2022
- Catovic, E. Kadusic, N. Zivic, N.
Hadzajlic, C. Ruland: AIR POLLUTION
PREDICTION AND WARNING SYSTEM USING IOT AND
MACHINE LEARNING, 2022 International
Conference on Electrical, Computer,
Communications and Mechatronics Engineering
(ICECCME), 16-18 November 2022, Maldives,
Maldives, Publisher: IEEE - DOI:
10.1109/ICECCME55909.2022.9987957
- E. Kadusic, N. Hadzajlic, C. Ruland, N.
Zivic: THE FACTORS FOR CHOOSING AMONG
NB-IOT, LORAWAN, AND SIGFOX RADIO
COMMUNICATION TECHNOLOGIES FOR IOT
NETWORKING, 2022 International Conference
on Connected Systems & Intelligence
(CSI), 31 August 2022 - 02 September 2022,
Trivandrum, India, Publisher: IEEE - DOI:
10.1109/CSI54720.2022.9923999
- E. Kadusic, N. Zivic, N. Hadzajlic, C.
Ruland: THE TRANSITIONAL PHASE OF
BOOST.ASIO AND POCO C++ NETWORKING
LIBRARIES TOWARDS IPV6 AND IOT NETWORKING
SECURITY, 2022 IEEE International
Conference on Smart Internet of Things
(SmartIoT), 19-21 August 2022, Suzhou,
China, Publisher: IEEE - DOI:
10.1109/SmartIoT55134.2022.00022
- E. Kadusic, N. Zivic, N. Hadzajlic, C.
Ruland: A SMART PARKING SOLUTION BY
INTEGRATING NB-IOT RADIO COMMUNICATION
TECHNOLOGY INTO THE CORE IOT PLATFORM,
Future Internet 2022, 14(8), 219;
https://doi.org/10.3390/fi14080219,
Published: 25 July 2022.
2020
- C. Ruland (Hrsg): Jochen
Saßmannshausen: Attribute-based access
control for smart grids and industrial
automation and control systems. In:
Forschungsberichte / Universität Siegen,
Institut für Digitale Kommunikationssysteme
Band 40. Düren: Shaker Verlag, 2020.
- ISBN 978-3-8440-7507-6
2019
- E. Kadusic, N. Zivic, A. Masovic, C.
Ruland: “Implementation of MQTT Native
Application for Tizen-based Smartwatches”,
6th Annual Conference on Computational
Science and Computational Intelligence,
December 5-7, Las Vegas, Nevada, USA
- A. Tellabi, M. Parekh, C. Ruland, M.
Ezziyyani , “A case study of virtualization
used in Mixed Criticality Systems,”
Advanced Intelligent Systems for
Sustainable Development (AI2SD), Marrakech,
Morocco, 2019
- J. Fehmi, A. Tellabi, S. AbdelBast, C.
Ruland, “On the Analysis of the Impact of
Scheduling Plans in Safety Critical
Requirements in Virtualization,”
International Conference on Cybersecurity
(ICOCSec), Malaysia, 2019
- A. Tellabi, C. Ruland, K. Waedt, A.
Sabri, “Self-Diagnostics and Isolation
mechanisms for Mixed Criticality Systems,”.
In Journal of Communications Software and
Systems (JCOMSS), 2019. DOI:
http://dx.doi.org/10.24138/jcomss.v15i4.810
- A. Tellabi, C. Ruland, "Empirical Study
of Real-Time Hypervisors for Industrial
Systems," 2019 International Conference on
Computational Science and Computational
Intelligence (CSCI), 2019, pp. 208-213,
doi: 10.1109/CSCI49370.2019.00042
- N. Zivic, C. Ruland and O. Ur-Rehman,
"Addressing Byzantine Fault Tolerance in
Blockchain Technology," 2019 8th
International Conference on Modeling
Simulation and Applied Optimization
(ICMSAO), Manama, Bahrain, 2019, pp.
1-5 [Link].
- N. Zivic, C. Ruland, J.
Sassmannshausen: Distributed Ledger
Technologies for M2M Communications, The
33rd International Conference on
Information Networking (ICOIN 2019) January
9-11, 2019, Kuala Lumpur, Malaysia
[Link].
- O. Ur-Rehman, N. Zivic, C. Ruland: An
Overview of Automotive Security Standards,
Mipro 2019, 20-24 May 2019, Opatija,
Croatia [Link].
- C. Ruland: Protect and Conserve Robot's
Transactions, Invited Talk on the 4th World
Congress of Robotics 2019 (WCR-2019), Aug.
31-Sep. 1, Shenyang, China
- C. Ruland, J. Sassmannshausen:
System-wide Traceability of Commands and
Data Exchange in Smart Grids, SEST'19 - 2nd
International Conference on Smart Energy
Systems and Technologies, September 9-11,
Porto, Portugal (paper accepted).
2018
- A. Tellabi, I. Ben Zid, C. Ruland, K.
