| 2024
Yatagha, R., Nebebem B., Waedt. K., Ruland, C.: Towards a Zero-Day Anomaly Detector in Cyber Physical Systems Using a Hybrid VAE-LSTM-OCSVM Model
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management
Pages 5038 – 5045.
Mejri, O., Waedt, K., Yatagha, R., Ruland, C., Zeddini, O.: Using Knowledge Representation to achieve reliable and trustworthy AI in
Sensitive Infrastructure
8th International Symposium on Future Instrumentation and Control for Nuclear Power Plants, (ISOFIC 2024), December, 2024, Jeju, KoreaC. Ruland et. Alt.: A Comparative Study
                    on the Disparities and Performance Metrics
                    between NoSQL Graph and Relational
                    Databases, International Conference on
                    Electrical and Computer Engineering
                    Researches (ICECER), 4.-6- December,
                    Gaborone, BotswanaC. Ruland: ML-based Synthetic OPC UA
                    Traffic Generation For Covert Channel
                    Transmission, International Conference on
                    Electrical and Computer Engineering
                    Researches (ICECER), 4.-6- December,
                    Gaborone, Botswana 2022
                    Catovic, E. Kadusic, N. Zivic, N.
                    Hadzajlic, C. Ruland: AIR POLLUTION
                    PREDICTION AND WARNING SYSTEM USING IOT AND
                    MACHINE LEARNING, 2022 International
                    Conference on Electrical, Computer,
                    Communications and Mechatronics Engineering
                    (ICECCME), 16-18 November 2022, Maldives,
                    Maldives, Publisher: IEEE - DOI:
                    10.1109/ICECCME55909.2022.9987957 E. Kadusic, N. Hadzajlic, C. Ruland, N.
                    Zivic: THE FACTORS FOR CHOOSING AMONG
                    NB-IOT, LORAWAN, AND SIGFOX RADIO
                    COMMUNICATION TECHNOLOGIES FOR IOT
                    NETWORKING, 2022 International Conference
                    on Connected Systems & Intelligence
                    (CSI), 31 August 2022 - 02 September 2022,
                    Trivandrum, India, Publisher: IEEE - DOI:
                    10.1109/CSI54720.2022.9923999 E. Kadusic, N. Zivic, N. Hadzajlic, C.
                    Ruland: THE TRANSITIONAL PHASE OF
                    BOOST.ASIO AND POCO C++ NETWORKING
                    LIBRARIES TOWARDS IPV6 AND IOT NETWORKING
                    SECURITY, 2022 IEEE International
                    Conference on Smart Internet of Things
                    (SmartIoT), 19-21 August 2022, Suzhou,
                    China, Publisher: IEEE - DOI:
                    10.1109/SmartIoT55134.2022.00022 E. Kadusic, N. Zivic, N. Hadzajlic, C.
                    Ruland: A SMART PARKING SOLUTION BY
                    INTEGRATING NB-IOT RADIO COMMUNICATION
                    TECHNOLOGY INTO THE CORE IOT PLATFORM,
                    Future Internet 2022, 14(8), 219;
                    https://doi.org/10.3390/fi14080219,
                    Published: 25 July 2022. 2020
                    C. Ruland (Hrsg): Jochen
                    Saßmannshausen: Attribute-based access
                    control for smart grids and industrial
                    automation and control systems. In:
                    Forschungsberichte / Universität Siegen,
                    Institut für Digitale Kommunikationssysteme
                    Band 40. Düren: Shaker Verlag, 2020.
                    -  ISBN 978-3-8440-7507-6 2019
                    E. Kadusic, N. Zivic, A. Masovic, C.
                    Ruland: “Implementation of MQTT Native
                    Application for Tizen-based Smartwatches”,
                    6th Annual Conference on Computational
                    Science and Computational Intelligence,
                    December 5-7, Las Vegas, Nevada, USAA. Tellabi, M. Parekh, C. Ruland, M.
                    Ezziyyani , “A case study of virtualization
                    used in Mixed Criticality Systems,”
                    Advanced Intelligent Systems for
                    Sustainable Development (AI2SD), Marrakech,
                    Morocco, 2019J. Fehmi, A. Tellabi, S. AbdelBast, C.
                    Ruland, “On the Analysis of the Impact of
                    Scheduling Plans in Safety Critical
                    Requirements in Virtualization,”
                    International Conference on Cybersecurity
                    (ICOCSec), Malaysia, 2019A. Tellabi, C. Ruland, K. Waedt, A.
                    Sabri, “Self-Diagnostics and Isolation
                    mechanisms for Mixed Criticality Systems,”.
                    In Journal of Communications Software and
                    Systems (JCOMSS), 2019. DOI:
                    http://dx.doi.org/10.24138/jcomss.v15i4.810A. Tellabi, C. Ruland, "Empirical Study
                    of Real-Time Hypervisors for Industrial
                    Systems," 2019 International Conference on
                    Computational Science and Computational
                    Intelligence (CSCI), 2019, pp. 208-213,
                    doi: 10.1109/CSCI49370.2019.00042N. Zivic, C. Ruland and O. Ur-Rehman,
                    "Addressing Byzantine Fault Tolerance in
                    Blockchain Technology," 2019 8th
                    International Conference on Modeling
                    Simulation and Applied Optimization
                    (ICMSAO), Manama, Bahrain, 2019, pp.
                    1-5 [Link].N. Zivic, C. Ruland, J.
                    Sassmannshausen: Distributed Ledger
                    Technologies for M2M Communications, The
                    33rd International Conference on 
                    Information Networking (ICOIN 2019) January
                    9-11, 2019, Kuala Lumpur, Malaysia
                    [Link].O. Ur-Rehman, N. Zivic, C. Ruland: An
                    Overview of Automotive Security Standards,
                    Mipro 2019, 20-24 May 2019, Opatija,
                    Croatia [Link].C. Ruland: Protect and Conserve Robot's
                    Transactions, Invited Talk on the 4th World
                    Congress of Robotics 2019 (WCR-2019), Aug.
                    31-Sep. 1, Shenyang, ChinaC. Ruland, J. Sassmannshausen:
                    System-wide Traceability of Commands and
                    Data Exchange in Smart Grids, SEST'19 - 2nd
                    International Conference on Smart Energy
                    Systems and Technologies, September 9-11,
                    Porto, Portugal (paper accepted). 2018
                    A. Tellabi, I. Ben Zid, C. Ruland, K.
                    Waedt , “Virtualization on Secure Platforms
                    for Industrial Applications Current use
                    cases and future perspectives, ”. In: 12th
                    International Conference on Reliability
                    Maintainability and Safety (ICRMS),
                    2018A. Tellabi, L. Peters, C. Ruland, K.
