..
Suche
Hinweise zum Einsatz der Google Suche
Personensuchezur unisono Personensuche
Veranstaltungssuchezur unisono Veranstaltungssuche
Katalog plus

Univ.-Prof. Dr. rer. nat. Christoph Ruland


Univ.-Prof. Dr. rer. nat. Karl Christoph Ruland

christoph.ruland@uni-siegen.de
S/MIME Zertifikat / Mein PGP-Key

Lehrstuhl für Nachrichtentechnik, insbesondere Nachrichtenübermittlungstechnik

Leiter des Lehrstuhls für Digitale Kommunikationssysteme 

„Kommissarischer Leiter des Lehrstuhls Communications Engineering & Security“ 

 
Telefon
+49 (0) 271/ 740 - 2522
Telefax
+49 (0) 271/ 740 - 2536
Raum
H-E 211
Sekretariat

Sabine Leukel 
Raum H-E 205
Tel.: +49 (0) 271/ 740 - 2521
Mail: sabine.leukel@uni-siegen.de 

.

Sonstiges

Beruflicher Werdegang

1970 - 1973
Funkoffizier bei der Handelsschifffahrt (zeitweise)
1970 - 1974
Mathematik-/ Physik-/ Informatik-Studium an der Universität Bonn
1974 Diplom in Mathematik
1974 - 1976
wissenschaftlicher Mitarbeiter an der mathematischen Fakultät der Universität Bonn
1976 Promotion zum Dr. rer. nat. mit einer Dissertation aus dem numerischen Bereich der Partiellen Differentialgleichungen
1976 - 1978
AEG - Telefunken, Konstanz, Geschäftsbereich Prozessrechner
1979 Tandem Computer, Hamburg
1980 - 1982
AEG - Telefunken, Konstanz, Geschäftsbereich Informatik
1982 - 1992
Professor für Datennetze und Datenfernübertragung, Fachhochschule Aachen
1988 Gründung der KryptoKom Gesellschaft für kryptographische Informationssicherheit und Kommunikationstechnologie mbH, Aachen
1988 - 1998
Geschäftsführer der KryptoKom, Aachen
seit 1.9.1992
Universitätsprofessor für Nachrichtentechnik mit Schwerpunkt Nachrichtenübermittlungstechnik an der Universität Siegen, Naturwissenschaftlich-Technische Fakultät, Department Elektrotechnik und Informatik

Publikationsliste

 

Patente

Patente und Zusammenfassungen der Patentfamilien von Professor Ruland [Link]

Bücher

  • Ein Verfahren zur Berechnung der Lösung des Dirichlet ́schen Außenraumproblems zur Helmholtz ́schen Schwingungsgleichung bei stückweise glatten Rändern (Dissertation), Bonner Mathematische Schriften Nr. 88, 1976.
  • Datenschutz in Kommunikations-Systemen datacom Verlag, Pulheim 1987, ISBN 978-3-8923-8004-7. [Link]
  • Informationssicherheit in Datennetzen datacom Verlag, Bergheim 1993, ISBN 978-3-8923-8081-8. [Link]
  • Wissenschaftliches Kommunikations- und Sicherheitskolloquium 2009 Universität Siegen, Forschungsberichte des Instituts für Digitale Kommunikationssysteme, Band 25, Shaker-Verlag, ISBN 978-3-8322-8143-4. [Link]
  • Herausgeber der Forschungsberichte des Instituts für Digitale Kommunikationssysteme der Universität Siegen, Band 1 - 28, Shaker (27 Dissertationen + Band 25, s.o.).
  • 8th International ITG Conference on Source and Channel Coding (SCC ́10), January 18 – 21, 2010 in Siegen/Germany, ITG Fachbericht 219, Editors: Rudolf Mathar/Christoph Ruland. [Link]

Buchbeiträge

  • C. Ruland, J. Sassmannshausen, Non-repudiation Services for the MMS Protocol of IEC 61850, Security Standardisation Research, L. Chen and S. Matsuo (Eds.), vol. 9497, LNCS, pp. 70-85, Springer International Publishing, Switzerland, Dec 2015. [Link]
  • J. Shin and C. Ruland: Perceptual Image Hashing Technique for Image Authentication in WMSNs, N. Zivic (Ed.): Robust Image Authentication in the Presence of Noise, pp. 75-104, Springer, New York, 2015, ISBN: 978-3-319-13156-6. [Link]
  • R. Fay and C. Ruland: Robustness of Biometrics by Image Processing Technology, N. Zivic (Ed.): Robust Image Authentication in the Presence of Noise, pp. 155-187, Springer, New York, 2015, ISBN: 978-3-319-13156-6. [Link]
  • C. Ruland: Secure Online Metering for a Liberalized Energy Market, in: Secure eGovernment Web Services, Chapter VI, Idea Group Publication, Hershey, PA, USA, Juli 2006, p. 97-110, ISBN: 1-59904-138-3. [Link]
  • N. Oikonomidis, S. Tcaciuc, C. Ruland: Deployment of E-Government Municipal Services: Enforcement of Security Polices, in: Secure eGovernment Web Services, Chapter VII, Idea Group Publication, Hershey, PA, USA, Juli 2006. [Link]
  • O. Jung, C. Ruland: Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks, C. K. Koc and C. Paar (Eds.): Cryptographic Hardware and Embedded Systems, LNCS 1717, Springer-Verlag Berlin, pp. 340-352, 1999. [Link]
  • O. Jung, S. Kuhn, C. Ruland, Kai Wollenweber: Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS, V. Varadharajan and Y. Mu (Eds.): Information Security and Privacy, LNCS 2119, pp. 344-359, 2001. [Link]
  • N. Oikonomidis, S. Tcaciuc, C. Ruland: An Architecture for Secure Policy Enforcement in E-Government Services Deployment, J. Dittmann, S. Katzenbeisser, and A. Uhl (Eds.): Communications and Multimedia Security, LNCS 3677, pp. 284-285. [Link]
  • K. Hong, S. Jung, L. L. Iacono, Christoph Ruland: Impacts of Security Protocols on Real-Time Multimedia Communications, C. H. Lim and M. Yung (Eds): Information Security Applications, LNCS 3325, pp. 1-13, 2004. [Link]

