, Harald ; Köhler, Günter (2003)
How to Compute the Coefficients of the Elliptic Modular Function {j(z)}.
Report

Baier, Harald (2002)
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
TU Darmstadt
Ph.D. Thesis, Primary publication

Baier, Harald (2002)
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography.
TU Darmstadt
Ph.D. Thesis

Baier, Harald (2002)
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis

Baier, Harald (2001)
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Chennai, India
Conference or Workshop Item

Baier, Harald (2001)
Efficient computation of Fourier series and singular moduli with application in cryptography.
Book

Baier, Harald (2001)
Efficient computation of singular moduli with application in cryptography.
Conference or Workshop Item

Baier, Harald (2001)
Elliptic curves of prime order over optimal extension fields for use in cryptography.
Conference or Workshop Item

Baier, Harald (2001)
Efficient Computation of Fourier Series and Singular Moduli with Application in Cryptography.
Report

Baier, Harald ; Buchmann, Johannes (2001)
Efficient Construction of Cryptographically Strong Elliptic Curves.
Report

Baier, Harald (2001)
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Report

Baier, Harald ; Buchmann, Johannes (2000)
Efficient Construction of Cryptographically Strong Elliptic Curves.
Calcutta, India
Conference or Workshop Item

Baier, Harald ; Buchmann, Johannes (2000)
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202
Book Section

This list was generated on Thu Sep 21 20:13:37 2023 CEST.