Waedt , “Virtualization on Secure Platforms
for Industrial Applications Current use
cases and future perspectives, ”. In: 12th
International Conference on Reliability
Maintainability and Safety (ICRMS),
2018
- A. Tellabi, L. Peters, C. Ruland, K.
Waedt, “Security Aspects of Hardware
Virtualization Technologies for Industrial
Automation and Control Systems,” GIACM
Workshop on I4.0/IACS Standardization,
Berlin, 2018
- C. Ruland, J. Sassmannshausen, Jyoti
Pragyan Satpathy "An Attribute Certificate
Management System for Attribute-based
Access Control" 5th Annual Conf. on
Computational Science & Computational
Intelligence (CSCI'18), Las Vegas, Dec
13-15, 2018 [Link].
- C. Ruland, J. Sassmannshausen "Access
Control in Safety Critical Environments"
12th International Conference on
Reliability, Maintainability and Safety
(ICRMS2018), Shanghai, China, Oct
15-17, 2018 [Link].
- C. Ruland, J. Sassmannshausen,
"Firewall for Attribute-Based Access
Control in Smart Grids," 2018 IEEE
International Conference on Smart Energy
Grid Engineering (SEGE), Oshawa, ON,
Canada, 2018, pp. 336-341. [Link]
- Asmaa Tellabi, Jochen Sassmannshausen,
Edita Bajramovic, and Karl Christoph
Ruland. Overview of authentication and
access controls for i&c systems. In
16th IEEE International Conference on
Industrial Informatics, INDIN 2018, Porto,
Portugal, July 18-20, 2018, pages 882–889,
2018. [Link]
- N. Zivic and C. Ruland, "Cognitive
Channel Decoding", Future of Information
and Communication Conference (FICC 2018),
Singapore, Apr. 2018.
- N. Zivic and C. Ruland, "Cognition for
Enhanced Biometric Authentication," The
32nd International Conference on
Information Networking (ICOIN 2018), Chang
Mai, Thailand, Jan. 2018.
2017
- T. Wu and C. Ruland, "A redundancy
based compressive sensing recovery
optimization," 2017 40th International
Conference on Telecommunications and Signal
Processing (TSP), Barcelona, 2017, pp.
502-505.
- R. A. Djeujo and C. Ruland, "QoSs
definition and session description protocol
for secure communication using compressive
sensing," 6th International Conference on
Future Generation Communication
Technologies Conference (FGCT), Dublin,
Ireland, Aug. 21-23, 2017, pp. 1-7.
- R. A. Djeujo and C. Ruland, "Secret
matrix lifecycle management for compressive
sensing based cryptographic mechanisms,"
IEEE 3th Annual Conference in Computing,
Communication, Control, And Automation
Conference (ICC3A), Pune, India, Aug.
17-18, 2017, pp. 1-10.
- C. Ruland and J. Sassmannshausen,
"Transaction-based security for Smart
Grids", IEEE International Conference on
Smart Energy Grid Engineering (SEGE 2017),
Oshawa, Canada, Aug 14-17, 2017. [Link]
- C. Ruland, J. Sassmannshausen, K.Waedt
and N. Zivic, "Smart grid security - an
overview of standards and guidelines", e
& i Elektrotechnik und
Informationstechnik, vol. 134, issue 1, pp.
19-25, Feb 2017, Springer Wien. [Link]
- O. Ur Rehman, N. Živić and C. Ruland,
"Approximate Image Authentication and
Correction Using Spatial and Frequency
Domain Features", 11th International ITG
Conference on Systems, Communications and
Coding (SCC 2017), Hamburg, Germany, Feb. 6
- 9, 2017.
- R. Fay and C. Ruland, "Compressed
Sampling and Authenticated-Encryption",
11th International ITG Conference on
Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9,
2017.
- N. Živić, O. Ur Rehman and C.
Ruland, "Iterative Decoder for OFDM
Transmission over Rayleigh Channel", 31st
International Conference on Information
Networking (ICOIN 2017), Da Nang, Vietnam,
Jan. 11 - 13, 2017.
- R. A. Djeujo and C. Ruland,
“Embedding cryptographically secure matrix
transformation in structured compressive
sensing,” IEEE Annual Computing and
Communication Workshop and Conference (CCWC
2017), pp. 529–535, Las Vegas, USA, Jan
9-11, 2017.
2016
- G. Gala, T. Koller, D. G. Pérez, G.
Fohler and C. Ruland, "Timing Analysis of
Secure Communication between Resource
Managers in DREAMS," Workshop on Security
and Dependability of Critical Embedded
Real-Time Systems, Porto, Portugal, Nov.
29, 2016. [Link]
- C. Ruland, N. Kang and J.
Sassmannshausen, "Rejuvenation of the IEC
61850 Protocol Stack for MMS", IEEE
International Conference on Smart Grid
Communications (SmartGridComm 2016),
Sydney, Australia, Nov. 6-9, 2016.
[Link]
- R. A. Djeujo and C. Ruland,
“Secure matrix generation for compressive
sensing embedded cryptography,” IEEE Annual
Information Technology, Electronics and
Mobile Communication Conference (IEMCON
2016), pp. 250–257, Vancouver, BC, Canada,
Oct. 13-15, 2016. [Link]
- T. Koller, G. Gala, D. G. Perez, C.