                    Waedt, “Security Aspects of Hardware
                    Virtualization Technologies for Industrial
                    Automation and Control Systems,” GIACM
                    Workshop on I4.0/IACS Standardization,
                    Berlin, 2018C. Ruland, J. Sassmannshausen, Jyoti
                    Pragyan Satpathy "An Attribute Certificate
                    Management System for Attribute-based
                    Access Control" 5th Annual Conf. on
                    Computational Science & Computational
                    Intelligence (CSCI'18), Las Vegas, Dec
                    13-15, 2018 [Link].C. Ruland, J. Sassmannshausen "Access
                    Control in Safety Critical Environments"
                    12th International Conference on
                    Reliability, Maintainability and Safety
                    (ICRMS2018), Shanghai, China, Oct
                    15-17, 2018 [Link].C. Ruland, J. Sassmannshausen,
                    "Firewall for Attribute-Based Access
                    Control in Smart Grids," 2018 IEEE
                    International Conference on Smart Energy
                    Grid Engineering (SEGE), Oshawa, ON,
                    Canada, 2018, pp. 336-341. [Link]Asmaa Tellabi, Jochen Sassmannshausen,
                    Edita Bajramovic, and Karl Christoph
                    Ruland. Overview of authentication and
                    access controls for i&c systems. In
                    16th IEEE International Conference on
                    Industrial Informatics, INDIN 2018, Porto,
                    Portugal, July 18-20, 2018, pages 882–889,
                    2018. [Link]N. Zivic and C. Ruland, "Cognitive
                    Channel Decoding", Future of Information
                    and Communication Conference (FICC 2018),
                    Singapore, Apr. 2018.N. Zivic and C. Ruland, "Cognition for
                    Enhanced Biometric Authentication," The
                    32nd International Conference on
                    Information Networking (ICOIN 2018), Chang
                    Mai, Thailand, Jan. 2018. 2017
                    T. Wu and C. Ruland, "A redundancy
                    based compressive sensing recovery
                    optimization," 2017 40th International
                    Conference on Telecommunications and Signal
                    Processing (TSP), Barcelona, 2017, pp.
                    502-505.R. A. Djeujo and C. Ruland, "QoSs
                    definition and session description protocol
                    for secure communication using compressive
                    sensing," 6th International Conference on
                    Future Generation Communication
                    Technologies Conference (FGCT), Dublin,
                    Ireland, Aug. 21-23, 2017, pp. 1-7.R. A. Djeujo and C. Ruland, "Secret
                    matrix lifecycle management for compressive
                    sensing based cryptographic mechanisms,"
                    IEEE 3th Annual Conference in Computing,
                    Communication, Control, And Automation
                    Conference (ICC3A), Pune, India, Aug.
                    17-18, 2017, pp. 1-10.C. Ruland and J. Sassmannshausen,
                    "Transaction-based security for Smart
                    Grids", IEEE International Conference on
                    Smart Energy Grid Engineering (SEGE 2017),
                    Oshawa, Canada, Aug 14-17, 2017. [Link]C. Ruland, J. Sassmannshausen, K.Waedt
                    and N. Zivic, "Smart grid security - an
                    overview of standards and guidelines", e
                    & i Elektrotechnik und
                    Informationstechnik, vol. 134, issue 1, pp.
                    19-25, Feb 2017, Springer Wien. [Link]O. Ur Rehman, N. Živić and C. Ruland,
                    "Approximate Image Authentication and
                    Correction Using Spatial and Frequency
                    Domain Features", 11th International ITG
                    Conference on Systems, Communications and
                    Coding (SCC 2017), Hamburg, Germany, Feb. 6
                    - 9, 2017.R. Fay and C. Ruland, "Compressed
                    Sampling and Authenticated-Encryption",
                    11th International ITG Conference on
                    Systems, Communications and Coding (SCC
                    2017), Hamburg, Germany, Feb. 6 - 9,
                    2017.N. Živić, O. Ur Rehman and C.
                    Ruland, "Iterative Decoder for OFDM
                    Transmission over Rayleigh Channel", 31st
                    International Conference on Information
                    Networking (ICOIN 2017), Da Nang, Vietnam,
                    Jan. 11 - 13, 2017.R. A. Djeujo and C. Ruland,
                    “Embedding cryptographically secure matrix
                    transformation in structured compressive
                    sensing,” IEEE Annual Computing and
                    Communication Workshop and Conference (CCWC
                    2017), pp. 529–535, Las Vegas, USA, Jan
                    9-11, 2017. 2016
                    G. Gala, T. Koller, D. G. Pérez, G.
                    Fohler and C. Ruland, "Timing Analysis of
                    Secure Communication between Resource
                    Managers in DREAMS," Workshop on Security
                    and Dependability of Critical Embedded
                    Real-Time Systems, Porto, Portugal, Nov.
                    29, 2016. [Link]C. Ruland, N. Kang and J.
                    Sassmannshausen, "Rejuvenation of the IEC
                    61850 Protocol Stack for MMS", IEEE
                    International Conference on Smart Grid
                    Communications (SmartGridComm 2016),
                    Sydney, Australia, Nov. 6-9, 2016.
                    [Link]R. A. Djeujo and C. Ruland,
                    “Secure matrix generation for compressive
                    sensing embedded cryptography,” IEEE Annual
                    Information Technology, Electronics and
                    Mobile Communication Conference (IEMCON
                    2016), pp. 250–257, Vancouver, BC, Canada,
                    Oct. 13-15, 2016. [Link]T. Koller, G. Gala, D. G. Perez, C.
                    Ruland, G. Fohler, "DREAMS: Secure
                    Communication between Resource Management
                    Components in Networked Multi-Core
                    Systems", IEEE Conference on Open Systems
                    2016 (ICOS 2016), Langkawi, Malaysia, Oct.
                    10-12, 2016 (Best paper
                    award). [Link]N. Živić, O. Ur Rehman and C.
                    Ruland, "Smart Metering for Intelligent
                    Buildings", Transactions on Networks and
                    Communications, vol. 4, no. 5, Oct. 2016.
                    [Link]M. Schneider and C. Ruland,
                    "Verification of Time Signals", 30th
                    European Frequency and Time Forum (EFTF),
                    York, UK, Apr 4-7, 2016. [Link]O. Ur Rehman, N. Zivic and C.
                    Ruland, "Content based Image Authentication
                    with Error Correction", IEEE International
                    Conference on Communications (IEEE ICC'16),
                    Communication and Information System
                    Security Symposium, Kuala Lumpur, Malaysia,
                    May 23-27, 2016. [Link] 2015
                    M. Schneider and C. Ruland,
                    “Verification of time telegrams in Long
                    Wave Radio systems", IEEE 2015 Joint
                    Conference of the IEEE International
                    Frequency Control Symposium & the
                    European Frequency and Time Forum
                    (IFCS-EFTF), Denver, Colorado, USA, pp.
