Browse by Person
![]() | Up a level |
Baier, Harald (2015)
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
In: it - Information Technology, 6
doi: 10.1515/itit-2015-0023
Article
Buchmann, Nicolas ; Baier, Harald (2015)
Elektronische Identifizierung und vertrauenswürdige Dienste.
Conference or Workshop Item
Steinberger, Jessica ; Sperotto, Anna ; Pras, Aiko ; Baier, Harald (2015)
Real-time DDoS Defense: A collaborative Approach at Internet Scale.
Article
Steinberger, Jessica ; Sperotto, Anna ; Pras, Aiko ; Baier, Harald (2015)
Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale.
Conference or Workshop Item
Steinberger, Jessica ; Sperotto, Anna ; Baier, Harald ; Pras, Aiko (2015)
Collaborative Attack Mitigation and Response: A Survey.
Ottawa (Canada)
Conference or Workshop Item
Steinberger, Jessica ; Sperotto, Anna ; Golling, Mario ; Baier, Harald ; Pras, Aiko (2015)
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
Article
Ossenbühl, Sven ; Steinberger, Jessica ; Baier, Harald (2015)
Towards automated incident handling: How to select an appropriate response against a network-based attack?
Magdeburg (Germany)
Conference or Workshop Item
Schehlmann, Lisa ; Abt, Sebastian ; Baier, Harald (2014)
Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking.
Conference or Workshop Item
Buchmann, Nicolas ; Baier, Harald (2014)
Towards a more secure and scalable verifying PKI of eMRTD.
In: Journal of Computer Security, 22 (6)
Article
Buchmann, Nicolas ; Rathgeb, Christian ; Baier, Harald ; Busch, Christoph (2014)
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14)
Article
Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
eds.: Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (2014)
Towards a Process Model for Hash Functions in Digital Forensics.
Moscow, Russia
doi: 10.1007/978-3-319-14289-0_12
Conference or Workshop Item
Schehlmann, Lisa ; Baier, Harald (2013)
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
Darmstadt
Conference or Workshop Item
Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013)
Security considerations on extending PACE to a biometric-based connection establishment.
Conference or Workshop Item
Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article
Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article
Steinberger, Jessica ; Schehlmann, Lisa ; Abt, Sebastian ; Baier, Harald
eds.: Doyen, Guillaume ; Waldburger, Martin ; Čeleda, Pavel ; Sperotto, Anna ; Stiller, Burkhard (2013)
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet
doi: 10.1007/978-3-642-38998-6_7
Book Section
Steinberger, Jessica ; Baier, Harald
ed.: Horster, Patrick (2013)
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013
Book Section
Rathgeb, Christian ; Breitinger, Frank ; Busch, Christoph ; Baier, Harald (2013)
On the Application of Bloom Filters to Iris Biometrics.
In: IET Biometrics
Article
Buchmann, Nicolas ; Baier, Harald (2013)
Towards a more secure and scalable verifying PKI of eMRTD.
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article
Roos, Björn ; Baier, Harald (2012)
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
Conference or Workshop Item
Knauer, Julian ; Baier, Harald (2012)
Zur Sicherheit von ATA-Festplattenpasswörtern.
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article
Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article
Baier, Harald ; Brand, Achim (2012)
On the Investigation of Application Specific Data within Digital Forensics.
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article
Baier, Harald ; Dichtelmüller, Christian (2012)
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2011)
Performance Issues about Context-Triggered Piecewise Hashing.
Dublin
Conference or Workshop Item
Nazar, Assem ; Seeger, Mark ; Baier, Harald (2011)
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
Tallinn, Estonia
Conference or Workshop Item
Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011)
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
Conference or Workshop Item
Baier, Harald ; Breitinger, Frank (2011)
Security Aspects of Piecewise Hashing in Computer Forensics.
Conference or Workshop Item
Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section
Riedmüller, Reinhard ; Seeger, Mark ; Wolthusen, Stephen ; Baier, Harald ; Busch, Christoph (2010)
Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection.
Conference or Workshop Item
Seeger, Mark ; Wolthusen, Stephen ; Busch, Christoph ; Baier, Harald (2010)
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Conference or Workshop Item
Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph (2010)
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
Conference or Workshop Item
Baier, Harald ; Straub, Tobias (2009)
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Conference or Workshop Item
Baier, Harald ; Straub, Tobias (2009)
A Note on the Protection Level of Biometric Data in Electronic Passports.
Conference or Workshop Item
Baier, Harald ; Karatsiolis, Vangelis (2009)
Validity Models of Electronic Signatures and their Enforcement in Practice.
Conference or Workshop Item
Baier, Harald ; Straub, Tobias (2005)
Awareness by Doing. Ein neues Konzept
zur Sensibilisierung von {IT}-Anwendern.
Other
Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the
Usability and the Utility of PKI-enabled Applications.
Report
Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the
Usability and the Utility of {PKI}-enabled Applications.
Conference or Workshop Item
Baier, Harald ; Ruppert, Markus (2004)
Interoperable and Flexible Digital
Signatures for {E-Government} and {E-Commerce}.
Report
Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
Aus- und Weiterbildung in IT-Sicherheit.
Conference or Workshop Item
Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
{Aus-} und Weiterbildung in
{IT}-Sicherheit.
Report
Baier, Harald (2003)
A Fast {Java} Implementation of a
Provably Secure Pseudo Random Bit Generator Based on the Elliptic
Curve Discrete Logarithm Problem.
Report
Baier, Harald ; Köhler, Günter (2003)
How to Compute the Coefficients of the
Elliptic Modular Function {j(z)}.
Report
Baier, Harald (2002)
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
TU Darmstadt
Ph.D. Thesis, Primary publication
Baier, Harald (2002)
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography.
TU Darmstadt
Ph.D. Thesis
Baier, Harald (2002)
Efficient Algorithms for Generating
Elliptic Curves over Finite Fields Suitable for Use in
Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis
Baier, Harald (2001)
Elliptic Curves of Prime Order over
Optimal Extension Fields for Use in Cryptography.
Chennai, India
Conference or Workshop Item
Baier, Harald (2001)
Efficient computation of Fourier series and singular moduli with application in cryptography.
Book
Baier, Harald (2001)
Efficient computation of singular moduli with application in cryptography.
Conference or Workshop Item
Baier, Harald (2001)
Elliptic curves of prime order over optimal extension fields for use in cryptography.
Conference or Workshop Item
Baier, Harald (2001)
Efficient Computation of Fourier
Series and Singular Moduli with Application in Cryptography.
Report
Baier, Harald ; Buchmann, Johannes (2001)
Efficient Construction of
Cryptographically Strong Elliptic Curves.
Report
Baier, Harald (2001)
Elliptic Curves of Prime Order over
Optimal Extension Fields for Use in Cryptography.
Report
Baier, Harald ; Buchmann, Johannes (2000)
Efficient Construction of
Cryptographically Strong Elliptic Curves.
Calcutta, India
Conference or Workshop Item
Baier, Harald ; Buchmann, Johannes (2000)
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202
Book Section