Ruland, G. Fohler, "DREAMS: Secure
Communication between Resource Management
Components in Networked Multi-Core
Systems", IEEE Conference on Open Systems
2016 (ICOS 2016), Langkawi, Malaysia, Oct.
10-12, 2016 (Best paper
award). [Link]
- N. Živić, O. Ur Rehman and C.
Ruland, "Smart Metering for Intelligent
Buildings", Transactions on Networks and
Communications, vol. 4, no. 5, Oct. 2016.
[Link]
- M. Schneider and C. Ruland,
"Verification of Time Signals", 30th
European Frequency and Time Forum (EFTF),
York, UK, Apr 4-7, 2016. [Link]
- O. Ur Rehman, N. Zivic and C.
Ruland, "Content based Image Authentication
with Error Correction", IEEE International
Conference on Communications (IEEE ICC'16),
Communication and Information System
Security Symposium, Kuala Lumpur, Malaysia,
May 23-27, 2016. [Link]
2015
- M. Schneider and C. Ruland,
“Verification of time telegrams in Long
Wave Radio systems", IEEE 2015 Joint
Conference of the IEEE International
Frequency Control Symposium & the
European Frequency and Time Forum
(IFCS-EFTF), Denver, Colorado, USA, pp.
270-275, Apr 12-16 2015. [Link]
- A. E. Tabatabaei, O. Ur Rehman,
N. Živić, and C. Ruland, “Secure and Robust
Two-phase Image Authentication", IEEE
Transactions on Multimedia, vol. 17, no. 7,
pp. 945-956, Jul 2015. [Link]
- O. Ur Rehman, A. E. Tabatabaei,
N. Živić, and C. Ruland: "Spatial and
Frequency Domain Complementary Watermarks
for Image Authentication and Correction,”
the 10th International ITG Conference on
Systems, Communications and Coding (SCC
2015) , Hamburg, Germany, pp. 1-6, Feb 2-5,
2015. [Link]
- O. Ur Rehman, N. Živić, and C.
Ruland, "Security Issues in Smart Metering
Systems", (Overall best paper and
innovation award), IEEE
International Conference on Smart Energy
Grid Engineering (SEGE 2015), Oshawa
Canada, Aug 17-19, 2015. [Link]
- J. Saßmannshausen and C. Ruland,
"Nachweisbarkeit in Smart Grids auf Basis
von XML-Signaturen", D.A.CH Security 2015,
syssec IT Security & IT
Management, p. 98–109, Frechen, Germany,
Sep 8-9, 2015.
- J. Saßmannshausen and C. Ruland,
"End-to-End-Authentication in Smart Grid
Control", IEEE International Conference on
Smart Energy Grid Engineering (SEGE 2015),
Oshawa, Canada, Aug 17-19, 2015. [ Link]
- N.
Živić, O. Ur Rehman and
C. Ruland, "Evolution of Smart Metering
Systems", 23rd IEEE Telecommunications
Forum (TELFOR 2015), Belgrade, Serbia, Nov
24-26, 2015. [Link]
- J. Sassmannshausen, C. Ruland,
"Non-repudiation Services for the MMS
Protocol of IEC 61850", Security
Standardization Research Conference (SSR
2015), Tokyo, Japan, Dec 15-16, 2015.
[Link]
2014
- A. Schantin and C. Ruland, “A
Bit-Error Based Capture Model for EPCglobal
RFID Systems,” in 52th Annual Allerton
Conference on Communication, Control, and
Computing (Allerton), 2014, pp. 221–226.
[Link]
- J. Shin, D. Kim, and C. Ruland,
"Content based Image Authentication using
HOG feature descriptor," in IEEE
International Conference on Image
Processing, Paris, France, 27 - 30 Oct.
2014. [Link]
- J. Shin, and C. Ruland, "A Novel
Design of Content based Multimedia
Security," in 9th Future Security
Conference, Berlin, Germany, 16 - 18 Sep.
2014.
- J. Shin, and C. Ruland, "A Hybrid
Approach for Content Based Image
Authentication," in 11th International
Conference on Security and Cryptography
(SECRYPT'14), Vienna, Austria, 28 - 30 Aug.
2014, pp. 371-378. [Link]
- O. Ur Rehman, N. Živić, C.
Ruland: "Security in Smart Metering Systems
under the Smart-Grid Perspective",
Tutorium, IEEE BlackSeaCom 2014, May 2014,
Chisinau, Moldova
2013
- S. Amir Hossein A. E. Tabatabaei, C.