                    270-275, Apr 12-16 2015. [Link]A. E. Tabatabaei, O. Ur Rehman,
                    N. Živić, and C. Ruland, “Secure and Robust
                    Two-phase Image Authentication", IEEE
                    Transactions on Multimedia, vol. 17, no. 7,
                    pp. 945-956, Jul 2015. [Link]O. Ur Rehman, A. E. Tabatabaei,
                    N. Živić, and C. Ruland: "Spatial and
                    Frequency Domain Complementary Watermarks
                    for Image Authentication and Correction,”
                    the 10th International ITG Conference on
                    Systems, Communications and Coding (SCC
                    2015) , Hamburg, Germany, pp. 1-6, Feb 2-5,
                    2015. [Link]O. Ur Rehman, N. Živić, and C.
                    Ruland, "Security Issues in Smart Metering
                    Systems", (Overall best paper and
                    innovation award), IEEE
                    International Conference on Smart Energy
                    Grid Engineering (SEGE 2015), Oshawa
                    Canada, Aug 17-19, 2015. [Link]J. Saßmannshausen and C. Ruland,
                    "Nachweisbarkeit in Smart Grids auf Basis
                    von XML-Signaturen", D.A.CH Security 2015,
                    syssec  IT Security & IT
                    Management, p. 98–109, Frechen, Germany,
                    Sep 8-9, 2015.J. Saßmannshausen and C. Ruland,
                    "End-to-End-Authentication in Smart Grid
                    Control", IEEE International Conference on
                    Smart Energy Grid Engineering (SEGE 2015),
                    Oshawa, Canada, Aug 17-19, 2015. [ Link]N.
                    Živić, O. Ur Rehman and
                    C. Ruland, "Evolution of Smart Metering
                    Systems", 23rd IEEE Telecommunications
                    Forum (TELFOR 2015), Belgrade, Serbia, Nov
                    24-26, 2015. [Link]J. Sassmannshausen, C. Ruland,
                    "Non-repudiation Services for the MMS
                    Protocol of IEC 61850", Security
                    Standardization Research Conference (SSR
                    2015), Tokyo, Japan, Dec 15-16, 2015.
                    [Link] 2014
                    A. Schantin and C. Ruland, “A
                    Bit-Error Based Capture Model for EPCglobal
                    RFID Systems,” in 52th Annual Allerton
                    Conference on Communication, Control, and
                    Computing (Allerton), 2014, pp. 221–226.
                    [Link]J. Shin, D. Kim, and C. Ruland,
                    "Content based Image Authentication using
                    HOG feature descriptor," in IEEE
                    International Conference on Image
                    Processing, Paris, France, 27 - 30 Oct.
                    2014. [Link]J. Shin, and C. Ruland, "A Novel
                    Design of Content based Multimedia
                    Security," in 9th Future Security
                    Conference, Berlin, Germany, 16 - 18 Sep.
                    2014.J. Shin, and C. Ruland, "A Hybrid
                    Approach for Content Based Image
                    Authentication," in 11th International
                    Conference on Security and Cryptography
                    (SECRYPT'14), Vienna, Austria, 28 - 30 Aug.
                    2014, pp. 371-378. [Link]O. Ur Rehman, N. Živić, C.
                    Ruland: "Security in Smart Metering Systems
                    under the Smart-Grid Perspective",
                    Tutorium, IEEE BlackSeaCom 2014, May 2014,
                    Chisinau, Moldova 2013
                    S. Amir Hossein A. E. Tabatabaei, C.
                    Ruland: "The analysis of an NMF-based
                    perceptual image hashing scheme", IEEE
                    International Symposium on Signal
                    Processing and Information Technology,
                    Athens, 2013, pp. 108-112. [Link]A. Schantin and C. Ruland,
                    “Retransmission Strategies for RFID Systems
                    Using the EPC Protocol,” International
                    Conference on RFID Technologies and
                    Applications (RFID-TA), Johor Bahru,
                    Malaysia, Sep. 4-5, 2013. [Link]M. Schneider and C. Ruland,
                    “Sicherheit von Broadcast-Datendiensten im
                    Smart Grid am Beispiel der
                    Rundsteuertechnik,” in Informationssicherheit
                    stärken - Vertrauen in die Zukunft
                    schaffen: [Tagungsband zum 13.
                    Deutschen
                    IT-Sicherheitskongress],
                    Gau-Algesheim: SecuMedia-Verl, 2013, pp.
                    483–496.J. Shin and C. Ruland, “A Survey
                    of Image Hashing Technique for Data
                    Authentication in WMSNs,” in Workshop on
                    Internet of Things Communications and
                    Technologies (IOT 2013), Lyon,
                    2013, pp. 264–269. [Link]O. Ur Rehman, Tabatabaei, S. Amir
                    Hossein A. E, N. Zivic, and C. Ruland,
                    “Soft Authentication and Correction of
                    Images,” in Systems, Communication
                    and Coding (SCC), Proceedings of 2013 9th
                    International ITG Conference
                    on, 2013, pp. 1–6. [Link] 2012
                    R. Schick and C. Ruland,
                    “Non-Repudiation of Forwarding:
                    Traceability of Confidential Data Via
                    Multiple Recipients,” in
                    9th
                    International Conference of Security and
                    Cryptography: SciTePress,
                    2012, 387–390.R. Schick and C. Ruland, “On the
                    Security of the Non-Repudiation of
                    Forwarding Service,” in Trust, Privacy and
                    Security in Digital
                    Business: 9th International
                    Conference, TrustBus 2012, Vienna, Austria,
                    September 3-7, 2012.
                    Proceedings, Berlin,
                    Heidelberg, s.l.: Imprint: Springer, 2012,
                    167–178. [Link] 2011
                    J. Holle, A. Groll, C. Ruland, H.
                    Cankaya, and M. Wolf, “OPEN PLATFORMS ON
                    THE WAY TO AUTOMOTIVE PRACTICE,” in
                    8th ITS European
                    Congress, Lyon,
                    2011.R. Schick and C. Ruland, “Data
                    Leakage Tracking - Non-Repudiation of
                    Forwarding,” in First Internation
                    Conference on Informatics Engineering and
                    Information Science, 2011,
                    163–173. [Link]R. Schick and C. Ruland,
                    “Document Tracking - On the Way to a New
                    Security Service,” in Sixth Conference on
                    Network Architectures and Information
                    Systems Security, 2011, 89–93.
                    [Link]R. Schick and C. Ruland,
                    “Introduction of a New Non-Repudiation
                    Service to Protect Sensitive Private Data,”
                    in Second International
                    Conference on Advances in Information and
                    Communication Technologies,
                    2011.O. Ur Rehman, N. Zivic, S.
