..
Suche
Hinweise zum Einsatz der Google Suche
Personensuchezur unisono Personensuche
Veranstaltungssuchezur unisono Veranstaltungssuche
Katalog plus

Schriften

2017

  • R. A. Djeujo and C. Ruland, "QoSs definition and session description protocol for secure communication using compressive sensing," 6th International Conference on Future Generation Communication Technologies Conference (FGCT), Dublin, Ireland, Aug. 21-23, 2017, pp. 1-7.
  • R. A. Djeujo and C. Ruland, "Secret matrix lifecycle management for compressive sensing based cryptographic mechanisms," IEEE 3th Annual Conference in Computing, Communication, Control, And Automation Conference (ICC3A), Pune, India, Aug. 17-18, 2017, pp. 1-10.
  • O. Ur Rehman and N. Zivic, "Two-phase Method for Image Authentication and Enhanced Decoding", IEEE Access, vol. 5, issue 1, pp. 12158-12167, Dec. 2017.
  • R. Fay, C. Bender, N. Klein, D. Krönert, F. Kußmaul, S. Merz, T. Pieper, J. Saßmannshausen, T. Steinbring, and C. Wurmbach. Gefahrlos durch den Nebel - Ein Sicherheitskonzept für das Fog Computing. 15. Deutscher IT-Sicherheitskongress, BSI, Mai 16-18, 2017, Bonn, Germany.
  • C. Ruland, J. Sassmannshausen, K.Waedt and N. Zivic, "Smart grid security - an overview of standards and guidelines", e & i Elektrotechnik und Informationstechnik, vol 134, issues 1, pp. 19-25, Feb 2017, Springer Wien. [Link]
  • O. Ur Rehman and N. Živić, "Discrete Wavelet Transform based Watermarking for Image Content Authentication", 6th International Conference on Pattern Recognition Applications and Methods, Porto, Portugal, Feb. 24-26, 2017.
  • O. Ur Rehman, N. Živić and C. Ruland, "Approximate Image Authentication and Correction Using Spatial and Frequency Domain Features", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • R. Fay and C. Ruland, "Compressed Sampling and Authenticated-Encryption", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • N. Živić, O. Ur Rehman and C. Ruland, "Iterative Decoder for OFDM Transmission over Rayleigh Channel", 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, Jan. 11 - 13, 2017.
  • R. A. Djeujo and C. Ruland, “Embedding cryptographically secure matrix transformation in structured compressive sensing,” IEEE Annual Computing and Communication Workshop and Conference (CCWC 2017), pp. 529–535, Las Vegas, USA, Jan 9-11, 2017.

2016

  • N. Zivic and O. Ur Rehman, "Improved OFDM Decoder for LTE and Beyond", The 2016 International Conference on Computational Science and Computational Intelligence (CSCI'16), Las Vegas, USA, Dec. 15 - 17, 2016.
  • R. Fay and C. Ruland, "Compressive Sensing Encryption Modes and their Security", 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, Dec. 5-7, 2016.
  • G. Gala, T. Koller, D. G. Pérez, G. Fohler and C. Ruland, "Timing Analysis of Secure Communication between Resource Managers in DREAMS," Workshop on Security and Dependability of Critical Embedded Real-Time Systems, Porto, Portugal, Nov. 29, 2016. [Link]
  • N. Zivic and O. Ur Rehman, "Soft Authentication Techniques for Images", 24th Telecommunications Forum (TELFOR 2016), Belgrade, Serbia, Nov. 22-23, 2016. [Link]
  • C. Ruland, N. Kang and J. Sassmannshausen, "Rejuvenation of the IEC 61850 Protocol Stack for MMS", IEEE International Conference on Smart Grid Communications (SmartGridComm 2016), Sydney, Australia, Nov. 6-9, 2016. [Link]
  • S. Abbas, F. Ahmed, N. Zivic and O. Ur Rehman, "Perceptual Image Hashing using SVD based Noise Resistant Local Binary Pattern", The 8th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2016), Lisbon, Portugal, Oct. 18-20, 2016. [Link]
  • T. Koller, G. Gala, D. G. Perez, C. Ruland, G. Fohler, "DREAMS: Secure Communication between Resource Management Components in Networked Multi-Core Systems", IEEE Conference on Open Systems 2016 (ICOS 2016), Langkawi, Malaysia, Oct. 10-12, 2016 (Best paper award). [Link]
  • R. A. Djeujo and C. Ruland, “Secure matrix generation for compressive sensing embedded cryptography,” IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON 2016), pp. 250–257, Vancouver, BC, Canada, Oct. 13-15, 2016. [Link]
  • N. Zivic, O. Ur Rehman and C. Ruland, "Smart Metering for Intelligent Buildings", Transactions on Machine Learning and Artificial Intelligence, vol. 4, no. 5, Oct. 2016. [Link]
  • T. Koller, D. Weber, "Security Services for Mixed-Criticality Systems Based on Networked Multi-core Chips", International Conference on Computer Safety, Reliability and Security (SafeComp 2016), Trondheim, Norway, Sep. 20-23, 2016. [Link]
  • M. Schneider and C. Ruland, "Verification of Time Signals", 30th European Frequency and Time Forum (EFTF), York, UK, Apr 4-7, 2016. [Link]
  • O. Ur Rehman, N. Zivic and C. Ruland, "Content based Image Authentication with Error Correction", IEEE International Conference on Communications (IEEE ICC'16), Communication and Information System Security Symposium, Kuala Lumpur, Malaysia, May 23-27, 2016. [Link]
  • R. Fay, "Introducing the Counter Mode of Operation to Compressed Sensing Based Encryption", Information Processing Letters, Elsevier, Volume 116, Issue 4, Apr 2016, pp. 279–283. [Link]