Ruland: "The analysis of an NMF-based
perceptual image hashing scheme", IEEE
International Symposium on Signal
Processing and Information Technology,
Athens, 2013, pp. 108-112. [Link]
- A. Schantin and C. Ruland,
“Retransmission Strategies for RFID Systems
Using the EPC Protocol,” International
Conference on RFID Technologies and
Applications (RFID-TA), Johor Bahru,
Malaysia, Sep. 4-5, 2013. [Link]
- M. Schneider and C. Ruland,
“Sicherheit von Broadcast-Datendiensten im
Smart Grid am Beispiel der
Rundsteuertechnik,” in Informationssicherheit
stärken - Vertrauen in die Zukunft
schaffen: [Tagungsband zum 13.
Deutschen
IT-Sicherheitskongress],
Gau-Algesheim: SecuMedia-Verl, 2013, pp.
483–496.
- J. Shin and C. Ruland, “A Survey
of Image Hashing Technique for Data
Authentication in WMSNs,” in Workshop on
Internet of Things Communications and
Technologies (IOT 2013), Lyon,
2013, pp. 264–269. [Link]
- O. Ur Rehman, Tabatabaei, S. Amir
Hossein A. E, N. Zivic, and C. Ruland,
“Soft Authentication and Correction of
Images,” in Systems, Communication
and Coding (SCC), Proceedings of 2013 9th
International ITG Conference
on, 2013, pp. 1–6. [Link]
2012
- R. Schick and C. Ruland,
“Non-Repudiation of Forwarding:
Traceability of Confidential Data Via
Multiple Recipients,” in
9th
International Conference of Security and
Cryptography: SciTePress,
2012, 387–390.
- R. Schick and C. Ruland, “On the
Security of the Non-Repudiation of
Forwarding Service,” in Trust, Privacy and
Security in Digital
Business: 9th International
Conference, TrustBus 2012, Vienna, Austria,
September 3-7, 2012.
Proceedings, Berlin,
Heidelberg, s.l.: Imprint: Springer, 2012,
167–178. [Link]
2011
- J. Holle, A. Groll, C. Ruland, H.
Cankaya, and M. Wolf, “OPEN PLATFORMS ON
THE WAY TO AUTOMOTIVE PRACTICE,” in
8th ITS European
Congress, Lyon,
2011.
- R. Schick and C. Ruland, “Data
Leakage Tracking - Non-Repudiation of
Forwarding,” in First Internation
Conference on Informatics Engineering and
Information Science, 2011,
163–173. [Link]
- R. Schick and C. Ruland,
“Document Tracking - On the Way to a New
Security Service,” in Sixth Conference on
Network Architectures and Information
Systems Security, 2011, 89–93.
[Link]
- R. Schick and C. Ruland,
“Introduction of a New Non-Repudiation
Service to Protect Sensitive Private Data,”
in Second International
Conference on Advances in Information and
Communication Technologies,
2011.
- O. Ur Rehman, N. Zivic, S.
Tabatabaei, and C. Ruland, "Error
Correcting and Weighted Noise Tolerant
Message Authentication Codes," in Signal
Processing and Communication Systems
(ICSPCS), 2011 5th International Conference
on, 2011, pp. 1–8. [Link]
2010
- C. Bodenstedt, C. Ruland, D.
Weber, and A. Kung, "Integration of
Security and Dependability into Resource
constrained Embedded Systems," in The 3rd
International Conference on
Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 2010,
93–98.
- A. Groll, J. Holle, and C.
Ruland, "Upcoming Trends in the Automotive
IT and Associated Security Challenges," in
The 3rd International Conference on
Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 2010, 25–30.
[Link]
- R. Schick, S. Tcaciuc, and C.
Ruland, "Information Security of Multimodal
Input Data -Traceability of Image Data," in
The 3rd International Conference on
Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 2010,
31–34.
- M. Schneider and C. Ruland,
“Steckdose als virtuelle Zapfsäule,” in EMA
2010 - Elektromobilausstellung: Fachtagung,
Wettbewerbe; Vorträge der ETG-Fachtagung
vom 8. bis 9. Oktober 2010 in
Aschaffenburg, Berlin: VDE-Verl, 2010,
161–169. [Link]
- M. Schneider, S. Tcaciuc, and C.
Ruland, "Secure metering for electrical
vehicles," in E-Mobility: Technologien -
Infrastruktur - Märkte; VDE-Kongress 2010
Leipzig, 8.-9. November 2010 Congress
Center Leipzig; Kongressbeiträge, Berlin:
VDE-Verl, 2010, FZT 1.4.13. [Link]
- O. Ur Rehman, N. Zivic, and C.
Ruland, "Iterative bit-flipped decoding of
concatenated reed solomon/convolutional
codes with HMAC," in IEEE International
Symposium on Performance Evaluation of
Computer and Telecommunication Systems,
Ottawa, Canada, 2010, 410–415. [Link]
- N. Zivic and C. Ruland, "Security
Architecture for Smart Metering Systems,
Software Services for E-World," in 10th
IFIP Advances in Information and
Communication Technology, Buenos Aires,
Argentina: Springer-Verlag, 2010. [Link]
- N. Zivic, O. Ur Rehman, and C.
Ruland, "On the Probability and Impact of
Collisions on Soft Input Decryption," in
International Symposium on Applied Sciences
in Biomedical and Communication
Technologies, Rome, Italy, 2010, 1–5.