                    Tabatabaei, and C. Ruland, "Error
                    Correcting and Weighted Noise Tolerant
                    Message Authentication Codes," in Signal
                    Processing and Communication Systems
                    (ICSPCS), 2011 5th International Conference
                    on, 2011, pp. 1–8. [Link] 2010
                    C. Bodenstedt, C. Ruland, D.
                    Weber, and A. Kung, "Integration of
                    Security and Dependability into Resource
                    constrained Embedded Systems," in The 3rd
                    International Conference on
                    Telecommunications, Electronics and
                    Inforatics, Chisinau, Moldova: Technical
                    University of Moldova, 2010,
                    93–98.A. Groll, J. Holle, and C.
                    Ruland, "Upcoming Trends in the Automotive
                    IT and Associated Security Challenges," in
                    The 3rd International Conference on
                    Telecommunications, Electronics and
                    Inforatics, Chisinau, Moldova: Technical
                    University of Moldova, 2010, 25–30.
                    [Link]R. Schick, S. Tcaciuc, and C.
                    Ruland, "Information Security of Multimodal
                    Input Data -Traceability of Image Data," in
                    The 3rd International Conference on
                    Telecommunications, Electronics and
                    Inforatics, Chisinau, Moldova: Technical
                    University of Moldova, 2010,
                    31–34.M. Schneider and C. Ruland,
                    “Steckdose als virtuelle Zapfsäule,” in EMA
                    2010 - Elektromobilausstellung: Fachtagung,
                    Wettbewerbe; Vorträge der ETG-Fachtagung
                    vom 8. bis 9. Oktober 2010 in
                    Aschaffenburg, Berlin: VDE-Verl, 2010,
                    161–169. [Link]M. Schneider, S. Tcaciuc, and C.
                    Ruland, "Secure metering for electrical
                    vehicles," in E-Mobility: Technologien -
                    Infrastruktur - Märkte; VDE-Kongress 2010
                    Leipzig, 8.-9. November 2010 Congress
                    Center Leipzig; Kongressbeiträge, Berlin:
                    VDE-Verl, 2010, FZT 1.4.13. [Link]O. Ur Rehman, N. Zivic, and C.
                    Ruland, "Iterative bit-flipped decoding of
                    concatenated reed solomon/convolutional
                    codes with HMAC," in IEEE International
                    Symposium on Performance Evaluation of
                    Computer and Telecommunication Systems,
                    Ottawa, Canada, 2010, 410–415. [Link]N. Zivic and C. Ruland, "Security
                    Architecture for Smart Metering Systems,
                    Software Services for E-World," in 10th
                    IFIP Advances in Information and
                    Communication Technology, Buenos Aires,
                    Argentina: Springer-Verlag, 2010. [Link]N. Zivic, O. Ur Rehman, and C.
                    Ruland, "On the Probability and Impact of
                    Collisions on Soft Input Decryption," in
                    International Symposium on Applied Sciences
                    in Biomedical and Communication
                    Technologies, Rome, Italy, 2010, 1–5.
                    [Link] 2009
                    A. Groll and C. Ruland, “Gefahren
                    der In-Fahrzeug-Kommunikation moderner
                    Automobile,” in Sichere Wege in der
                    vernetzten Welt: [Tagungsband zum 11.
                    Deutschen IT-Sicherheitskongress ; vom 12.
                    - 14. Mai 2009 in Bonn],
                    Gau-Algesheim: SecuMedia-Verl,
                    2009.A. Groll and C. Ruland, “Secure
                    and Authentic Communication on Existing
                    Vehicle Networks,” in IEEE Intelligent
                    Vehicles Symposium, 2009: IV ; 3 - 5 June 2009,
                    Xi'an, China, Piscataway, NJ:
                    IEEE, 2009.J. Holle, A. Groll, C. Ruland, M.
                    Wolf, T. Wollinger, and F. Zweers, “OVERSEE
                    - A Secure and Open Communication and
                    Runtime Platform for Innovative Automotive
                    Applications,” in Proceedings of the 7th
                    escar - Embedded Security in Cars
                    Conference, Düsseldorf,
                    2009.N. Zivic, C. Ruland, and O. Ur
                    Rehman, “Error Correction over Wireless
                    Channel Using Symmetric Cryptography,”
                    in IEEE International
                    Conference on Wireless Communication
                    Society, Vehicular Technology, Information
                    Theory and Aerospace & Electronic
                    Systems Technology, Aalborg,
                    Denmark, 2009, 752–756. [Link]N. Zivic, O. Ur Rehman, and C.
                    Ruland, “Analysis of Serial and Parallel
                    Soft Input Decryption Schemes over a
                    Wireless Channel,” in IEEE International
                    Symposium on Performance Evaluation of
                    Computer and Telecommunication
                    Systems, Istanbul, Türkei:
                    IEEE, 2009, 282–288. [Link]N. Zivic, O. Ur Rehman, and C.
                    Ruland, “Using HMAC for Error correction
                    over Wireless Channel,” in
                    Symposia
                    and Workshops on Ubiquitous, Autonomic and
                    Trusted Computing, Brisbane,
                    Australien, 2009, 252–256. [Link] 2008
                    M. Dunte and C. Ruland,
                    “Construction and Usage of Time-limited
                    Keys in Secure Multimedia Distribution,”
                    in Third International
                    Conference on Communications and Networking
                    in China, 2008: ChinaCom 2008 ; 25 -
                    27 Aug. 2008, Hangzhou, China,
                    Piscataway, NJ: IEEE, 2008. [Link]M. Dunte and C. Ruland, “Delivery
                    Infrastructure for Secure Scalable Coded
                    Multimedia,” in 28th International
                    Conference on Distributed Computing Systems
                    workshops: 17 - 20
                    June 2008,
                    Beijing, China ; proceedings,
                    Los Alamitos, Calif.: IEEE Computer
                    Society, 2008, 42–47. [Link]M. Dunte and C. Ruland,
                    “Realising Time-Iimitation for
                    Cryptographic Keys in Secure Multimedia
                    Distribution,” Security and
                    Communication Networks, vol.
                    1, no. 6, 451–459, 2008.A. Groll, J. Holle, and C.
                    Ruland, “Simulative Bestimmung der
                    CAN-Bus-Lastgrenzen,” in
                    Automotive
                    - Safety & Security 2008 - Sicherheit
                    und Zuverlässigkeit für automobile
                    Informationstechnik: 19.
                    und 20.