Schriften

2022

  • Catovic, E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland: AIR POLLUTION PREDICTION AND WARNING SYSTEM USING IOT AND MACHINE LEARNING, 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 16-18 November 2022, Maldives, Maldives, Publisher: IEEE - DOI: 10.1109/ICECCME55909.2022.9987957 
  • E. Kadusic, N. Hadzajlic, C. Ruland, N. Zivic: THE FACTORS FOR CHOOSING AMONG NB-IOT, LORAWAN, AND SIGFOX RADIO COMMUNICATION TECHNOLOGIES FOR IOT NETWORKING, 2022 International Conference on Connected Systems & Intelligence (CSI), 31 August 2022 - 02 September 2022, Trivandrum, India, Publisher: IEEE - DOI: 10.1109/CSI54720.2022.9923999 
  • E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland: THE TRANSITIONAL PHASE OF BOOST.ASIO AND POCO C++ NETWORKING LIBRARIES TOWARDS IPV6 AND IOT NETWORKING SECURITY, 2022 IEEE International Conference on Smart Internet of Things (SmartIoT), 19-21 August 2022, Suzhou, China, Publisher: IEEE - DOI: 10.1109/SmartIoT55134.2022.00022 
  • E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland: A SMART PARKING SOLUTION BY INTEGRATING NB-IOT RADIO COMMUNICATION TECHNOLOGY INTO THE CORE IOT PLATFORM, Future Internet 2022, 14(8), 219; https://doi.org/10.3390/fi14080219, Published: 25 July 2022.

2020

  • C. Ruland (Hrsg): Jochen Saßmannshausen: Attribute-based access control for smart grids and industrial automation and control systems. In: Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme Band 40. Düren: Shaker Verlag, 2020. -  ISBN 978-3-8440-7507-6

2019

  • E. Kadusic, N. Zivic, A. Masovic, C. Ruland: “Implementation of MQTT Native Application for Tizen-based Smartwatches”, 6th Annual Conference on Computational Science and Computational Intelligence, December 5-7, Las Vegas, Nevada, USA
  • A. Tellabi, M. Parekh, C. Ruland, M. Ezziyyani , “A case study of virtualization used in Mixed Criticality Systems,” Advanced Intelligent Systems for Sustainable Development (AI2SD), Marrakech, Morocco, 2019
  • J. Fehmi, A. Tellabi, S. AbdelBast, C. Ruland, “On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization,” International Conference on Cybersecurity (ICOCSec), Malaysia, 2019
  • A. Tellabi, C. Ruland, K. Waedt, A. Sabri, “Self-Diagnostics and Isolation mechanisms for Mixed Criticality Systems,”. In Journal of Communications Software and Systems (JCOMSS), 2019. DOI: http://dx.doi.org/10.24138/jcomss.v15i4.810
  • A. Tellabi, C. Ruland, "Empirical Study of Real-Time Hypervisors for Industrial Systems," 2019 International Conference on Computational Science and Computational Intelligence (CSCI), 2019, pp. 208-213, doi: 10.1109/CSCI49370.2019.00042
  • N. Zivic, C. Ruland and O. Ur-Rehman, "Addressing Byzantine Fault Tolerance in Blockchain Technology," 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), Manama, Bahrain, 2019, pp. 1-5 [Link].
  • N. Zivic, C. Ruland, J. Sassmannshausen: Distributed Ledger Technologies for M2M Communications, The 33rd International Conference on  Information Networking (ICOIN 2019) January 9-11, 2019, Kuala Lumpur, Malaysia [Link].
  • O. Ur-Rehman, N. Zivic, C. Ruland: An Overview of Automotive Security Standards, Mipro 2019, 20-24 May 2019, Opatija, Croatia [Link].
  • C. Ruland: Protect and Conserve Robot's Transactions, Invited Talk on the 4th World Congress of Robotics 2019 (WCR-2019), Aug. 31-Sep. 1, Shenyang, China
  • C. Ruland, J. Sassmannshausen: System-wide Traceability of Commands and Data Exchange in Smart Grids, SEST'19 - 2nd International Conference on Smart Energy Systems and Technologies, September 9-11, Porto, Portugal (paper accepted).

2018

  • A. Tellabi, I. Ben Zid, C. Ruland, K. Waedt , “Virtualization on Secure Platforms for Industrial Applications Current use cases and future perspectives, ”. In: 12th International Conference on Reliability Maintainability and Safety (ICRMS), 2018
  • A. Tellabi, L. Peters, C. Ruland, K. Waedt, “Security Aspects of Hardware Virtualization Technologies for Industrial Automation and Control Systems,” GIACM Workshop on I4.0/IACS Standardization, Berlin, 2018
  • C. Ruland, J. Sassmannshausen, Jyoti Pragyan Satpathy "An Attribute Certificate Management System for Attribute-based Access Control" 5th Annual Conf. on Computational Science & Computational Intelligence (CSCI'18), Las Vegas, Dec 13-15, 2018 [Link].
  • C. Ruland, J. Sassmannshausen "Access Control in Safety Critical Environments" 12th International Conference on Reliability, Maintainability and Safety (ICRMS2018), Shanghai, China, Oct 15-17, 2018 [Link].
  • C. Ruland, J. Sassmannshausen, "Firewall for Attribute-Based Access Control in Smart Grids," 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 2018, pp. 336-341. [Link]
  • Asmaa Tellabi, Jochen Sassmannshausen, Edita Bajramovic, and Karl Christoph Ruland. Overview of authentication and access controls for i&c systems. In 16th IEEE International Conference on Industrial Informatics, INDIN 2018, Porto, Portugal, July 18-20, 2018, pages 882–889, 2018. [Link]
  • N. Zivic and C. Ruland, "Cognitive Channel Decoding", Future of Information and Communication Conference (FICC 2018), Singapore, Apr. 2018.
  • N. Zivic and C. Ruland, "Cognition for Enhanced Biometric Authentication," The 32nd International Conference on Information Networking (ICOIN 2018), Chang Mai, Thailand, Jan. 2018.