2015

  • J. Saßmannshausen and C. Ruland, "Nachweisbarkeit in Smart Grids auf Basis von XML-Signaturen", D.A.CH Security 2015, syssec  IT Security & IT Management, p. 98–109, Frechen, Germany, Sep 8-9, 2015.
  • J. Saßmannshausen and C. Ruland, "End-to-End-Authentication in Smart Grid Control", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19, 2015. [ Link]
  • M. Schneider and C. Ruland, “Verification of time telegrams in Long Wave Radio systems", IEEE 2015 Joint Conference of the IEEE International Frequency Control Symposium & the European Frequency and Time Forum (IFCS-EFTF), Denver, Colorado, USA, pp. 270-275, Apr 12-16 2015. [Link]
  • S. Tabatabaei, O. Ur Rehman, N. Zivic, and C. Ruland, "Secure and Robust Two-Phase Image Authentication", IEEE Transactions on Multimedia, vol. 17, no. 7, pp. 945-956, May 2015. [Link]
  • O. Ur Rehman, A. E. Tabatabaei, N. Zivic, and C. Ruland, "Spatial and Frequency Domain Complementary Watermarks for Image Authentication and Correction," in the 10th International ITG Conference on Systems, Communications and Coding (SCC 2015), Hamburg, Germany, pp.1-6, Feb 2-5, 2015. [Link]
  • O. Ur Rehman, N. Zivic, "Secure Design Patterns for Security in Smart Metering Systems", 9th IEEE European Modelling Symposium (EMS 2015), Madrid, Spain, Oct 6-8, 2015. [Link]
  • O. Ur Rehman, N. Zivic, and C. Ruland, "Security Issues in Smart Metering Systems", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19, 2015 (Overall best paper award). [Link]
  • N. Zivic, O. Ur Rehman and C. Ruland, "Evolution of Smart Metering Systems", 23rd IEEE Telecommunications Forum (TELFOR 2015), Belgrade, Serbia, Nov 24-26, 2015. [Link]
  • J. Sassmannshausen, C. Ruland, "Non-repudiation Services for the MMS Protocol of IEC 61850", Security Standardization Research Conference (SSR 2015), Tokyo, Japan, Dec 15-16, 2015. [Link]

2014

  • C. Ling, O. Ur-Rehman and W. Zhang, "Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature," KSII Transactions on Internet and Information Systems, vol. 8, no. 12, pp. 4568-4587, Dec. 2014. [Link]
  • A. Schantin and C. Ruland, “A Bit-Error Based Capture Model for EPCglobal RFID Systems,” in 52th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014, pp. 221–226. [Link]
  • S. Tabatabaei and N. Zivic, “Revisiting a Primitive: Analysis of Approximate Message Authentication Codes,” in IEEE International Conference on Communications (ICC'14): , Sydney, Australia, 10 - 14 Jun, 2014. [Link]
  • O. Ur Rehman, N. Zivic, "Soft decision iterative error and erasure decoder for Reed–Solomon codes," IET Communications, vol. 8, no. 16, pp. 2863-2870, Nov 2014. [Link]
  • J. Shin, and C. Ruland, "A Novel Design of Content based Multimedia Security," in 9th Future Security Conference, Berlin, Germany, 16 - 18 Sep. 2014.
  • J. Shin, and C. Ruland, "A Hybrid Approach for Content Based Image Authentication," in 11th International Conference on Security and Cryptography (SECRYPT'14), Vienna, Austria, 28 - 30 Aug. 2014, pp. 371-378. [Link]
  • O. Ur Rehman, N. Živić, C. Ruland: "Security in Smart Metering Systems under the Smart-Grid Perspective", Tutorium, IEEE BlackSeaCom 2014, May 2014, Chisinau, Moldova

2013

  • S. Rostami, Bamohabbat S, and S. Tabatabaei, “Related-key impossible differential cryptanalysis of full-round HIGHT,” in 10th International Conference on Security and Cryptography (SECRYPT’13), Reykjavik, Iceland, 29 - 31 Jul. 2013, pp. 537–542.
  • A. Schantin, “Iterative decoding of baseband and channel codes in a long-range RFID system,” in IEEE International Conference on Industrial Technology (ICIT), Cape Town, South Africa, 25 - 28 Feb. 2013, pp. 1671–1676.
  • A. Schantin and C. Ruland, “Retransmission Strategies for RFID Systems Using the EPC Protocol,” in IEEE International Conference on RFID Technologies and Applications (RFID-TA), Johor Bahru, Malaysia, Johor Bahru, Malaysia, 4 - 5 Sep. 2013, pp. 1–6.
  • M. Schneider and C. Ruland, “Sicherheit von Broadcast-Datendiensten im Smart Grid am Beispiel der Rundsteuertechnik,” in Informationssicherheit stärken - Vertrauen in die Zukunft schaffen: [Tagungsband zum 13. Deutschen IT-Sicherheitskongress], Gau-Algesheim: SecuMedia-Verl, pp. 483–496.
  • J. Shin and C. Ruland, “A Survey of Image Hashing Technique for Data Authentication in WMSNs,” in Workshop on Internet of Things Communications and Technologies (IOT 2013), Lyon, France, 7 - 9, Oct. 2013, pp. 253–258.
  • S. Tabatabaei and C. Ruland, “The Analysis of an NMF-based Perceptual Image Hashing Scheme,” in 13th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'13), Athens, Greece, 12 - 15 Dec, 2013,
  • S. Tabatabaei, O. Ur Rehman, and N. Zivic, “A DWT-based Image Authentication and Correction Mechanism,” in 55th International Symposium ELMAR-2013, Zadar, Croatia, 25 - 27 Sep. 2013, pp. 79–82.
  • S. Tabatabaei, O. Ur Rehman, and N. Zivic, “AACI: The Mechanism for Approximate Authentication and Correction of Images,” in IEEE International Conference on Communications 2013 (ICC'13), Workshop on Information Security over Noisy and Lossy Communication Systems, 9 - 13 Jun. 2013, pp. 717–722.
  • O. Ur Rehman, S. Tabatabaei, N. Zivic, and C. Ruland, “Soft Authentication and Correction of Images,” in Proceedings of 2013 9th International ITG Conference on Systems, Communication and Coding (SCC), Munich, Germany, 21 - 24 Jan. 2013, pp. 1–6.
  • O. Ur Rehman and N. Zivic, “Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images,” WSEAS Transactions on Systems, vol. 12, no. 7, pp. 371–383, http://wseas.org/cms.action?id=6952, 2013.