                    November 2008, Stuttgart,
                    Aachen: Shaker, 2008.A. Groll and C. Ruland, “Trusted
                    Communication Groups for Authentic In-Car
                    Communication,” in Proceedings of the 6th
                    escar - Embedded Security in Cars
                    Conference, Hamburg,
                    2008.S. Tcaciuc and C. Ruland,
                    “Optimizations of Flow Control under QOS
                    Aspects between Core Network and Access
                    Network Domains,” in Proceeding of the 2nd
                    International Conference
                    "Telecommunications, Electronics and
                    Informatics", Chisinau,
                    Moldova, 2008, 37–42.N. Zivic and C. Ruland, “Joint
                    Channel Coding - Cryptography,” in
                    Infoteh,
                    Jahorina, Bosnia, 2008.N. Zivic and C. Ruland, “Method
                    for Improvement of Soft Input Decryption
                    Performances,” in 12th WSEAS Conf. on
                    Computer Sciences: July
                    2008, Herklion, Greece,
                    2008.N. Zivic and C. Ruland, “Channel
                    Coding as a Cryptography Enhancer,”
                    Transaction on
                    Communications, vol. 7, no. 3,
                    83–91, 2008.N. Zivic and C. Ruland, “Feedback
                    in Soft Input Decryption,”
                    WSEAS
                    Transactions on
                    Communications, vol. 7, no. 5,
                    428–437, 2008.N. Zivic and C. Ruland,
                    “Optimization of Soft Input Decryption,”
                    in Conference on Soft
                    Computing, Brno University of
                    Technology, Brno University of
                    Technology, Czech Republic, 2008,
                    241–246.N. Zivic and C. Ruland, “Parallel
                    Joint Channel Coding and Cryptography: July
                    2008,” Proceedings of World
                    Academy of Science, Engineering and
                    Technology, vol. 31, 536–539,
                    2008.N. Zivic and C. Ruland, “Parallel
                    Joint Channel Coding and
                    Cryptography,” International Journal
                    of Computer Science and Engineering, WASET
                    World Academy of Science, Engineering and
                    Technology, vol. 4, no. 2,
                    140–144, 2008.N. Zivic and C. Ruland,
                    “Probability of Collisions in Soft Input
                    Decryption,” in Recent advances on
                    applied mathematics: Proceedings of the
                    American Conference on Applied Mathematics
                    (MATH '08) : Cambridge, Massachusetts, USA,
                    March 24 - 26,2008, Athen:
                    WSEAS Press, 2008, 362–366.N. Zivic and C. Ruland, “Soft
                    Input Decryption using feedback,” in
                    7th WSEAS International
                    Conference on Software Engineering,
                    Parallel and Distributed
                    Systems (SEPAD
                    '08), University of Cambridge,
                    UK, 2008, 174–177. 2007
                    M. Dunte and C. Ruland, “On the
                    Way to Secure Delivery of Scalable Coded
                    Media,” in Mikulášská
                    kryptobesídka, Prag,
                    Tschechische Republik, 2007,
                    51–59.M. Dunte and C. Ruland, “Secure
                    Voice-over-IP,” IJCNS International
                    Journal of Computer Science and Network
                    Security, vol. 7, no. 6,
                    63–68, 2007.S. Hick and C. Ruland, “Security
                    Aspects for Secure Download of Regulated
                    Software,” in Trust, privacy and
                    security in digital
                    business: 4th international
                    conference, TrustBus 2007, Regensburg,
                    Germany, September 4 - 6, 2007 ;
                    proceedings, Berlin: Springer,
                    2007, 219–227. [Link]T. Lohmann and C. Ruland,
                    “Digital Signatures Based on Elliptic
                    Curves in RFIDs,” IJCNS International
                    Journal of Computer Science and Network
                    Security, vol. 7, no. 1,
                    275–281, 2007. [Link]N. Oikonomidis, C. Ruland, and S.
                    Tcaciuc, “Deployment of E-Government
                    Municipal Services: Enforcement of Security
                    Polices,” in Secure E-government
                    web services, A. Mitrakas, Ed,
                    Hershey: Idea Group Publ, 2007,
                    111–123.C. Ruland, “Secure Online
                    Metering for a Liberalized Energy Market,”
                    in Secure E-government
                    web services, A. Mitrakas, Ed,
                    Hershey: Idea Group Publ, 2007, 97–110.
                    [Link]C. Ruland and N. Zivic, “Joint
                    Coding and Decryption,” in
                    Ictis'
                    07, Fes, Marokko,
                    2007.N. Zivic and C. Ruland, “Soft
                    Input Decryption and its Iterative
                    Application,” in TELFOR:
                    November
                    20-22, Belgrade, Serbia,
                    2007.N. Zivic and C. Ruland, “Channel
                    coding as a cryptography enhancer,”
                    in Proceedings in the 11
                    th WSEAS international conference on
                    Communications, Crete Island,
                    Greece, 2007, 273–278.N. Zivic and C. Ruland,
                    “Improvement of Digital Signature Error
                    Rates,” in Information,
                    Communication and Automation Technologies
                    ICAT 2007, Sarajewo,
                    2007.N. Zivic and C. Ruland,
                    “Probability of Collisions in Soft Input
                    Decryption,” International Journal
                    of Applied Mathematics and
                    Informatics, vol. 1, no. 1,
                    21–27, 2007. 2006
                    N. Kang, L. Lo Iacono, C. Ruland,
                    and Y. Kim, “Efficient Application of IPsec
                    VPNs in Wireless Networks,” in
                    ISWPC 2006
                    Conference Proceedings: IEEE conference
                    International Symposium on Wireless
                    Pervasive Computing 2006,
                    Phuket, Thailand, 2006,
                    337–341.L. Lo Iacono, S. Müller, C.
                    Ruland, and N. Zisky, “Sicherheitslösung
                    für die automatisierte
                    Messdatenkommunikation - Best-Practice
                    Lösung im liberalisierten
                    Energiemarkt,” Datenschutz und
                    Datensicherheit (DuD), no. 6,
                    347–352, 2006.L. Lo Iacono, C. Ruland, and N.
                    Zisky, “Secure transfer of measurement data
                    in open systems,” Computer Standards
                    & Interfaces, vol. 28,
                    2006.T. Lohmann and C. Ruland,
                    “Security Levels of Bluetooth,” in
                    Workshop
                    on Intelligent Transportation,
                    Hamburg, 2006.C. Ruland, T. Lohmann, and M.