[Link]
2009
- A. Groll and C. Ruland, “Gefahren
der In-Fahrzeug-Kommunikation moderner
Automobile,” in Sichere Wege in der
vernetzten Welt: [Tagungsband zum 11.
Deutschen IT-Sicherheitskongress ; vom 12.
- 14. Mai 2009 in Bonn],
Gau-Algesheim: SecuMedia-Verl,
2009.
- A. Groll and C. Ruland, “Secure
and Authentic Communication on Existing
Vehicle Networks,” in IEEE Intelligent
Vehicles Symposium, 2009: IV ; 3 - 5 June 2009,
Xi'an, China, Piscataway, NJ:
IEEE, 2009.
- J. Holle, A. Groll, C. Ruland, M.
Wolf, T. Wollinger, and F. Zweers, “OVERSEE
- A Secure and Open Communication and
Runtime Platform for Innovative Automotive
Applications,” in Proceedings of the 7th
escar - Embedded Security in Cars
Conference, Düsseldorf,
2009.
- N. Zivic, C. Ruland, and O. Ur
Rehman, “Error Correction over Wireless
Channel Using Symmetric Cryptography,”
in IEEE International
Conference on Wireless Communication
Society, Vehicular Technology, Information
Theory and Aerospace & Electronic
Systems Technology, Aalborg,
Denmark, 2009, 752–756. [Link]
- N. Zivic, O. Ur Rehman, and C.
Ruland, “Analysis of Serial and Parallel
Soft Input Decryption Schemes over a
Wireless Channel,” in IEEE International
Symposium on Performance Evaluation of
Computer and Telecommunication
Systems, Istanbul, Türkei:
IEEE, 2009, 282–288. [Link]
- N. Zivic, O. Ur Rehman, and C.
Ruland, “Using HMAC for Error correction
over Wireless Channel,” in
Symposia
and Workshops on Ubiquitous, Autonomic and
Trusted Computing, Brisbane,
Australien, 2009, 252–256. [Link]
2008
- M. Dunte and C. Ruland,
“Construction and Usage of Time-limited
Keys in Secure Multimedia Distribution,”
in Third International
Conference on Communications and Networking
in China, 2008: ChinaCom 2008 ; 25 -
27 Aug. 2008, Hangzhou, China,
Piscataway, NJ: IEEE, 2008. [Link]
- M. Dunte and C. Ruland, “Delivery
Infrastructure for Secure Scalable Coded
Multimedia,” in 28th International
Conference on Distributed Computing Systems
workshops: 17 - 20
June 2008,
Beijing, China ; proceedings,
Los Alamitos, Calif.: IEEE Computer
Society, 2008, 42–47. [Link]
- M. Dunte and C. Ruland,
“Realising Time-Iimitation for
Cryptographic Keys in Secure Multimedia
Distribution,” Security and
Communication Networks, vol.
1, no. 6, 451–459, 2008.
- A. Groll, J. Holle, and C.
Ruland, “Simulative Bestimmung der
CAN-Bus-Lastgrenzen,” in
Automotive
- Safety & Security 2008 - Sicherheit
und Zuverlässigkeit für automobile
Informationstechnik: 19.
und 20.
November 2008, Stuttgart,
Aachen: Shaker, 2008.
- A. Groll and C. Ruland, “Trusted
Communication Groups for Authentic In-Car
Communication,” in Proceedings of the 6th
escar - Embedded Security in Cars
Conference, Hamburg,
2008.
- S. Tcaciuc and C. Ruland,
“Optimizations of Flow Control under QOS
Aspects between Core Network and Access
Network Domains,” in Proceeding of the 2nd
International Conference
"Telecommunications, Electronics and
Informatics", Chisinau,
Moldova, 2008, 37–42.
- N. Zivic and C. Ruland, “Joint
Channel Coding - Cryptography,” in
Infoteh,
Jahorina, Bosnia, 2008.
- N. Zivic and C. Ruland, “Method
for Improvement of Soft Input Decryption
Performances,” in 12th WSEAS Conf. on
Computer Sciences: July
2008, Herklion, Greece,
2008.
- N. Zivic and C. Ruland, “Channel
Coding as a Cryptography Enhancer,”
Transaction on
Communications, vol. 7, no. 3,
83–91, 2008.
- N. Zivic and C. Ruland, “Feedback
in Soft Input Decryption,”
WSEAS
Transactions on
Communications, vol. 7, no. 5,
428–437, 2008.
- N. Zivic and C. Ruland,
“Optimization of Soft Input Decryption,”
in Conference on Soft
Computing, Brno University of
Technology, Brno University of
Technology, Czech Republic, 2008,
241–246.
- N. Zivic and C. Ruland, “Parallel
Joint Channel Coding and Cryptography: July
2008,” Proceedings of World
Academy of Science, Engineering and
Technology, vol. 31, 536–539,
2008.
- N. Zivic and C. Ruland, “Parallel
Joint Channel Coding and
Cryptography,” International Journal
of Computer Science and Engineering, WASET
World Academy of Science, Engineering and
Technology, vol. 4, no. 2,
140–144, 2008.