2017

  • T. Wu and C. Ruland, "A redundancy based compressive sensing recovery optimization," 2017 40th International Conference on Telecommunications and Signal Processing (TSP), Barcelona, 2017, pp. 502-505.
  • R. A. Djeujo and C. Ruland, "QoSs definition and session description protocol for secure communication using compressive sensing," 6th International Conference on Future Generation Communication Technologies Conference (FGCT), Dublin, Ireland, Aug. 21-23, 2017, pp. 1-7.
  • R. A. Djeujo and C. Ruland, "Secret matrix lifecycle management for compressive sensing based cryptographic mechanisms," IEEE 3th Annual Conference in Computing, Communication, Control, And Automation Conference (ICC3A), Pune, India, Aug. 17-18, 2017, pp. 1-10.
  • C. Ruland and J. Sassmannshausen, "Transaction-based security for Smart Grids", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2017), Oshawa, Canada, Aug 14-17, 2017. [Link]
  • C. Ruland, J. Sassmannshausen, K.Waedt and N. Zivic, "Smart grid security - an overview of standards and guidelines", e & i Elektrotechnik und Informationstechnik, vol. 134, issue 1, pp. 19-25, Feb 2017, Springer Wien. [Link]
  • O. Ur Rehman, N. Živić and C. Ruland, "Approximate Image Authentication and Correction Using Spatial and Frequency Domain Features", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • R. Fay and C. Ruland, "Compressed Sampling and Authenticated-Encryption", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • N. Živić, O. Ur Rehman and C. Ruland, "Iterative Decoder for OFDM Transmission over Rayleigh Channel", 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, Jan. 11 - 13, 2017.
  • R. A. Djeujo and C. Ruland, “Embedding cryptographically secure matrix transformation in structured compressive sensing,” IEEE Annual Computing and Communication Workshop and Conference (CCWC 2017), pp. 529–535, Las Vegas, USA, Jan 9-11, 2017.

2016

  • G. Gala, T. Koller, D. G. Pérez, G. Fohler and C. Ruland, "Timing Analysis of Secure Communication between Resource Managers in DREAMS," Workshop on Security and Dependability of Critical Embedded Real-Time Systems, Porto, Portugal, Nov. 29, 2016. [Link]
  • C. Ruland, N. Kang and J. Sassmannshausen, "Rejuvenation of the IEC 61850 Protocol Stack for MMS", IEEE International Conference on Smart Grid Communications (SmartGridComm 2016), Sydney, Australia, Nov. 6-9, 2016. [Link]
  • R. A. Djeujo and C. Ruland, “Secure matrix generation for compressive sensing embedded cryptography,” IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON 2016), pp. 250–257, Vancouver, BC, Canada, Oct. 13-15, 2016. [Link]
  • T. Koller, G. Gala, D. G. Perez, C. Ruland, G. Fohler, "DREAMS: Secure Communication between Resource Management Components in Networked Multi-Core Systems", IEEE Conference on Open Systems 2016 (ICOS 2016), Langkawi, Malaysia, Oct. 10-12, 2016 (Best paper award). [Link]
  • N. Živić, O. Ur Rehman and C. Ruland, "Smart Metering for Intelligent Buildings", Transactions on Networks and Communications, vol. 4, no. 5, Oct. 2016. [Link]
  • M. Schneider and C. Ruland, "Verification of Time Signals", 30th European Frequency and Time Forum (EFTF), York, UK, Apr 4-7, 2016. [Link]
  • O. Ur Rehman, N. Zivic and C. Ruland, "Content based Image Authentication with Error Correction", IEEE International Conference on Communications (IEEE ICC'16), Communication and Information System Security Symposium, Kuala Lumpur, Malaysia, May 23-27, 2016. [Link]

2015

  • M. Schneider and C. Ruland, “Verification of time telegrams in Long Wave Radio systems", IEEE 2015 Joint Conference of the IEEE International Frequency Control Symposium & the European Frequency and Time Forum (IFCS-EFTF), Denver, Colorado, USA, pp. 270-275, Apr 12-16 2015. [Link]
  • A. E. Tabatabaei, O. Ur Rehman, N. Živić, and C. Ruland, “Secure and Robust Two-phase Image Authentication", IEEE Transactions on Multimedia, vol. 17, no. 7, pp. 945-956, Jul 2015. [Link]
  • O. Ur Rehman, A. E. Tabatabaei, N. Živić, and C. Ruland: "Spatial and Frequency Domain Complementary Watermarks for Image Authentication and Correction,” the 10th International ITG Conference on Systems, Communications and Coding (SCC 2015) , Hamburg, Germany, pp. 1-6, Feb 2-5, 2015. [Link]
  • O. Ur Rehman, N. Živić, and C. Ruland, "Security Issues in Smart Metering Systems", (Overall best paper and innovation award), IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa Canada, Aug 17-19, 2015. [Link]
  • J. Saßmannshausen and C. Ruland, "Nachweisbarkeit in Smart Grids auf Basis von XML-Signaturen", D.A.CH Security 2015, syssec  IT Security & IT Management, p. 98–109, Frechen, Germany, Sep 8-9, 2015.
  • J. Saßmannshausen and C. Ruland, "End-to-End-Authentication in Smart Grid Control", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19, 2015. [ Link]
  • N. Živić, O. Ur Rehman and C. Ruland, "Evolution of Smart Metering Systems", 23rd IEEE Telecommunications Forum (TELFOR 2015), Belgrade, Serbia, Nov 24-26, 2015. [Link]
  • J. Sassmannshausen, C. Ruland, "Non-repudiation Services for the MMS Protocol of IEC 61850", Security Standardization Research Conference (SSR 2015), Tokyo, Japan, Dec 15-16, 2015. [Link]