2012

  • J. Holle and H. Cankaya, “Designing Open Computing Platforms with Security in Mind,” Presentation only. Doha, Feb. 2012.
  • H. Cankaya, C. Grepet, J. Holle, and J. Simó, “Enabling the Deployment of Open In-Vehicle ITS Stations,” in 19th ITS World Congress, Vienna, Austria, 22 - 26 Oct. 2012,
  • J. Holle, A. Platschek, J. Sánchez, and J. Shin, “OVERSEE - A Secure and Open In-Vehicle ITS Station,” in 19th ITS World Congress, Vienna, Austria, 22 - 26 Oct. 2012,
  • A. Schantin, “Forward Error Correction in Long-Range RFID systems,” in Proceedings of 2012 European Conference on Smart Objects, Systems and Technologies (SmartSysTech), Munich, Germany, 12 - 13 Jun. 2012, pp. 1–6.
  • R. Schick and C. Ruland, “Non-Repudiation of Forwarding: Traceability of Confidential Data Via Multiple Recipients,” in 9th International Conference of Security and Cryptography: SciTePress, 387–390.
  • R. Schick and C. Ruland, “On the Security of the Non-Repudiation of Forwarding Service,” in 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Berlin, Heidelberg, s.l.: Imprint: Springer, 3 - 7, Sep. 2012, 167–178.
  • S. Tabatabaei and N. Zivic, “Security analysis of the joint encryption and compressed sensing,” in 20th Telecommunications Forum Telfor (TELFOR), Belgrade, Serbia, 20 - 22 Nov. 2012, pp. 799–802.
  • O. Ur Rehman and N. Zivic, “Iterative Cross-layer Decoder for WiMAX Using Hybrid-ARQ,” in IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), Liverpool, UK, 25 - 27, Jun. 2012, pp. 1158–1161.
  • O. Ur Rehman and N. Zivic, “Noise tolerant image authentication with error localization and correction,” in 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 1 - 5, Oct. 2012, pp. 2081–2087.

2011

  • J. Holle, “OVERSEE - Potentials and Challenges for the Automotive Industry,” Nürnberg, Mar. 2011.
  • A. Groll, J. Holle, M. Wolf, and T. Wollinger, “Platforma de TI para veículos,” RTI - Redes, Telecom e Instalações, vol. XII, no. 136, 84–94, http://www.arandanet.com.br/midiaonline/rti/2011/setembro/index.html, 2011.
  • J. Holle, A. Groll, C. Ruland, H. Cankaya, and M. Wolf, “OPEN PLATFORMS ON THE WAY TO AUTOMOTIVE PRACTICE,” in 8th ITS European Congress, Lyon.
  • J. Holle, A. Groll, M. Wolf, H. Cankaya, and C. Grepet, “TOWARDS A SHARED DIGITAL COMMUNICATION PLATFORM FOR VEHICLES,” in 18th World Congress on Intelligent Transport Systems, Orlando.
  • A. Mahmood and N. Zivic, “A New Scheme of Forward Error Correction Using Block Ciphers,” in IEEE International Conference on Digital Divergence, Hyderabad, India, 2011.
  • A. Mahmood and N. Zivic, “Bit Error Rate Improvement Using Soft Outputs of MAP Decoder and Avalanche Effect of Block Ciphers,” in IEEE International Conference on Computers, Communications,Control and Automation, Hong Kong, China, 2011.
  • A. Schantin, N. Zivic, and G. Bodean, “Soft decision decoding of the matroid codes,” in Microwave and Telecommunication Technology (CriMiCo), 2011 21th International Crimean Conference, 469–470.
  • R. Schick and C. Ruland, “Data Leakage Tracking - Non-Repudiation of Forwarding,” in First Internation Conference on Informatics Engineering and Information Science, 2011, 163–173.
  • R. Schick and C. Ruland, “Document Tracking - On the Way to a New Security Service,” in Sixth Conference on Network Architectures and Information Systems Security, 2011, 89–93.
  • R. Schick and C. Ruland, “Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data,” in Second International Conference on Advances in Information and Communication Technologies, 2011.
  • O. Ur Rehman, N. Zivic, S. Tabatabaei, and C. Ruland, “Error Correcting and Weighted Noise Tolerant Message Authentication Codes,” in Signal Processing and Communication Systems (ICSPCS), 2011 5th International Conference on, pp. 1–8.
  • O. Ur Rehman and N. Zivic, “Impact of Bit-Flip Combinations on Successive Soft Input Decoding of Reed Solomon Codes,” in The Fourth International Conference on Communication Theory, Reliability, and Quality of Service, Budapest, Hungary, 2011, 30–34.
  • O. Ur Rehman and N. Zivic, “Iterative Bit Flip Type-II Hybrid-ARQ Scheme for Wireless Networks,” in 17th European Wireless Conference, 2011, Vienna, Austria, 2011, 45–50.
  • O. Ur Rehman and N. Zivic, “Multi-Layer Data Protection using N-Channel Stop-and-Wait Hybrid-ARQ in WiMAX,” in The Sixteenth IEEE International Symposium on Computers and Communications, Corfu, Greece, 2011, 359–364.
  • O. Ur Rehman and N. Zivic, “Successive Iterative Decoding of Reed Solomon Codes using Cryptographic Hash Codes as Parity,” in 7th International Conference on Innovations in Information Technology, Abu Dhabi, UAE, 2011, 1–6.