- N. Zivic and C. Ruland,
“Probability of Collisions in Soft Input
Decryption,” in Recent advances on
applied mathematics: Proceedings of the
American Conference on Applied Mathematics
(MATH '08) : Cambridge, Massachusetts, USA,
March 24 - 26,2008, Athen:
WSEAS Press, 2008, 362–366.
- N. Zivic and C. Ruland, “Soft
Input Decryption using feedback,” in
7th WSEAS International
Conference on Software Engineering,
Parallel and Distributed
Systems (SEPAD
'08), University of Cambridge,
UK, 2008, 174–177.
2007
- M. Dunte and C. Ruland, “On the
Way to Secure Delivery of Scalable Coded
Media,” in Mikulášská
kryptobesídka, Prag,
Tschechische Republik, 2007,
51–59.
- M. Dunte and C. Ruland, “Secure
Voice-over-IP,” IJCNS International
Journal of Computer Science and Network
Security, vol. 7, no. 6,
63–68, 2007.
- S. Hick and C. Ruland, “Security
Aspects for Secure Download of Regulated
Software,” in Trust, privacy and
security in digital
business: 4th international
conference, TrustBus 2007, Regensburg,
Germany, September 4 - 6, 2007 ;
proceedings, Berlin: Springer,
2007, 219–227. [Link]
- T. Lohmann and C. Ruland,
“Digital Signatures Based on Elliptic
Curves in RFIDs,” IJCNS International
Journal of Computer Science and Network
Security, vol. 7, no. 1,
275–281, 2007. [Link]
- N. Oikonomidis, C. Ruland, and S.
Tcaciuc, “Deployment of E-Government
Municipal Services: Enforcement of Security
Polices,” in Secure E-government
web services, A. Mitrakas, Ed,
Hershey: Idea Group Publ, 2007,
111–123.
- C. Ruland, “Secure Online
Metering for a Liberalized Energy Market,”
in Secure E-government
web services, A. Mitrakas, Ed,
Hershey: Idea Group Publ, 2007, 97–110.
[Link]
- C. Ruland and N. Zivic, “Joint
Coding and Decryption,” in
Ictis'
07, Fes, Marokko,
2007.
- N. Zivic and C. Ruland, “Soft
Input Decryption and its Iterative
Application,” in TELFOR:
November
20-22, Belgrade, Serbia,
2007.
- N. Zivic and C. Ruland, “Channel
coding as a cryptography enhancer,”
in Proceedings in the 11
th WSEAS international conference on
Communications, Crete Island,
Greece, 2007, 273–278.
- N. Zivic and C. Ruland,
“Improvement of Digital Signature Error
Rates,” in Information,
Communication and Automation Technologies
ICAT 2007, Sarajewo,
2007.
- N. Zivic and C. Ruland,
“Probability of Collisions in Soft Input
Decryption,” International Journal
of Applied Mathematics and
Informatics, vol. 1, no. 1,
21–27, 2007.
2006
- N. Kang, L. Lo Iacono, C. Ruland,
and Y. Kim, “Efficient Application of IPsec
VPNs in Wireless Networks,” in
ISWPC 2006
Conference Proceedings: IEEE conference
International Symposium on Wireless
Pervasive Computing 2006,
Phuket, Thailand, 2006,
337–341.
- L. Lo Iacono, S. Müller, C.
Ruland, and N. Zisky, “Sicherheitslösung
für die automatisierte
Messdatenkommunikation - Best-Practice
Lösung im liberalisierten
Energiemarkt,” Datenschutz und
Datensicherheit (DuD), no. 6,
347–352, 2006.
- L. Lo Iacono, C. Ruland, and N.
Zisky, “Secure transfer of measurement data
in open systems,” Computer Standards
& Interfaces, vol. 28,
2006.
- T. Lohmann and C. Ruland,
“Security Levels of Bluetooth,” in
Workshop
on Intelligent Transportation,
Hamburg, 2006.
- C. Ruland, T. Lohmann, and M.
Schneider, “Analysis of Power Constraints
for Cryptographic Algorithms in Mid-Cost
RFID Tags,” in Smart Card Research
and Advanced
Applications:
7th IFIP WG 8.8/11.2
International Conference, CARDIS 2006,
Tarragona, Spain, April 19-21, 2006,
Proceedings, Berlin
Heidelberg: Springer-Verlag GmbH, 2006,
278–288.
- C. Ruland and N. Zivic, “Soft
Input Decryption, Turbo Coding 2006,”
in Turbo-Coding-2006:
4th International
Symposium on Turbo Codes & Related
Topics ; 6th International ITG-Conference
on Source and Channel Coding ; April 03 -
07, 2006, Munich, Berlin: VDE
Verl, 2006.
2005
- Proceedings of the
Int. Conference on
e-Government. Ottoawa, Canada,
2005.