                    Schneider, “Analysis of Power Constraints
                    for Cryptographic Algorithms in Mid-Cost
                    RFID Tags,” in Smart Card Research
                    and Advanced
                    Applications:
                    7th IFIP WG 8.8/11.2
                    International Conference, CARDIS 2006,
                    Tarragona, Spain, April 19-21, 2006,
                    Proceedings, Berlin
                    Heidelberg: Springer-Verlag GmbH, 2006,
                    278–288.C. Ruland and N. Zivic, “Soft
                    Input Decryption, Turbo Coding 2006,”
                    in Turbo-Coding-2006:
                    4th International
                    Symposium on Turbo Codes & Related
                    Topics ; 6th International ITG-Conference
                    on Source and Channel Coding ; April 03 -
                    07, 2006, Munich, Berlin: VDE
                    Verl, 2006. 2005
                    Proceedings of the
                    Int. Conference on
                    e-Government. Ottoawa, Canada,
                    2005.L. H. B. Dietze, L. Lo Iacono,
                    and C. Ruland, “Qualifizierte Signatur im
                    elektronischen Messdatenaustausch,”
                    in Qualifizierte
                    elektronische Signaturen in Theorie und
                    Praxis (QSIG 2005): Workshop im Rahmen der
                    GI Tagung, Sicherheit 2005,
                    Regensburg, 2005.K. Hong, S. W. Jung, L. Lo
                    Iacono, and C. Ruland, “Impacts of Security
                    Protocols on Real-time Multimedia
                    Communications,” Lecture Notes,
                    Computer Science, vol. 3325,
                    no. 2, 1–13, 2005.S. W. Jung, N. Kang, C. Ruland,
                    and Y. Kim, “Efficient Way to Employ Stream
                    Authentication Schemes in Multicast Using
                    Short-lived Keys,” in Preproceedings of WISA
                    2005 vol.6, The 6th International Workshop
                    on Information Security
                    Applications, Jeju in Korea,
                    2005.M. Kahmann, L. Lo Iacono, C.
                    Ruland, and T. Schütze,
                    “Sicherheitskonzept,” in
                    PTB-BerichtIT,
                    Informationstechnik, vol.
                    12, Das
                    SELMA-Projekt: Konzepte, Modelle,
                    Verfahren, N. Zisky, Ed,
                    Bremerhaven: Wirtschaftsverl. NW Verl. für
                    neue Wissenschaft, 2005,
                    165–246.A. Kaliotzoglou, A. Karantjias,
                    N. Oikonomidis, C. Ruland, and S. Tcaciuc,
                    “Design Principles and Aspects for
                    Cross-Border Municipal Service Deployment,”
                    in Workshop and Poster
                    Proceedings of the 4th International EGOV
                    Conference, EGOV'05 4th International
                    Conference on Electronic
                    Government, Denmark,
                    2005.N. Kang, A. Kunz, L. Lo Iacono,
                    and C. Ruland, “Analysis of the QoS
                    Requirements under Radio Access Network
                    Planning Aspects for GPRS/EDGE and UMTS,”
                    in IEEE WirelessCom 2005
                    Conference, First International Symposium
                    on Wireless Quality-of-Service
                    (WiQoS'05), Maui, Hawaii, USA,
                    2005.N. Kang and C. Ruland, “MDS:
                    Multiplexed Digital Signature for Real-time
                    Streaming over Multisessions,” in
                    The
                    International Conference on Information
                    Networking (ICOIN) 2005, Jeju,
                    Korea, 2005, 824–834.N. Kang and C. Ruland, “Security
                    analysis of DoS Vulnerability in Stream
                    Authentication Schemes Using Hash
                    Chaining,” IEICE Transaction on
                    Communications, vol. E88-B,
                    no. 3, 2005.N. Oikonomidis, C. Ruland, and S.
                    Tcaciuc, “An Architecture for Secure Policy
                    Enforcement in E-Government Services
                    Deployment,” in Communications and
                    multimedia security: 9th IFIP TC-6 TC-11
                    international conference, CMS 2005,
                    Salzburg, Austria, September 19-21, 2005 ;
                    proceedings, Berlin: Springer,
                    2005.N. Oikonomidis, C. Ruland, and S.
                    Tcaciuc, “Enforcement of Security Policies
                    for e-Government Services on Municipal and
                    Cross-Border Level,” in Proceedings of the
                    Int. Conference on
                    e-Government, Ottoawa, Canada,
                    2005, 311–320.N. Oikonomidis, C. Ruland, and S.
                    Tcaciuc, “Provision of Secure Policy
                    Enforcement Between Small and Medium
                    Governmental Organizations,” in
                    Second
                    International Conference, TrustBus
                    2005, Berlin Heidelberg:
                    Springer-Verlag, 2005, 141–150.M. Wahl (geb. Angele), C. Ruland,
                    and T. Schütze, “Sicherheitsanalyse,”
                    in PTB-BerichtIT,
                    Informationstechnik, vol.
                    12, Das
                    SELMA-Projekt: Konzepte, Modelle,
                    Verfahren, N. Zisky, Ed,
                    Bremerhaven: Wirtschaftsverl. NW Verl. für
                    neue Wissenschaft, 2005,
                    117–164. 2004
                    N. Kang and C. Ruland, “DiffSig:
                    Differentiated Digital Signature for
                    Real-time Multicast Packet Flows,”
                    in Lecture Notes in
                    Computer Science: 1st International
                    Conference on Trust and Privacy in Digital
                    Business (TrustBus '04) in conjunction with
                    the 15th International Conference on
                    Database and Expert Systems Applications
                    (DEXA 2004), Zaragoza, Spain,
                    2004.N. Oikonomidis and C. Ruland,
                    “Identity Based Protocols for Secure
                    Electronic Content Distribution and
                    Licensing 4th International Conference on
                    Web Delivering of Music,” in
                    Proceedings of IEEE
                    Computer Society, Universität
                    Pompeu Fabra, Barcelona, Spain, 2004,
                    92–99.C. Ruland and S. Tcaciuc, “A
                    Table Based Scheduler for the QoS enabled
                    Flow Control in GPRS/EDGE Networks,”
                    in IASTED International
                    Conference on Communication Systems and
                    Networks CSN 2004, Marbella,
                    Spain, 2004.C. Ruland and S. Tcaciuc,
                    “Scheduler Based Flow Control under QoS
                    Aspects in GPRS/EDGE Networks,” in
                    IEEE
                    International Conference on Networks
                    2004/ICON 2004, Singapur,
                    2004.C. Ruland and M. Wahl, “Usage of
                    Mobile Agents for Wireless Multimedia
                    Communication,” in Proceedings of IASTED
                    conference on Communication Systems and
                    Applications (CSA 2004): Acta-Press, IASTED
                    conference on Communication Systems and
                    Applications (CSA 2004),
                    Canada, 2004. 2003
                    L. Lo Iacono, C. Ruland, and M.
                    Wahl, “Einsatz der elektronischen Signatur
                    für den Messdatenaustausch im
                    liberalisierten Energiemarkt (Secure
                    Electronic Exchange of Metering Data),”
                    in VDI Berichte Nr. 1785,
                    Telematik Tagung, Siegen,
                    2003. 2002
                    A. Friesen and C. Ruland, “Das
                    eContract-Konzept Ein Sicherheitsmodell für
                    Multi-Service-Multi-Provider-Architekturen
                    Enterprise Security,” in
                    Tagungsband
                    Enterprise Security,
                    2002.A. Friesen and C. Ruland, “Design
                    eines Profil- und
                    Zertifikatsmanagementsystem für das Service
                    by eContract-Konzept,” in
                    Lecture
                    Notes in Informatics: GI Jahrestagung,
                    GI-Edition, Bonn,
                    2002.L. Lo Iacono and C. Ruland,
                    “Confidential Multimedia Communication in
                    IP Networks,” in 8th IEEE International
                    Conference on Communication
                    Systems, Singapur,
                    2002.L. Lo Iacono and C. Ruland, “Eine
                    Sicherheitsarchitektur für den Austausch
                    elektronischer Messdaten im liberalisierten
                    Energiemarkt,” in SELMA-Workshop,
                    Physikalisch-Technische
                    Bundesanstalt, Berlin,
                    2002.L. Lo Iacono, C. Ruland, and N.