2010

  • C. Bodenstedt, C. Ruland, D. Weber, and A. Kung, “Integration of Security and Dependability into Resource constrained Embedded Systems,” in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 93–98.
  • A. Groll, J. Holle, and C. Ruland, “Upcoming Trends in the Automotive IT and Associated Security Challenges,” in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 25–30.
  • A. Groll, J. Holle, M. Wolf, and T. Wollinger, “Next Generation of Automotive Security: Secure Hardware and Secure Open Platforms,” in 17th ITS World Congress Busan 2010, Busan, Korea.
  • A. Groll, M. Müter, and F. C. Freiling, “A Structured Approach to Anomaly Detection for In-Vehicle Networks,” in Sixth International Conference on Information Assurance and Security (IAS), Atlanta, GA, 92–98.
  • A. Mahmood and N. Zivic, “Bit Error Rate Improvement Using Soft Outputs of MAP Decoder and Avalanche Effect of Block Ciphers,” in International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome, Italy, 2010.
  • R. Schick, S. Tcaciuc, and C. Ruland, “Information Security of Multimodal Input Data -Traceability of Image Data,” in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 31–34.
  • M. Schneider and C. Ruland, “Steckdose als virtuelle Zapfsäule,” in EMA 2010 - Elektromobilausstellung: Fachtagung, Wettbewerbe ; Vorträge der ETG-Fachtagung vom 8. bis 9. Oktober 2010 in Aschaffenburg, Berlin: VDE-Verl, 161–169.
  • M. Schneider, S. Tcaciuc, and C. Ruland, “Secure metering for electrical vehicles,” in E-Mobility: Technologien - Infrastruktur - Märkte ; VDE-Kongress 2010 Leipzig, 8.-9. November 2010 Congress Center Leipzig ; Kongressbeiträge, Berlin: VDE-Verl, FZT 1.4.13.
  • O. Ur Rehman and N. Zivic, “Soft Input Decoding of Reed Solomon Codes with Miscorrection Detection and Avoidance,” in International Conference on Signal Processing and Communication Systems, Institute of Electrical and Electronics Engineers, Ed, Gold Coast, Australia, 2010, 1–5.
  • O. Ur Rehman, N. Zivic, and C. Ruland, “Iterative bit-flipped decoding of concatenated reed solomon/convolutional codes with HMAC,” in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Ottawa, Canada, 2010, 410–415.
  • N. Zivic and C. Ruland, “Security Architecture for Smart Metering Systems, Software Services for E-World,” in 10th IFIP Advances in Information and Communication Technology, Buenos Aires, Argentina: Springer-Verlag, 2010.
  • N. Zivic, “Simulation and Application of Soft Input Decryption,” in 2. Int. Conference on System Simulation (SIMUL 2010), 2010.
  • N. Zivic and O. Ur Rehman, “On using the message digest for error correction in wireless comunication networks,” in 21st International IEEE Conference on Personal Indoor and Mobile Radio Communications, Institute of Electrical and Electronics Engineers, Ed, Istanbul, Türkei, 2010, 491–495.
  • N. Zivic, O. Ur Rehman, and C. Ruland, “On the Probability and Impact of Collisions on Soft Input Decryption,” in International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome, Italy, 2010, 1–5.

2009

  • M. Schneider, “Mobile Messdatenerfassung für Elektrofahrzeuge,” Berlin, Oct. 2009.
  • A. Groll and M. Müter, “Attack Detection for In-Vehicle Networks,” in Automotive Security, Ingolstadt.
  • A. Groll and C. Ruland, “Gefahren der In-Fahrzeug-Kommunikation moderner Automobile,” in Sichere Wege in der vernetzten Welt: [Tagungsband zum 11. Deutschen IT-Sicherheitskongress ; vom 12. - 14. Mai 2009 in Bonn], Gau-Algesheim: SecuMedia-Verl.
  • A. Groll and C. Ruland, “Secure and Authentic Communication on Existing Vehicle Networks,” in IEEE Intelligent Vehicles Symposium, 2009: IV ; 3 - 5 June 2009, Xi'an, China, Piscataway, NJ: IEEE.
  • J. Holle, A. Groll, C. Ruland, M. Wolf, T. Wollinger, and F. Zweers, “OVERSEE - A Secure and Open Communication and Runtime Platform for Innovative Automotive Applications,” in Proceedings of the 7th escar - Embedded Security in Cars Conference, Düsseldorf.
  • N. Zivic, C. Ruland, and O. Ur Rehman, “Error Correction over Wireless Channel Using Symmetric Cryptography,” in IEEE International Conference on Wireless Communication Society, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, 752–756.
  • N. Zivic, O. Ur Rehman, and C. Ruland, “Analysis of Serial and Parallel Soft Input Decryption Schemes over a Wireless Channel,” in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Istanbul, Türkei: IEEE, 282–288.
  • N. Zivic, O. Ur Rehman, and C. Ruland, “Using HMAC for Error correction over Wireless Channel,” in Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australien, 252–256.