- L. H. B. Dietze, L. Lo Iacono,
and C. Ruland, “Qualifizierte Signatur im
elektronischen Messdatenaustausch,”
in Qualifizierte
elektronische Signaturen in Theorie und
Praxis (QSIG 2005): Workshop im Rahmen der
GI Tagung, Sicherheit 2005,
Regensburg, 2005.
- K. Hong, S. W. Jung, L. Lo
Iacono, and C. Ruland, “Impacts of Security
Protocols on Real-time Multimedia
Communications,” Lecture Notes,
Computer Science, vol. 3325,
no. 2, 1–13, 2005.
- S. W. Jung, N. Kang, C. Ruland,
and Y. Kim, “Efficient Way to Employ Stream
Authentication Schemes in Multicast Using
Short-lived Keys,” in Preproceedings of WISA
2005 vol.6, The 6th International Workshop
on Information Security
Applications, Jeju in Korea,
2005.
- M. Kahmann, L. Lo Iacono, C.
Ruland, and T. Schütze,
“Sicherheitskonzept,” in
PTB-BerichtIT,
Informationstechnik, vol.
12, Das
SELMA-Projekt: Konzepte, Modelle,
Verfahren, N. Zisky, Ed,
Bremerhaven: Wirtschaftsverl. NW Verl. für
neue Wissenschaft, 2005,
165–246.
- A. Kaliotzoglou, A. Karantjias,
N. Oikonomidis, C. Ruland, and S. Tcaciuc,
“Design Principles and Aspects for
Cross-Border Municipal Service Deployment,”
in Workshop and Poster
Proceedings of the 4th International EGOV
Conference, EGOV'05 4th International
Conference on Electronic
Government, Denmark,
2005.
- N. Kang, A. Kunz, L. Lo Iacono,
and C. Ruland, “Analysis of the QoS
Requirements under Radio Access Network
Planning Aspects for GPRS/EDGE and UMTS,”
in IEEE WirelessCom 2005
Conference, First International Symposium
on Wireless Quality-of-Service
(WiQoS'05), Maui, Hawaii, USA,
2005.
- N. Kang and C. Ruland, “MDS:
Multiplexed Digital Signature for Real-time
Streaming over Multisessions,” in
The
International Conference on Information
Networking (ICOIN) 2005, Jeju,
Korea, 2005, 824–834.
- N. Kang and C. Ruland, “Security
analysis of DoS Vulnerability in Stream
Authentication Schemes Using Hash
Chaining,” IEICE Transaction on
Communications, vol. E88-B,
no. 3, 2005.
- N. Oikonomidis, C. Ruland, and S.
Tcaciuc, “An Architecture for Secure Policy
Enforcement in E-Government Services
Deployment,” in Communications and
multimedia security: 9th IFIP TC-6 TC-11
international conference, CMS 2005,
Salzburg, Austria, September 19-21, 2005 ;
proceedings, Berlin: Springer,
2005.
- N. Oikonomidis, C. Ruland, and S.
Tcaciuc, “Enforcement of Security Policies
for e-Government Services on Municipal and
Cross-Border Level,” in Proceedings of the
Int. Conference on
e-Government, Ottoawa, Canada,
2005, 311–320.
- N. Oikonomidis, C. Ruland, and S.
Tcaciuc, “Provision of Secure Policy
Enforcement Between Small and Medium
Governmental Organizations,” in
Second
International Conference, TrustBus
2005, Berlin Heidelberg:
Springer-Verlag, 2005, 141–150.
- M. Wahl (geb. Angele), C. Ruland,
and T. Schütze, “Sicherheitsanalyse,”
in PTB-BerichtIT,
Informationstechnik, vol.
12, Das
SELMA-Projekt: Konzepte, Modelle,
Verfahren, N. Zisky, Ed,
Bremerhaven: Wirtschaftsverl. NW Verl. für
neue Wissenschaft, 2005,
117–164.
2004
- N. Kang and C. Ruland, “DiffSig:
Differentiated Digital Signature for
Real-time Multicast Packet Flows,”
in Lecture Notes in
Computer Science: 1st International
Conference on Trust and Privacy in Digital
Business (TrustBus '04) in conjunction with
the 15th International Conference on
Database and Expert Systems Applications
(DEXA 2004), Zaragoza, Spain,
2004.
- N. Oikonomidis and C. Ruland,
“Identity Based Protocols for Secure
Electronic Content Distribution and
Licensing 4th International Conference on
Web Delivering of Music,” in
Proceedings of IEEE
Computer Society, Universität
Pompeu Fabra, Barcelona, Spain, 2004,
92–99.
- C. Ruland and S. Tcaciuc, “A
Table Based Scheduler for the QoS enabled
Flow Control in GPRS/EDGE Networks,”
in IASTED International
Conference on Communication Systems and
Networks CSN 2004, Marbella,
Spain, 2004.
- C. Ruland and S. Tcaciuc,
“Scheduler Based Flow Control under QoS
Aspects in GPRS/EDGE Networks,” in
IEEE
International Conference on Networks
2004/ICON 2004, Singapur,
2004.