2014

  • A. Schantin and C. Ruland, “A Bit-Error Based Capture Model for EPCglobal RFID Systems,” in 52th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014, pp. 221–226. [Link]
  • J. Shin, D. Kim, and C. Ruland, "Content based Image Authentication using HOG feature descriptor," in IEEE International Conference on Image Processing, Paris, France, 27 - 30 Oct. 2014. [Link]
  • J. Shin, and C. Ruland, "A Novel Design of Content based Multimedia Security," in 9th Future Security Conference, Berlin, Germany, 16 - 18 Sep. 2014.
  • J. Shin, and C. Ruland, "A Hybrid Approach for Content Based Image Authentication," in 11th International Conference on Security and Cryptography (SECRYPT'14), Vienna, Austria, 28 - 30 Aug. 2014, pp. 371-378. [Link]
  • O. Ur Rehman, N. Živić, C. Ruland: "Security in Smart Metering Systems under the Smart-Grid Perspective", Tutorium, IEEE BlackSeaCom 2014, May 2014, Chisinau, Moldova

2013

  • S. Amir Hossein A. E. Tabatabaei, C. Ruland: "The analysis of an NMF-based perceptual image hashing scheme", IEEE International Symposium on Signal Processing and Information Technology, Athens, 2013, pp. 108-112. [Link]
  • A. Schantin and C. Ruland, “Retransmission Strategies for RFID Systems Using the EPC Protocol,” International Conference on RFID Technologies and Applications (RFID-TA), Johor Bahru, Malaysia, Sep. 4-5, 2013. [Link]
  • M. Schneider and C. Ruland, “Sicherheit von Broadcast-Datendiensten im Smart Grid am Beispiel der Rundsteuertechnik,” in Informationssicherheit stärken - Vertrauen in die Zukunft schaffen: [Tagungsband zum 13. Deutschen IT-Sicherheitskongress], Gau-Algesheim: SecuMedia-Verl, 2013, pp. 483–496.
  • J. Shin and C. Ruland, “A Survey of Image Hashing Technique for Data Authentication in WMSNs,” in Workshop on Internet of Things Communications and Technologies (IOT 2013), Lyon, 2013, pp. 264–269. [Link]
  • O. Ur Rehman, Tabatabaei, S. Amir Hossein A. E, N. Zivic, and C. Ruland, “Soft Authentication and Correction of Images,” in Systems, Communication and Coding (SCC), Proceedings of 2013 9th International ITG Conference on, 2013, pp. 1–6. [Link]

2012

  • R. Schick and C. Ruland, “Non-Repudiation of Forwarding: Traceability of Confidential Data Via Multiple Recipients,” in 9th International Conference of Security and Cryptography: SciTePress, 2012, 387–390.
  • R. Schick and C. Ruland, “On the Security of the Non-Repudiation of Forwarding Service,” in Trust, Privacy and Security in Digital Business: 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings, Berlin, Heidelberg, s.l.: Imprint: Springer, 2012, 167–178. [Link]

2011

  • J. Holle, A. Groll, C. Ruland, H. Cankaya, and M. Wolf, “OPEN PLATFORMS ON THE WAY TO AUTOMOTIVE PRACTICE,” in 8th ITS European Congress, Lyon, 2011.
  • R. Schick and C. Ruland, “Data Leakage Tracking - Non-Repudiation of Forwarding,” in First Internation Conference on Informatics Engineering and Information Science, 2011, 163–173. [Link]
  • R. Schick and C. Ruland, “Document Tracking - On the Way to a New Security Service,” in Sixth Conference on Network Architectures and Information Systems Security, 2011, 89–93. [Link]
  • R. Schick and C. Ruland, “Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data,” in Second International Conference on Advances in Information and Communication Technologies, 2011.
  • O. Ur Rehman, N. Zivic, S. Tabatabaei, and C. Ruland, "Error Correcting and Weighted Noise Tolerant Message Authentication Codes," in Signal Processing and Communication Systems (ICSPCS), 2011 5th International Conference on, 2011, pp. 1–8. [Link]

2010

  • C. Bodenstedt, C. Ruland, D. Weber, and A. Kung, "Integration of Security and Dependability into Resource constrained Embedded Systems," in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 2010, 93–98.
  • A. Groll, J. Holle, and C. Ruland, "Upcoming Trends in the Automotive IT and Associated Security Challenges," in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 2010, 25–30. [Link]
  • R. Schick, S. Tcaciuc, and C. Ruland, "Information Security of Multimodal Input Data -Traceability of Image Data," in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 2010, 31–34.
  • M. Schneider and C. Ruland, “Steckdose als virtuelle Zapfsäule,” in EMA 2010 - Elektromobilausstellung: Fachtagung, Wettbewerbe; Vorträge der ETG-Fachtagung vom 8. bis 9. Oktober 2010 in Aschaffenburg, Berlin: VDE-Verl, 2010, 161–169. [Link]
  • M. Schneider, S. Tcaciuc, and C. Ruland, "Secure metering for electrical vehicles," in E-Mobility: Technologien - Infrastruktur - Märkte; VDE-Kongress 2010 Leipzig, 8.-9. November 2010 Congress Center Leipzig; Kongressbeiträge, Berlin: VDE-Verl, 2010, FZT 1.4.13. [Link]
  • O. Ur Rehman, N. Zivic, and C. Ruland, "Iterative bit-flipped decoding of concatenated reed solomon/convolutional codes with HMAC," in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Ottawa, Canada, 2010, 410–415. [Link]
  • N. Zivic and C. Ruland, "Security Architecture for Smart Metering Systems, Software Services for E-World," in 10th IFIP Advances in Information and Communication Technology, Buenos Aires, Argentina: Springer-Verlag, 2010. [Link]
  • N. Zivic, O. Ur Rehman, and C. Ruland, "On the Probability and Impact of Collisions on Soft Input Decryption," in International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome, Italy, 2010, 1–5. [Link]