2008

  • M. Dunte and C. Ruland, “Construction and Usage of Time-limited Keys in Secure Multimedia Distribution,” in Third International Conference on Communications and Networking in China, 2008: ChinaCom 2008 ; 25 - 27 Aug. 2008, Hangzhou, China, Piscataway, NJ: IEEE.
  • M. Dunte and C. Ruland, “Delivery Infrastructure for Secure Scalable Coded Multimedia,” in 28th International Conference on Distributed Computing Systems workshops: 17 - 20 June 2008, Beijing, China ; proceedings, Los Alamitos, Calif.: IEEE Computer Society, 42–47.
  • M. Dunte and C. Ruland, “Realising Time-Iimitation for Cryptographic Keys in Secure Multimedia Distribution,” Security and Communication Networks, vol. 1, no. 6, 451–459, 2008.
  • A. Groll, J. Holle, and C. Ruland, “Simulative Bestimmung der CAN-Bus-Lastgrenzen,” in Automotive - Safety & Security 2008 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik: 19. und 20. November 2008, Stuttgart, Aachen: Shaker.
  • A. Groll and C. Ruland, “Trusted Communication Groups for Authentic In-Car Communication,” in Proceedings of the 6th escar - Embedded Security in Cars Conference, Hamburg.
  • S. Tcaciuc and C. Ruland, “Optimizations of Flow Control under QOS Aspects between Core Network and Access Network Domains,” in Proceeding of the 2nd International Conference "Telecommunications, Electronics and Informatics", Chisinau, Moldova, 37–42.
  • N. Zivic and C. Ruland, “Joint Channel Coding - Cryptography,” in Infoteh, Jahorina, Bosnia, 2008.
  • N. Zivic and C. Ruland, “Method for Improvement of Soft Input Decryption Performances,” in 12th WSEAS Conf. on Computer Sciences: July 2008, Herklion, Greece, 2008.
  • N. Zivic and C. Ruland, “Channel Coding as a Cryptography Enhancer,” Transaction on Communications, vol. 7, no. 3, 83–91, 2008.
  • N. Zivic and C. Ruland, “Feedback in Soft Input Decryption,” WSEAS Transactions on Communications, vol. 7, no. 5, 428–437, 2008.
  • N. Zivic and C. Ruland, “Optimization of Soft Input Decryption,” in Conference on Soft Computing, Brno University of Technology, Brno University of Technology, Czech Republic, 241–246.
  • N. Zivic and C. Ruland, “Parallel Joint Channel Coding and Cryptography,” International Journal of Computer Science and Engineering, WASET World Academy of Science, Engineering and Technology, vol. 4, no. 2, 140–144, 2008.
  • N. Zivic and C. Ruland, “Parallel Joint Channel Coding and Cryptography: July 2008,” Proceedings of World Academy of Science, Engineering and Technology, vol. 31, 536–539, 2008.
  • N. Zivic and C. Ruland, “Probability of Collisions in Soft Input Decryption,” in Recent advances on applied mathematics: Proceedings of the American Conference on Applied Mathematics (MATH '08) : Cambridge, Massachusetts, USA, March 24 - 26,2008, Athen: WSEAS Press, 362–366.
  • N. Zivic and C. Ruland, “Soft Input Decryption using feedback,” in 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems (SEPAD '08), University of Cambridge, UK, Feb 20 - Feb 22, 2008, 174–177.
  • N. Zivic and S. Tcaciuc, “Feedback using dummy bits,” in Proccedings of the Applied Computing Conference, Istanbul, Turkey, 104–107.
  • N. Zivic and O. Ur Rehman, “Cryptographic Check Values as Channel Coding Redundancy,” in 12th IEEE International Multitopic Conference, Institute of Electrical and Electronics Engineers, Ed, Karachi, Pakistan, 2008, 178–181.

2007

  • M. Dunte and C. Ruland, “On the Way to Secure Delivery of Scalable Coded Media,” in Mikulášská kryptobesídka, Prag, Tschechische Republik, 2007, 51–59.
  • M. Dunte and C. Ruland, “Secure Voice-over-IP,” IJCNS International Journal of Computer Science and Network Security, vol. 7, no. 6, 63–68, 2007.
  • S. Hick and C. Ruland, “Security Aspects for Secure Download of Regulated Software,” in Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4 - 6, 2007 ; proceedings, Berlin: Springer, 219–227.
  • T. Lohmann and C. Ruland, “Digital Signatures Based on Elliptic Curves in RFIDs,” IJCNS International Journal of Computer Science and Network Security, vol. 7, no. 1, 275–281, 2007.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Deployment of E-Government Municipal Services: Enforcement of Security Polices,” in Secure E-government web services, A. Mitrakas, Ed, Hershey: Idea Group Publ, 2007, 111–123.
  • C. Ruland, “Secure Online Metering for a Liberalized Energy Market,” in Secure E-government web services, A. Mitrakas, Ed, Hershey: Idea Group Publ, 2007, 97–110.
  • C. Ruland and N. Zivic, “Joint Coding and Decryption,” in Ictis' 07, Fes, Marokko, 2007.
  • N. Zivic and C. Ruland, “Soft Input Decryption and its Iterative Application,” in TELFOR: November 20-22, Belgrade, Serbia, 2007.
  • N. Zivic and C. Ruland, “Channel coding as a cryptography enhancer,” in Proceedings in the 11 th WSEAS international conference on Communications, Crete Island, Greece, 2007, 273–278.
  • N. Zivic and C. Ruland, “Improvement of Digital Signature Error Rates,” in Information, Communication and Automation Technologies ICAT 2007, Sarajewo, 2007.
  • N. Zivic and C. Ruland, “Probability of Collisions in Soft Input Decryption,” International Journal of Applied Mathematics and Informatics, vol. 1, no. 1, 21–27, 2007.