                    Schweitzer, “Signing Digital Streams,”
                    in Proceedings of 4th
                    International ITG Conference on Source and
                    Channel Coding: 4th International ITG
                    Conference on Source and Channel
                    Coding, Berlin, 2002,
                    324–334.C. Ruland and F. Schlake, “A
                    Security Protocol Providing QOS in ATM
                    Networks,” in 8th IEEE International
                    Conference on Communication
                    Systems, Singapur,
                    2002.C. Ruland and M. Wahl,
                    “Sicherheitsanalyse der Übertragung von
                    Energiedaten über offene Netze,” in
                    SELMA-Workshop,
                    Physikalisch-Technische
                    Bundesanstalt, Berlin,
                    2002. 2001
                    A. Friesen and C. Ruland,
                    “Service by e-contract - a security model
                    for authentication, access control and
                    online subscription management
                    multi-service-multi-provider
                    architectures,” in Proceedings, Volume II
                    Information Systems: World Multiconference
                    on Systemics, Cybernetics and
                    Informatics, Orlando, 2001,
                    581–585.C. Geuer-Pollmann and C. Ruland,
                    “XML-Sicherheit - Stand heute,” in
                    Sicherheit
                    im Internet: Deutscher
                    IT-Sicherheitskongress BSI
                    2001, Bonn Bad Godesberg,
                    2001, 197–209.O. Jung, S. Kuhn, C. Ruland, and
                    K. Wollenweber, “Enhanced Modes of
                    Operation for the Encryption in High-Speed
                    Networks and Their Impact on QoS,”
                    in V. Varadharajan u. Y.
                    Mu (Eds), LNCS 2119, Berlin
                    Heidelberg, 2001, 344–359.O. Jung, S. Kuhn, C. Ruland, and
                    K. Wollenweber, “Properties of Modes of
                    Operation with Statistical
                    Self-Synchronization Mechanisms,” in
                    ICICS
                    Shaping The New Information
                    ERA: 3rd International
                    Conference on Information, Communications
                    and Signal Processing,
                    Singapur, 2001.O. Jung, S. Kuhn, C. Ruland, and
                    K. Wollenweber, “Suitability of
                    Cryptographic Modes of Operation for the
                    Encryption in High- Speed Networks,”
                    in IEEE
                    Proceedings, Bangkok,
                    Thailand, 2001, 134–139.C. Ruland and N. Schweitzer,
                    “Digitale Signatur von Bitströmen,”
                    in 7. Deutscher
                    IT-Sicherheitskongress BSI
                    2001, Bonn Bad Godesberg:
                    Secumedia-Verlag, Ingelheim 2001,
                    2001. 2000
                    C. Geuer-Pollmann, C. Ruland, M.
                    Moula, and P. Sklavos, “Digital Signatures
                    for Web Content E-business,” in
                    Key
                    Issues, Applications and
                    Technologies, Amsterdam: IOS
                    Press, 2000, 218–224.C. Ruland and O. Weissmann,
                    “Advanced Encryption Standard,”
                    Funkschau,
                    2000.C. Ruland and O. Weissmann,
                    “Secure Subscription Management on Agent
                    based Platforms,” in Globalcom
                    2000, San Francisco,
                    2000. 1999
                    A. Friesen, N. Oikonomidis, C.
                    Ruland, and O. Weissmann, “A Distributed
                    Certificate Management System for Use in
                    Agent System,” in Workshop Proceedings,
                    M1-M9, 2nd ACTS Workshop,
                    Singapur, 1999.C. Geuer-Pollmann and C. Ruland,
                    “Das Simple Signature Protocol für
                    WWW-Sicherheit,” in Tagungsband 6.
                    Deutscher IT-Sicherheitskongreß des BSI
                    1999, Ingelheim:
                    Secumedia-Verlag, 1999,
                    461–465.O. Jung and C. Ruland,
                    “Encryption with Statistical
                    Self-Synchronization in Synchronous
                    Broadband Networks,” in Tagungsband
                    Cryptographic Hardware and Embedded
                    Systems, Lecture Notes in Computer
                    Science, Worcester, USA,
                    1999.S. Kuhn, C. Ruland, and K.
                    Wollenweber, “ATM-Encryption with 155
                    Mbit,” in IEEE ATM-Workshop
                    '99, Kochi-Japan,
                    1999.S. Kuhn, C. Ruland, and K.
                    Wollenweber, “ATM-Verschlüsselung mit 155
                    Mbit/s,” in Tagungsband 6.
                    Deutscher IT-Sicherheitskongreß des BSI
                    1999, Ingelheim:
                    Secumedia-Verlag, 1999,
                    287–295.C. Ruland, “Security vor dem
                    Wachstumsschub,” Comparex
                    Journal, vol. 28, 10–11,
                    1999.C. Ruland and O. Weissmann,
                    “Zugangskontrolle für universelle
                    Dienstenutzung in Agentensystemen,”
                    in Tagungsband 6.
                    Deutscher IT-Sicherheitskongreß des BSI
                    1999, Secumedia-Verlag:
                    Ingelheim, 1999, 455–460. 1998
                    C. Ruland, “Electronic
                    Commerce,” 25 Jahre Telemation
                    Jubiläumsausgabe, no. 10, 1–9,
                    1998. 1997
                    C. Ruland,
                    “Breitbandverschlüsselung (155 Mbit/s) mit
                    Selbstsynchronisation,” in
                    5.
                    Deutscher
                    IT-Sicherheitskongreß des BSI 1997, „Mit
                    Sicherheit in die
                    Informationsgesellschaft“, Tagungsband
                    erschienen im SecuMedia
                    Verlag, Ingelheim:
                    Secumedia-Verlag, 1997,
                    289–301.C. Ruland, “Regierung umgeht
                    Datenschutz: Orwell durch die
                    Hintertür?,” Computerwoche,
                    no. 15, 20, 1997. 1995
                    D. Fox, T. Henn, K. Reichel, and
                    C. Ruland, “Guardeded Authentic Local Area
                    Network - GALAN -,” in Proceedings der
                    Fachtagung Verläßliche
                    Systeme: – VIS'95,DuD-Fachberichte,
                    Braunschweig: Vieweg-Verlag, 1995,
                    163–180.C. Ruland, “Datenkompression,”
                    in Das
                    Telekommunikationswerk, D.