2009

  • A. Groll and C. Ruland, “Gefahren der In-Fahrzeug-Kommunikation moderner Automobile,” in Sichere Wege in der vernetzten Welt: [Tagungsband zum 11. Deutschen IT-Sicherheitskongress ; vom 12. - 14. Mai 2009 in Bonn], Gau-Algesheim: SecuMedia-Verl, 2009.
  • A. Groll and C. Ruland, “Secure and Authentic Communication on Existing Vehicle Networks,” in IEEE Intelligent Vehicles Symposium, 2009: IV ; 3 - 5 June 2009, Xi'an, China, Piscataway, NJ: IEEE, 2009.
  • J. Holle, A. Groll, C. Ruland, M. Wolf, T. Wollinger, and F. Zweers, “OVERSEE - A Secure and Open Communication and Runtime Platform for Innovative Automotive Applications,” in Proceedings of the 7th escar - Embedded Security in Cars Conference, Düsseldorf, 2009.
  • N. Zivic, C. Ruland, and O. Ur Rehman, “Error Correction over Wireless Channel Using Symmetric Cryptography,” in IEEE International Conference on Wireless Communication Society, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, 2009, 752–756. [Link]
  • N. Zivic, O. Ur Rehman, and C. Ruland, “Analysis of Serial and Parallel Soft Input Decryption Schemes over a Wireless Channel,” in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Istanbul, Türkei: IEEE, 2009, 282–288. [Link]
  • N. Zivic, O. Ur Rehman, and C. Ruland, “Using HMAC for Error correction over Wireless Channel,” in Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australien, 2009, 252–256. [Link]

2008

  • M. Dunte and C. Ruland, “Construction and Usage of Time-limited Keys in Secure Multimedia Distribution,” in Third International Conference on Communications and Networking in China, 2008: ChinaCom 2008 ; 25 - 27 Aug. 2008, Hangzhou, China, Piscataway, NJ: IEEE, 2008. [Link]
  • M. Dunte and C. Ruland, “Delivery Infrastructure for Secure Scalable Coded Multimedia,” in 28th International Conference on Distributed Computing Systems workshops: 17 - 20 June 2008, Beijing, China ; proceedings, Los Alamitos, Calif.: IEEE Computer Society, 2008, 42–47. [Link]
  • M. Dunte and C. Ruland, “Realising Time-Iimitation for Cryptographic Keys in Secure Multimedia Distribution,” Security and Communication Networks, vol. 1, no. 6, 451–459, 2008.
  • A. Groll, J. Holle, and C. Ruland, “Simulative Bestimmung der CAN-Bus-Lastgrenzen,” in Automotive - Safety & Security 2008 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik: 19. und 20. November 2008, Stuttgart, Aachen: Shaker, 2008.
  • A. Groll and C. Ruland, “Trusted Communication Groups for Authentic In-Car Communication,” in Proceedings of the 6th escar - Embedded Security in Cars Conference, Hamburg, 2008.
  • S. Tcaciuc and C. Ruland, “Optimizations of Flow Control under QOS Aspects between Core Network and Access Network Domains,” in Proceeding of the 2nd International Conference "Telecommunications, Electronics and Informatics", Chisinau, Moldova, 2008, 37–42.
  • N. Zivic and C. Ruland, “Joint Channel Coding - Cryptography,” in Infoteh, Jahorina, Bosnia, 2008.
  • N. Zivic and C. Ruland, “Method for Improvement of Soft Input Decryption Performances,” in 12th WSEAS Conf. on Computer Sciences: July 2008, Herklion, Greece, 2008.
  • N. Zivic and C. Ruland, “Channel Coding as a Cryptography Enhancer,” Transaction on Communications, vol. 7, no. 3, 83–91, 2008.
  • N. Zivic and C. Ruland, “Feedback in Soft Input Decryption,” WSEAS Transactions on Communications, vol. 7, no. 5, 428–437, 2008.
  • N. Zivic and C. Ruland, “Optimization of Soft Input Decryption,” in Conference on Soft Computing, Brno University of Technology, Brno University of Technology, Czech Republic, 2008, 241–246.
  • N. Zivic and C. Ruland, “Parallel Joint Channel Coding and Cryptography: July 2008,” Proceedings of World Academy of Science, Engineering and Technology, vol. 31, 536–539, 2008.
  • N. Zivic and C. Ruland, “Parallel Joint Channel Coding and Cryptography,” International Journal of Computer Science and Engineering, WASET World Academy of Science, Engineering and Technology, vol. 4, no. 2, 140–144, 2008.
  • N. Zivic and C. Ruland, “Probability of Collisions in Soft Input Decryption,” in Recent advances on applied mathematics: Proceedings of the American Conference on Applied Mathematics (MATH '08) : Cambridge, Massachusetts, USA, March 24 - 26,2008, Athen: WSEAS Press, 2008, 362–366.
  • N. Zivic and C. Ruland, “Soft Input Decryption using feedback,” in 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems (SEPAD '08), University of Cambridge, UK, 2008, 174–177.