2006

  • N. Kang, L. Lo Iacono, C. Ruland, and Y. Kim, “Efficient Application of IPsec VPNs in Wireless Networks,” in ISWPC 2006 Conference Proceedings: IEEE conference International Symposium on Wireless Pervasive Computing 2006, Phuket, Thailand, 337–341.
  • L. Lo Iacono, S. Müller, C. Ruland, and N. Zisky, “Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt,” Datenschutz und Datensicherheit (DuD), no. 6, 347–352, 2006.
  • L. Lo Iacono, C. Ruland, and N. Zisky, “Secure transfer of measurement data in open systems,” Computer Standards & Interfaces, vol. 28, 2006.
  • T. Lohmann and C. Ruland, “Security Levels of Bluetooth,” in Workshop on Intelligent Transportation, Hamburg.
  • C. Ruland, T. Lohmann, and M. Schneider, “Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags,” in Smart Card Research and Advanced Applications: 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, Berlin Heidelberg: Springer-Verlag GmbH, 278–288.
  • C. Ruland and N. Zivic, “Soft Input Decryption, Turbo Coding 2006,” in Turbo-Coding-2006: 4th International Symposium on Turbo Codes & Related Topics ; 6th International ITG-Conference on Source and Channel Coding ; April 03 - 07, 2006, Munich, Berlin: VDE Verl.

2005

  • L. H. B. Dietze, L. Lo Iacono, and C. Ruland, “Qualifizierte Signatur im elektronischen Messdatenaustausch,” in Qualifizierte elektronische Signaturen in Theorie und Praxis (QSIG 2005): Workshop im Rahmen der GI Tagung, Sicherheit 2005, Regensburg.
  • K. Hong, S. W. Jung, L. Lo Iacono, and C. Ruland, “Impacts of Security Protocols on Real-time Multimedia Communications,” Lecture Notes, Computer Science, vol. 3325, no. 2, 1–13, 2005.
  • S. W. Jung, N. Kang, C. Ruland, and Y. Kim, “Efficient Way to Employ Stream Authentication Schemes in Multicast Using Short-lived Keys,” in Preproceedings of WISA 2005 vol.6, The 6th International Workshop on Information Security Applications, Jeju in Korea.
  • M. Kahmann, L. Lo Iacono, C. Ruland, and T. Schütze, “Sicherheitskonzept,” in PTB-BerichtIT, Informationstechnik, vol. 12, Das SELMA-Projekt: Konzepte, Modelle, Verfahren, N. Zisky, Ed, Bremerhaven: Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005, 165–246.
  • A. Kaliotzoglou, A. Karantjias, N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Design Principles and Aspects for Cross-Border Municipal Service Deployment,” in Workshop and Poster Proceedings of the 4th International EGOV Conference, EGOV'05 4th International Conference on Electronic Government, Denmark.
  • N. Kang, A. Kunz, L. Lo Iacono, and C. Ruland, “Analysis of the QoS Requirements under Radio Access Network Planning Aspects for GPRS/EDGE and UMTS,” in IEEE WirelessCom 2005 Conference, First International Symposium on Wireless Quality-of-Service (WiQoS'05), Maui, Hawaii, USA.
  • N. Kang and C. Ruland, “MDS: Multiplexed Digital Signature for Real-time Streaming over Multisessions,” in The International Conference on Information Networking (ICOIN) 2005, Jeju, Korea, 824–834.
  • N. Kang and C. Ruland, “Security analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining,” IEICE Transaction on Communications, vol. E88-B, no. 3, 2005.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “An Architecture for Secure Policy Enforcement in E-Government Services Deployment,” in Communications and multimedia security: 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; proceedings, Berlin: Springer.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Enforcement of Security Policies for e-Government Services on Municipal and Cross-Border Level,” in Proceedings of the Int. Conference on e-Government, Ottoawa, Canada, 311–320.
  • N. Oikonomidis, C. Ruland, and S. Tcaciuc, “Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations,” in Second International Conference, TrustBus 2005, Berlin Heidelberg: Springer-Verlag, 141–150.
  • M. Wahl (geb. Angele), C. Ruland, and T. Schütze, “Sicherheitsanalyse,” in PTB-BerichtIT, Informationstechnik, vol. 12, Das SELMA-Projekt: Konzepte, Modelle, Verfahren, N. Zisky, Ed, Bremerhaven: Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005, 117–164.

2004

  • N. Kang and C. Ruland, “DiffSig: Differentiated Digital Signature for Real-time Multicast Packet Flows,” in Lecture Notes in Computer Science: 1st International Conference on Trust and Privacy in Digital Business (TrustBus '04) in conjunction with the 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Zaragoza, Spain.
  • N. Oikonomidis and C. Ruland, “Identity Based Protocols for Secure Electronic Content Distribution and Licensing 4th International Conference on Web Delivering of Music,” in Proceedings of IEEE Computer Society, Universität Pompeu Fabra, Barcelona, Spain, 92–99.
  • C. Ruland and S. Tcaciuc, “A Table Based Scheduler for the QoS enabled Flow Control in GPRS/EDGE Networks,” in IASTED International Conference on Communication Systems and Networks CSN 2004, Marbella, Spain.
  • C. Ruland and S. Tcaciuc, “Scheduler Based Flow Control under QoS Aspects in GPRS/EDGE Networks,” in IEEE International Conference on Networks 2004/ICON 2004, Singapur.
  • C. Ruland and M. Wahl, “Usage of Mobile Agents for Wireless Multimedia Communication,” in Proceedings of IASTED conference on Communication Systems and Applications (CSA 2004): Acta-Press, IASTED conference on Communication Systems and Applications (CSA 2004), Canada.