                    Schulte, Ed, Augsburg: Interest Verlag
                    GmbH, 1995, 1–48.C. Ruland, “Sichere Kommunikation
                    zwischen ISDN-Endgeräten,”
                    Datacom,
                    108–116, 1995.C. Ruland, “Sicherheit in
                    Verteilten Systemen,” in
                    Tutoriumsband:
                    KiVS'95,
                    Chemnitz, 1995, 1–45. 1994
                    D. Dienst, D. Fox, and C. Ruland,
                    “Transparente Sicherheitsmechanismen für
                    ISDN-Anwendungen,” in Nutzung u. Technik von
                    Kommunikationsendgeräten, G.
                    Kleinke, Ed, Offenbach: VDE-Verlag, 1994,
                    81–95.C. Ruland, “Kontrollierter
                    Zugang,” Business Computing
                    Januar, no. 1, 28–31,
                    1994.C. Ruland, “Secure Common ISDN
                    Application Programming Interface
                    (S-CAPI),” in Sicherheitsschnittstellen
                    – Konzepte, Anwendungen und
                    Einsatzbeispiel: DUV Deutscher
                    Universitätsverlag; Gabler Vieweg
                    Westdeutscher Verlag, 1994. 1993
                    C. Ruland, Informationssicherheit
                    in Datennetzen. Bergheim:
                    datacom Verlag, 1993.C. Ruland, “Realizing Digital
                    Signatures with One-Way Hash
                    Functions,” Cryptologia,
                    vol. 17, no. 3, 285–300, 1993. 1991
                    H. Kallerhoff and C. Ruland,
                    “Statistische Untersuchungen von
                    Pseudozufallszahlenfolgen,”
                    KES
                    Kommunikations- und
                    EDV-Sicherheit, no. 3,
                    156–163, 1991.M. Longerich and C. Ruland,
                    “Datenkompression, Grundlagen und
                    Übersicht,” Datacom,
                    no. 4, 88–96, 1991.M. Longerich and C. Ruland,
                    “Datenkompression, Grundlagen und Übersicht
                    (Fortsetzung),” Datacom,
                    no. 5, 113–120, 1991.M. Longerich and C. Ruland,
                    “Datenkompression, Implementation und
                    Vergleichstests,” Datacom,
                    no. 8, 97–103, 1991. 1990
                    C. Ruland, “Datensicherheit in
                    Lokalen Netzen, Teil 2,”
                    Datacom,
                    no. 1, 100–107, 1990.C. Ruland, “Sichere Übertragung
                    und Archivierung elektronischer
                    Dokumente,” Datacom,
                    no. 3, 120–130, 1990.C. Ruland, “Sicherheit und
                    Sicherheitsmanagement in Offenen
                    Kommunikationssystemen,”
                    Sonderheft
                    Netzwerkmanagement Spezial, Datacom
                    Verlag, 202–213,
                    1990.C. Ruland, “Vertrauenswürdigkeit
                    und Vertraulichkeit elektronischer
                    Dokumente,” Recht der
                    Datenverarbeitung (RDV), no.
                    4, 168–174, 1990. 1989
                    D. Bong and C. Ruland, “Optimized
                    Software Implementation of the Modular
                    Exponentiation on General Purpose
                    Microprocessors,” Computers &
                    Security, no. 8, 621–630,
                    1989.N. Pohlmann and C. Ruland,
                    “Datensicherheit bei Kommunikation über
                    Datex-P,” Datacom,
                    no. 1, 64–70, 1989.C. Ruland, “Datensicherheit in
                    Lokalen Netzen, Teil 1,”
                    Datacom,
                    no. 12, 94–99, 1989.C. Ruland, “Zur Datensicherheit
                    in Lokalen Netzen,” Recht der
                    Datenverarbeitung (RDV), no.
                    5/6, 210–218, 1989. 1988
                    C. Ruland, “Datenschutz in
                    Kommunikationssystemen Teil 4:
                    Sicherheitsmechanismen und
                    ISO-Referenzmodell,” Datacom,
                    no. 1, 92–97, 1988.C. Ruland, “Datenschutz in
                    Kommunikationssystemen Teil 5: Realisierung
                    einer Datenschutzeinrichtung,”
                    Datacom,
                    no. 3, 114–120, 1988. 1987
                    C. Ruland, Datenschutz in
                    Kommunikations-Systemen.
                    Pulheim: datacom Verlag, 1987.C. Ruland, “Datenschutz in
                    Kommunikationssystemen Teil 1: Einführung
                    und Begriffe,” Datacom,
                    no. 1, 78–84, 1987.C. Ruland, “Datenschutz in
                    Kommunikationssystemen Teil 2:
                    Verschlüsselungsverfahren,”
                    Datacom,
                    no. 4, 98–104, 1987.C. Ruland, “Datenschutz in
                    Kommunikationssystemen Teil 3:
                    Authentizitätsprüfungs-verfahren und
                    Schlüsselverteilung,” Datacom,
                    no. 9, 172–177, 1987.C. Ruland,
                    “Sicherheitsarchitektur in Offenen
                    Kommunikationssystemen,”
                    Elektrotechnik
                    und Maschinenbau (E und M),
                    no. 12, 533–537, 1987. 1981
                    C. Ruland, “Algorithmen zur
                    adaptiven Berechnung der schnellsten Wege
                    in Virtuellen Netzen,” Angewandte
                    Informatik, no. 11, 492-496,
                    1981.C. Ruland, “Routing in Virtuellen
                    Netzen,” Elektronische
                    Rechenanlagen, vol. 23, no. 4,
                    164–167, 1981.C. Ruland, “Virtuelle Netze für
                    verschiedene Benutzerklassen,”
                    Online
                    Heft 6, 456–458,
                    1981.C. Ruland, “Was ist ein
                    Virtuelles Netz?,” Elektronische
                    Rechenanlagen, vol. 23, no. 3,
                    134–136, 1981. 1978
                    C. Ruland, “Ein Verfahren zur
                    Lösung von (Δ + k2) u = 0 in
                    Außengebieten mit Ecken,”
                    Applicable
                    Analysis, vol. 7, 69–79,
                    1978. 1976
                    C. Ruland, “Ein Verfahren zur
                    Berechnung der Lösung des Dirichletschen
                    Außenraumproblems zur Helmholtzschen
                    Schwingungsgleichung bei stückweise glatten
                    Rändern,” Bonner Mathematische
                    Schriften, 1976. 1973
                    C. Ruland, “Zur theoretischen und
                    numerischen Lösbarkeit des Dirichletschen
                    Außenraumproblems für die Helmholtzsche
                    Schwingungsgleichung,” Diplomarbeit,
                    Universität Bonn, Bonn, 1973. |