2007

  • M. Dunte and C. Ruland, “On the Way to Secure Delivery of Scalable Coded Media,” in Mikulášská kryptobesídka, Prag, Tschechische Republik, 2007, 51–59.
  • M. Dunte and C. Ruland, “Secure Voice-over-IP,” IJCNS International Journal of Computer Science and Network Security, vol. 7, no. 6, 63–68, 2007.
  • S. Hick and C. Ruland, “Security Aspects for Secure Download of Regulated Software,” in Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4 - 6, 2007 ; proceedings, Berlin: Springer, 2007, 219–227. [Link]
  • T. Lohmann and C. Ruland, “Digital Signatures Based on Elliptic Curves in RFIDs,” IJCNS International Journal of Computer Science and Network Security, vol. 7, no. 1, 275–281, 2007. [Link]
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Deployment of E-Government Municipal Services: Enforcement of Security Polices,” in Secure E-government web services, A. Mitrakas, Ed, Hershey: Idea Group Publ, 2007, 111–123.
  • C. Ruland, “Secure Online Metering for a Liberalized Energy Market,” in Secure E-government web services, A. Mitrakas, Ed, Hershey: Idea Group Publ, 2007, 97–110. [Link]
  • C. Ruland and N. Zivic, “Joint Coding and Decryption,” in Ictis' 07, Fes, Marokko, 2007.
  • N. Zivic and C. Ruland, “Soft Input Decryption and its Iterative Application,” in TELFOR: November 20-22, Belgrade, Serbia, 2007.
  • N. Zivic and C. Ruland, “Channel coding as a cryptography enhancer,” in Proceedings in the 11 th WSEAS international conference on Communications, Crete Island, Greece, 2007, 273–278.
  • N. Zivic and C. Ruland, “Improvement of Digital Signature Error Rates,” in Information, Communication and Automation Technologies ICAT 2007, Sarajewo, 2007.
  • N. Zivic and C. Ruland, “Probability of Collisions in Soft Input Decryption,” International Journal of Applied Mathematics and Informatics, vol. 1, no. 1, 21–27, 2007.

2006

  • N. Kang, L. Lo Iacono, C. Ruland, and Y. Kim, “Efficient Application of IPsec VPNs in Wireless Networks,” in ISWPC 2006 Conference Proceedings: IEEE conference International Symposium on Wireless Pervasive Computing 2006, Phuket, Thailand, 2006, 337–341.
  • L. Lo Iacono, S. Müller, C. Ruland, and N. Zisky, “Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt,” Datenschutz und Datensicherheit (DuD), no. 6, 347–352, 2006.
  • L. Lo Iacono, C. Ruland, and N. Zisky, “Secure transfer of measurement data in open systems,” Computer Standards & Interfaces, vol. 28, 2006.
  • T. Lohmann and C. Ruland, “Security Levels of Bluetooth,” in Workshop on Intelligent Transportation, Hamburg, 2006.
  • C. Ruland, T. Lohmann, and M. Schneider, “Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags,” in Smart Card Research and Advanced Applications: 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, Berlin Heidelberg: Springer-Verlag GmbH, 2006, 278–288.
  • C. Ruland and N. Zivic, “Soft Input Decryption, Turbo Coding 2006,” in Turbo-Coding-2006: 4th International Symposium on Turbo Codes & Related Topics ; 6th International ITG-Conference on Source and Channel Coding ; April 03 - 07, 2006, Munich, Berlin: VDE Verl, 2006.

2005

  • Proceedings of the Int. Conference on e-Government. Ottoawa, Canada, 2005.
  • L. H. B. Dietze, L. Lo Iacono, and C. Ruland, “Qualifizierte Signatur im elektronischen Messdatenaustausch,” in Qualifizierte elektronische Signaturen in Theorie und Praxis (QSIG 2005): Workshop im Rahmen der GI Tagung, Sicherheit 2005, Regensburg, 2005.
  • K. Hong, S. W. Jung, L. Lo Iacono, and C. Ruland, “Impacts of Security Protocols on Real-time Multimedia Communications,” Lecture Notes, Computer Science, vol. 3325, no. 2, 1–13, 2005.
  • S. W. Jung, N. Kang, C. Ruland, and Y. Kim, “Efficient Way to Employ Stream Authentication Schemes in Multicast Using Short-lived Keys,” in Preproceedings of WISA 2005 vol.6, The 6th International Workshop on Information Security Applications, Jeju in Korea, 2005.
  • M. Kahmann, L. Lo Iacono, C. Ruland, and T. Schütze, “Sicherheitskonzept,” in PTB-BerichtIT, Informationstechnik, vol. 12, Das SELMA-Projekt: Konzepte, Modelle, Verfahren, N. Zisky, Ed, Bremerhaven: Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005, 165–246.
  • A. Kaliotzoglou, A. Karantjias, N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Design Principles and Aspects for Cross-Border Municipal Service Deployment,” in Workshop and Poster Proceedings of the 4th International EGOV Conference, EGOV'05 4th International Conference on Electronic Government, Denmark, 2005.
  • N. Kang, A. Kunz, L. Lo Iacono, and C. Ruland, “Analysis of the QoS Requirements under Radio Access Network Planning Aspects for GPRS/EDGE and UMTS,” in IEEE WirelessCom 2005 Conference, First International Symposium on Wireless Quality-of-Service (WiQoS'05), Maui, Hawaii, USA, 2005.
  • N. Kang and C. Ruland, “MDS: Multiplexed Digital Signature for Real-time Streaming over Multisessions,” in The International Conference on Information Networking (ICOIN) 2005, Jeju, Korea, 2005, 824–834.
  • N. Kang and C. Ruland, “Security analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining,” IEICE Transaction on Communications, vol. E88-B, no. 3, 2005.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “An Architecture for Secure Policy Enforcement in E-Government Services Deployment,” in Communications and multimedia security: 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; proceedings, Berlin: Springer, 2005.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Enforcement of Security Policies for e-Government Services on Municipal and Cross-Border Level,” in Proceedings of the Int. Conference on e-Government, Ottoawa, Canada, 2005, 311–320.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations,” in Second International Conference, TrustBus 2005, Berlin Heidelberg: Springer-Verlag, 2005, 141–150.
  • M. Wahl (geb. Angele), C. Ruland, and T. Schütze, “Sicherheitsanalyse,” in PTB-BerichtIT, Informationstechnik, vol. 12, Das SELMA-Projekt: Konzepte, Modelle, Verfahren, N. Zisky, Ed, Bremerhaven: Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005, 117–164.