2003

  • L. Lo Iacono, C. Ruland, and M. Wahl, “Einsatz der elektronischen Signatur für den Messdatenaustausch im liberalisierten Energiemarkt (Secure Electronic Exchange of Metering Data),” in VDI Berichte Nr. 1785, Telematik Tagung, Siegen.

2002

  • A. Friesen and C. Ruland, “Das eContract-Konzept Ein Sicherheitsmodell für Multi-Service-Multi-Provider-Architekturen Enterprise Security,” in Tagungsband Enterprise Security
  • A. Friesen and C. Ruland, “Design eines Profil- und Zertifikatsmanagementsystem für das Service by eContract-Konzept,” in Lecture Notes in Informatics: GI Jahrestagung, GI-Edition, Bonn.
  • L. Lo Iacono and C. Ruland, “Confidential Multimedia Communication in IP Networks,” in 8th IEEE International Conference on Communication Systems, Singapur.
  • L. Lo Iacono and C. Ruland, “Eine Sicherheitsarchitektur für den Austausch elektronischer Messdaten im liberalisierten Energiemarkt,” in SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin.
  • L. Lo Iacono, C. Ruland, and N. Schweitzer, “Signing Digital Streams,” in Proceedings of 4th International ITG Conference on Source and Channel Coding: 4th International ITG Conference on Source and Channel Coding, Berlin, 324–334.
  • C. Ruland and F. Schlake, “A Security Protocol Providing QOS in ATM Networks,” in 8th IEEE International Conference on Communication Systems, Singapur.
  • C. Ruland and M. Wahl, “Sicherheitsanalyse der Übertragung von Energiedaten über offene Netze,” in SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin.

2001

  • A. Friesen and C. Ruland, “Service by e-contract - a security model for authentication, access control and online subscription management multi-service-multi-provider architectures,” in Proceedings, Volume II Information Systems: World Multiconference on Systemics, Cybernetics and Informatics, Orlando, 581–585.
  • C. Geuer-Pollmann and C. Ruland, “XML-Sicherheit - Stand heute,” in Sicherheit im Internet: Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg, 197–209.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS,” in V. Varadharajan u. Y. Mu (Eds), LNCS 2119, Berlin Heidelberg, 344–359.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Properties of Modes of Operation with Statistical Self-Synchronization Mechanisms,” in ICICS Shaping The New Information ERA: 3rd International Conference on Information, Communications and Signal Processing, Singapur.
  • O. Jung, S. Kuhn, C. Ruland, and K. Wollenweber, “Suitability of Cryptographic Modes of Operation for the Encryption in High- Speed Networks,” in IEEE Proceedings, Bangkok, Thailand, 134–139.
  • C. Ruland and N. Schweitzer, “Digitale Signatur von Bitströmen,” in 7. Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg: Secumedia-Verlag, Ingelheim 2001.

2000

  • C. Geuer-Pollmann, C. Ruland, M. Moula, and P. Sklavos, “Digital Signatures for Web Content E-business,” in Key Issues, Applications and Technologies, Amsterdam: IOS Press, 2000, 218–224.
  • C. Ruland and O. Weissmann, “Advanced Encryption Standard,” Funkschau, 2000.
  • C. Ruland and O. Weissmann, “Secure Subscription Management on Agent based Platforms,” in Globalcom 2000, San Francisco.

1999

  • A. Friesen, N. Oikonomidis, C. Ruland, and O. Weissmann, “A Distributed Certificate Management System for Use in Agent System,” in Workshop Proceedings, M1-M9, 2nd ACTS Workshop, Singapur.
  • C. Geuer-Pollmann and C. Ruland, “Das Simple Signature Protocol für WWW-Sicherheit,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Ingelheim: Secumedia-Verlag, 461–465.
  • O. Jung and C. Ruland, “Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks,” in Tagungsband Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Worcester, USA.
  • S. Kuhn, C. Ruland, and K. Wollenweber, “ATM-Encryption with 155 Mbit,” in IEEE ATM-Workshop '99, Kochi-Japan.
  • S. Kuhn, C. Ruland, and K. Wollenweber, “ATM-Verschlüsselung mit 155 Mbit/s,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Ingelheim: Secumedia-Verlag, 287–295.
  • C. Ruland, “Security vor dem Wachstumsschub,” Comparex Journal, vol. 28, 10–11, 1999.
  • C. Ruland and O. Weissmann, “Zugangskontrolle für universelle Dienstenutzung in Agentensystemen,” in Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, Secumedia-Verlag: Ingelheim, 455–460.

1998

  • C. Ruland, “Electronic Commerce,” 25 Jahre Telemation Jubiläumsausgabe, no. 10, 1–9, 1998.

1997

  • C. Ruland, “Breitbandverschlüsselung (155 Mbit/s) mit Selbstsynchronisation,” in 5. Deutscher IT-Sicherheitskongreß des BSI 1997, „Mit Sicherheit in die Informationsgesellschaft“, Tagungsband erschienen im SecuMedia Verlag, Ingelheim: Secumedia-Verlag, 289–301.
  • C. Ruland, “Regierung umgeht Datenschutz: Orwell durch die Hintertür?,” Computerwoche, no. 15, 20, 1997.