2004

  • N. Kang and C. Ruland, “DiffSig: Differentiated Digital Signature for Real-time Multicast Packet Flows,” in Lecture Notes in Computer Science: 1st International Conference on Trust and Privacy in Digital Business (TrustBus '04) in conjunction with the 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Zaragoza, Spain, 2004.
  • N. Oikonomidis and C. Ruland, “Identity Based Protocols for Secure Electronic Content Distribution and Licensing 4th International Conference on Web Delivering of Music,” in Proceedings of IEEE Computer Society, Universität Pompeu Fabra, Barcelona, Spain, 2004, 92–99.
  • C. Ruland and S. Tcaciuc, “A Table Based Scheduler for the QoS enabled Flow Control in GPRS/EDGE Networks,” in IASTED International Conference on Communication Systems and Networks CSN 2004, Marbella, Spain, 2004.
  • C. Ruland and S. Tcaciuc, “Scheduler Based Flow Control under QoS Aspects in GPRS/EDGE Networks,” in IEEE International Conference on Networks 2004/ICON 2004, Singapur, 2004.
  • C. Ruland and M. Wahl, “Usage of Mobile Agents for Wireless Multimedia Communication,” in Proceedings of IASTED conference on Communication Systems and Applications (CSA 2004): Acta-Press, IASTED conference on Communication Systems and Applications (CSA 2004), Canada, 2004.

2003

  • L. Lo Iacono, C. Ruland, and M. Wahl, “Einsatz der elektronischen Signatur für den Messdatenaustausch im liberalisierten Energiemarkt (Secure Electronic Exchange of Metering Data),” in VDI Berichte Nr. 1785, Telematik Tagung, Siegen, 2003.

2002

  • A. Friesen and C. Ruland, “Das eContract-Konzept Ein Sicherheitsmodell für Multi-Service-Multi-Provider-Architekturen Enterprise Security,” in Tagungsband Enterprise Security, 2002.
  • A. Friesen and C. Ruland, “Design eines Profil- und Zertifikatsmanagementsystem für das Service by eContract-Konzept,” in Lecture Notes in Informatics: GI Jahrestagung, GI-Edition, Bonn, 2002.
  • L. Lo Iacono and C. Ruland, “Confidential Multimedia Communication in IP Networks,” in 8th IEEE International Conference on Communication Systems, Singapur, 2002.
  • L. Lo Iacono and C. Ruland, “Eine Sicherheitsarchitektur für den Austausch elektronischer Messdaten im liberalisierten Energiemarkt,” in SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin, 2002.
  • L. Lo Iacono, C. Ruland, and N. Schweitzer, “Signing Digital Streams,” in Proceedings of 4th International ITG Conference on Source and Channel Coding: 4th International ITG Conference on Source and Channel Coding, Berlin, 2002, 324–334.
  • C. Ruland and F. Schlake, “A Security Protocol Providing QOS in ATM Networks,” in 8th IEEE International Conference on Communication Systems, Singapur, 2002.
  • C. Ruland and M. Wahl, “Sicherheitsanalyse der Übertragung von Energiedaten über offene Netze,” in SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin, 2002.

2001

  • A. Friesen and C. Ruland, “Service by e-contract - a security model for authentication, access control and online subscription management multi-service-multi-provider architectures,” in Proceedings, Volume II Information Systems: World Multiconference on Systemics, Cybernetics and Informatics, Orlando, 2001, 581–585.
  • C. Geuer-Pollmann and C. Ruland, “XML-Sicherheit - Stand heute,” in Sicherheit im Internet: Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg, 2001, 197–209.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS,” in V. Varadharajan u. Y. Mu (Eds), LNCS 2119, Berlin Heidelberg, 2001, 344–359.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Properties of Modes of Operation with Statistical Self-Synchronization Mechanisms,” in ICICS Shaping The New Information ERA: 3rd International Conference on Information, Communications and Signal Processing, Singapur, 2001.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Suitability of Cryptographic Modes of Operation for the Encryption in High- Speed Networks,” in IEEE Proceedings, Bangkok, Thailand, 2001, 134–139.
  • C. Ruland and N. Schweitzer, “Digitale Signatur von Bitströmen,” in 7. Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg: Secumedia-Verlag, Ingelheim 2001, 2001.

2000

  • C. Geuer-Pollmann, C. Ruland, M. Moula, and P. Sklavos, “Digital Signatures for Web Content E-business,” in Key Issues, Applications and Technologies, Amsterdam: IOS Press, 2000, 218–224.
  • C. Ruland and O. Weissmann, “Advanced Encryption Standard,” Funkschau, 2000.
  • C. Ruland and O. Weissmann, “Secure Subscription Management on Agent based Platforms,” in Globalcom 2000, San Francisco, 2000.

1999

  • A. Friesen, N. Oikonomidis, C. Ruland, and O. Weissmann, “A Distributed Certificate Management System for Use in Agent System,” in Workshop Proceedings, M1-M9, 2nd ACTS Workshop, Singapur, 1999.
  • C. Geuer-Pollmann and C. Ruland, “Das Simple Signature Protocol für WWW-Sicherheit,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Ingelheim: Secumedia-Verlag, 1999, 461–465.
  • O. Jung and C. Ruland, “Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks,” in Tagungsband Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Worcester, USA, 1999.
  • S. Kuhn, C. Ruland, and K. Wollenweber, “ATM-Encryption with 155 Mbit,” in IEEE ATM-Workshop '99, Kochi-Japan, 1999.
  • S. Kuhn, C. Ruland, and K. Wollenweber, “ATM-Verschlüsselung mit 155 Mbit/s,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Ingelheim: Secumedia-Verlag, 1999, 287–295.
  • C. Ruland, “Security vor dem Wachstumsschub,” Comparex Journal, vol. 28, 10–11, 1999.
  • C. Ruland and O. Weissmann, “Zugangskontrolle für universelle Dienstenutzung in Agentensystemen,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Secumedia-Verlag: Ingelheim, 1999, 455–460.

1998

  • C. Ruland, “Electronic Commerce,” 25 Jahre Telemation Jubiläumsausgabe, no. 10, 1–9, 1998.

1997

  • C. Ruland, “Breitbandverschlüsselung (155 Mbit/s) mit Selbstsynchronisation,” in 5. Deutscher IT-Sicherheitskongreß des BSI 1997, „Mit Sicherheit in die Informationsgesellschaft“, Tagungsband erschienen im SecuMedia Verlag, Ingelheim: Secumedia-Verlag, 1997, 289–301.
  • C. Ruland, “Regierung umgeht Datenschutz: Orwell durch die Hintertür?,” Computerwoche, no. 15, 20, 1997.

1995

  • D. Fox, T. Henn, K. Reichel, and C. Ruland, “Guardeded Authentic Local Area Network - GALAN -,” in Proceedings der Fachtagung Verläßliche Systeme: VIS'95,DuD-Fachberichte, Braunschweig: Vieweg-Verlag, 1995, 163–180.
  • C. Ruland, “Datenkompression,” in Das Telekommunikationswerk, D. Schulte, Ed, Augsburg: Interest Verlag GmbH, 1995, 1–48.
  • C. Ruland, “Sichere Kommunikation zwischen ISDN-Endgeräten,” Datacom, 108–116, 1995.
  • C. Ruland, “Sicherheit in Verteilten Systemen,” in Tutoriumsband: KiVS'95, Chemnitz, 1995, 1–45.

1994

  • D. Dienst, D. Fox, and C. Ruland, “Transparente Sicherheitsmechanismen für ISDN-Anwendungen,” in Nutzung u. Technik von Kommunikationsendgeräten, G. Kleinke, Ed, Offenbach: VDE-Verlag, 1994, 81–95.
  • C. Ruland, “Kontrollierter Zugang,” Business Computing Januar, no. 1, 28–31, 1994.
  • C. Ruland, “Secure Common ISDN Application Programming Interface (S-CAPI),” in Sicherheitsschnittstellen – Konzepte, Anwendungen und Einsatzbeispiel: DUV Deutscher Universitätsverlag; Gabler Vieweg Westdeutscher Verlag, 1994.

1993

  • C. Ruland, Informationssicherheit in Datennetzen. Bergheim: datacom Verlag, 1993.
  • C. Ruland, “Realizing Digital Signatures with One-Way Hash Functions,” Cryptologia, vol. 17, no. 3, 285–300, 1993.

1991

  • H. Kallerhoff and C. Ruland, “Statistische Untersuchungen von Pseudozufallszahlenfolgen,” KES Kommunikations- und EDV-Sicherheit, no. 3, 156–163, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Grundlagen und Übersicht,” Datacom, no. 4, 88–96, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Grundlagen und Übersicht (Fortsetzung),” Datacom, no. 5, 113–120, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Implementation und Vergleichstests,” Datacom, no. 8, 97–103, 1991.

1990

  • C. Ruland, “Datensicherheit in Lokalen Netzen, Teil 2,” Datacom, no. 1, 100–107, 1990.
  • C. Ruland, “Sichere Übertragung und Archivierung elektronischer Dokumente,” Datacom, no. 3, 120–130, 1990.
  • C. Ruland, “Sicherheit und Sicherheitsmanagement in Offenen Kommunikationssystemen,” Sonderheft Netzwerkmanagement Spezial, Datacom Verlag, 202–213, 1990.
  • C. Ruland, “Vertrauenswürdigkeit und Vertraulichkeit elektronischer Dokumente,” Recht der Datenverarbeitung (RDV), no. 4, 168–174, 1990.

1989

  • D. Bong and C. Ruland, “Optimized Software Implementation of the Modular Exponentiation on General Purpose Microprocessors,” Computers & Security, no. 8, 621–630, 1989.
  • N. Pohlmann and C. Ruland, “Datensicherheit bei Kommunikation über Datex-P,” Datacom, no. 1, 64–70, 1989.
  • C. Ruland, “Datensicherheit in Lokalen Netzen, Teil 1,” Datacom, no. 12, 94–99, 1989.
  • C. Ruland, “Zur Datensicherheit in Lokalen Netzen,” Recht der Datenverarbeitung (RDV), no. 5/6, 210–218, 1989.

1988

  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 4: Sicherheitsmechanismen und ISO-Referenzmodell,” Datacom, no. 1, 92–97, 1988.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 5: Realisierung einer Datenschutzeinrichtung,” Datacom, no. 3, 114–120, 1988.

1987

  • C. Ruland, Datenschutz in Kommunikations-Systemen. Pulheim: datacom Verlag, 1987.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 1: Einführung und Begriffe,” Datacom, no. 1, 78–84, 1987.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 2: Verschlüsselungsverfahren,” Datacom, no. 4, 98–104, 1987.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 3: Authentizitätsprüfungs-verfahren und Schlüsselverteilung,” Datacom, no. 9, 172–177, 1987.
  • C. Ruland, “Sicherheitsarchitektur in Offenen Kommunikationssystemen,” Elektrotechnik und Maschinenbau (E und M), no. 12, 533–537, 1987.

1981

  • C. Ruland, “Algorithmen zur adaptiven Berechnung der schnellsten Wege in Virtuellen Netzen,” Angewandte Informatik, no. 11, 492-496, 1981.
  • C. Ruland, “Routing in Virtuellen Netzen,” Elektronische Rechenanlagen, vol. 23, no. 4, 164–167, 1981.
  • C. Ruland, “Virtuelle Netze für verschiedene Benutzerklassen,” Online Heft 6, 456–458, 1981.
  • C. Ruland, “Was ist ein Virtuelles Netz?,” Elektronische Rechenanlagen, vol. 23, no. 3, 134–136, 1981.

1978

  • C. Ruland, “Ein Verfahren zur Lösung von (Δ + k2) u = 0 in Außengebieten mit Ecken,” Applicable Analysis, vol. 7, 69–79, 1978.

1976

  • C. Ruland, “Ein Verfahren zur Berechnung der Lösung des Dirichletschen Außenraumproblems zur Helmholtzschen Schwingungsgleichung bei stückweise glatten Rändern,” Bonner Mathematische Schriften, 1976.

1973

  • C. Ruland, “Zur theoretischen und numerischen Lösbarkeit des Dirichletschen Außenraumproblems für die Helmholtzsche Schwingungsgleichung,” Diplomarbeit, Universität Bonn, Bonn, 1973.