1995

  • D. Fox, T. Henn, K. Reichel, and C. Ruland, “Guardeded Authentic Local Area Network - GALAN -,” in Proceedings der Fachtagung Verläßliche Systeme: VIS'95,DuD-Fachberichte, Braunschweig: Vieweg-Verlag, 163–180.
  • C. Ruland, “Datenkompression,” in Das Telekommunikationswerk, D. Schulte, Ed, Augsburg: Interest Verlag GmbH, 1995, 1–48.
  • C. Ruland, “Sichere Kommunikation zwischen ISDN-Endgeräten,” Datacom, 108–116, 1995.
  • C. Ruland, “Sicherheit in Verteilten Systemen,” in Tutoriumsband: KiVS'95, Chemnitz, 1–45.

1994

  • D. Dienst, D. Fox, and C. Ruland, “Transparente Sicherheitsmechanismen für ISDN-Anwendungen,” in Nutzung u. Technik von Kommunikationsendgeräten, G. Kleinke, Ed, Offenbach: VDE-Verlag, 1994, 81–95.
  • C. Ruland, “Kontrollierter Zugang,” Business Computing Januar, no. 1, 28–31, 1994.
  • C. Ruland, “Secure Common ISDN Application Programming Interface (S-CAPI),” in Sicherheitsschnittstellen – Konzepte, Anwendungen und Einsatzbeispiel: DUV Deutscher Universitätsverlag; Gabler Vieweg Westdeutscher Verlag, 1994.

1993

  • C. Ruland, “Realizing Digital Signatures with One-Way Hash Functions,” Cryptologia, vol. 17, no. 3, 285–300, 1993.

1991

  • H. Kallerhoff and C. Ruland, “Statistische Untersuchungen von Pseudozufallszahlenfolgen,” KES Kommunikations- und EDV-Sicherheit, no. 3, 156–163, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Grundlagen und Übersicht,” Datacom, no. 4, 88–96, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Grundlagen und Übersicht (Fortsetzung),” Datacom, no. 5, 113–120, 1991.
  • M. Longerich and C. Ruland, “Datenkompression, Implementation und Vergleichstests,” Datacom, no. 8, 97–103, 1991.

1990

  • C. Ruland, “Datensicherheit in Lokalen Netzen, Teil 2,” Datacom, no. 1, 100–107, 1990.
  • C. Ruland, “Sichere Übertragung und Archivierung elektronischer Dokumente,” Datacom, no. 3, 120–130, 1990.
  • C. Ruland, “Sicherheit und Sicherheitsmanagement in Offenen Kommunikationssystemen,” Sonderheft Netzwerkmanagement Spezial, Datacom Verlag, 202–213, 1990.
  • C. Ruland, “Vertrauenswürdigkeit und Vertraulichkeit elektronischer Dokumente,” Recht der Datenverarbeitung (RDV), no. 4, 168–174, 1990.

1989

  • D. Bong and C. Ruland, “Optimized Software Implementation of the Modular Exponentiation on General Purpose Microprocessors,” Computers & Security, no. 8, 621–630, 1989.
  • N. Pohlmann and C. Ruland, “Datensicherheit bei Kommunikation über Datex-P,” Datacom, no. 1, 64–70, 1989.
  • C. Ruland, “Datensicherheit in Lokalen Netzen, Teil 1,” Datacom, no. 12, 94–99, 1989.
  • C. Ruland, “Zur Datensicherheit in Lokalen Netzen,” Recht der Datenverarbeitung (RDV), no. 5/6, 210–218, 1989.

1988

  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 4: Sicherheitsmechanismen und ISO-Referenzmodell,” Datacom, no. 1, 92–97, 1988.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 5: Realisierung einer Datenschutzeinrichtung,” Datacom, no. 3, 114–120, 1988.

1987

  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 1: Einführung und Begriffe,” Datacom, no. 1, 78–84, 1987.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 2: Verschlüsselungsverfahren,” Datacom, no. 4, 98–104, 1987.
  • C. Ruland, “Datenschutz in Kommunikationssystemen Teil 3: Authentizitätsprüfungs-verfahren und Schlüsselverteilung,” Datacom, no. 9, 172–177, 1987.
  • C. Ruland, “Sicherheitsarchitektur in Offenen Kommunikationssystemen,” Elektrotechnik und Maschinenbau (E und M), no. 12, 533–537, 1987.

1981

  • C. Ruland, “Algorithmen zur adaptiven Berechnung der schnellsten Wege in Virtuellen Netzen,” Angewandte Informatik, no. 11, 492-496, 1981.
  • C. Ruland, “Routing in Virtuellen Netzen,” Elektronische Rechenanlagen, vol. 23, no. 4, 164–167, 1981.
  • C. Ruland, “Virtuelle Netze für verschiedene Benutzerklassen,” Online Heft 6, 456–458, 1981.
  • C. Ruland, “Was ist ein Virtuelles Netz?,” Elektronische Rechenanlagen, vol. 23, no. 3, 134–136, 1981.

1978

  • C. Ruland, “Ein Verfahren zur Lösung von (Δ + k2) u = 0 in Außengebieten mit Ecken,” Applicable Analysis, vol. 7, 69–79, 1978.

1973

  • C. Ruland, “Zur theoretischen und numerischen Lösbarkeit des Dirichletschen Außenraumproblems für die Helmholtzsche Schwingungsgleichung,” Diplomarbeit, Universität Bonn, Bonn, 1973.