- C. Ruland and M. Wahl, “Usage of
Mobile Agents for Wireless Multimedia
Communication,” in Proceedings of IASTED
conference on Communication Systems and
Applications (CSA 2004): Acta-Press, IASTED
conference on Communication Systems and
Applications (CSA 2004),
Canada, 2004.
2003
- L. Lo Iacono, C. Ruland, and M.
Wahl, “Einsatz der elektronischen Signatur
für den Messdatenaustausch im
liberalisierten Energiemarkt (Secure
Electronic Exchange of Metering Data),”
in VDI Berichte Nr. 1785,
Telematik Tagung, Siegen,
2003.
2002
- A. Friesen and C. Ruland, “Das
eContract-Konzept Ein Sicherheitsmodell für
Multi-Service-Multi-Provider-Architekturen
Enterprise Security,” in
Tagungsband
Enterprise Security,
2002.
- A. Friesen and C. Ruland, “Design
eines Profil- und
Zertifikatsmanagementsystem für das Service
by eContract-Konzept,” in
Lecture
Notes in Informatics: GI Jahrestagung,
GI-Edition, Bonn,
2002.
- L. Lo Iacono and C. Ruland,
“Confidential Multimedia Communication in
IP Networks,” in 8th IEEE International
Conference on Communication
Systems, Singapur,
2002.
- L. Lo Iacono and C. Ruland, “Eine
Sicherheitsarchitektur für den Austausch
elektronischer Messdaten im liberalisierten
Energiemarkt,” in SELMA-Workshop,
Physikalisch-Technische
Bundesanstalt, Berlin,
2002.
- L. Lo Iacono, C. Ruland, and N.
Schweitzer, “Signing Digital Streams,”
in Proceedings of 4th
International ITG Conference on Source and
Channel Coding: 4th International ITG
Conference on Source and Channel
Coding, Berlin, 2002,
324–334.
- C. Ruland and F. Schlake, “A
Security Protocol Providing QOS in ATM
Networks,” in 8th IEEE International
Conference on Communication
Systems, Singapur,
2002.
- C. Ruland and M. Wahl,
“Sicherheitsanalyse der Übertragung von
Energiedaten über offene Netze,” in
SELMA-Workshop,
Physikalisch-Technische
Bundesanstalt, Berlin,
2002.
2001
- A. Friesen and C. Ruland,
“Service by e-contract - a security model
for authentication, access control and
online subscription management
multi-service-multi-provider
architectures,” in Proceedings, Volume II
Information Systems: World Multiconference
on Systemics, Cybernetics and
Informatics, Orlando, 2001,
581–585.
- C. Geuer-Pollmann and C. Ruland,
“XML-Sicherheit - Stand heute,” in
Sicherheit
im Internet: Deutscher
IT-Sicherheitskongress BSI
2001, Bonn Bad Godesberg,
2001, 197–209.
- O. Jung, S. Kuhn, C. Ruland, and
K. Wollenweber, “Enhanced Modes of
Operation for the Encryption in High-Speed
Networks and Their Impact on QoS,”
in V. Varadharajan u. Y.
Mu (Eds), LNCS 2119, Berlin
Heidelberg, 2001, 344–359.
- O. Jung, S. Kuhn, C. Ruland, and
K. Wollenweber, “Properties of Modes of
Operation with Statistical
Self-Synchronization Mechanisms,” in
ICICS
Shaping The New Information
ERA: 3rd International
Conference on Information, Communications
and Signal Processing,
Singapur, 2001.
- O. Jung, S. Kuhn, C. Ruland, and
K. Wollenweber, “Suitability of
Cryptographic Modes of Operation for the
Encryption in High- Speed Networks,”
in IEEE
Proceedings, Bangkok,
Thailand, 2001, 134–139.
- C. Ruland and N. Schweitzer,
“Digitale Signatur von Bitströmen,”
in 7. Deutscher
IT-Sicherheitskongress BSI
2001, Bonn Bad Godesberg:
Secumedia-Verlag, Ingelheim 2001,
2001.
2000
- C. Geuer-Pollmann, C. Ruland, M.
Moula, and P. Sklavos, “Digital Signatures
for Web Content E-business,” in
Key
Issues, Applications and
Technologies, Amsterdam: IOS
Press, 2000, 218–224.
- C. Ruland and O. Weissmann,
“Advanced Encryption Standard,”
Funkschau,
2000.
- C. Ruland and O. Weissmann,
“Secure Subscription Management on Agent
based Platforms,” in Globalcom
2000, San Francisco,
2000.
1999
- A. Friesen, N. Oikonomidis, C.
Ruland, and O. Weissmann, “A Distributed
Certificate Management System for Use in
Agent System,” in Workshop Proceedings,
M1-M9, 2nd ACTS Workshop,
Singapur, 1999.
- C. Geuer-Pollmann and C. Ruland,
“Das Simple Signature Protocol für
WWW-Sicherheit,” in Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim:
Secumedia-Verlag, 1999,
461–465.
- O. Jung and C. Ruland,
“Encryption with Statistical
Self-Synchronization in Synchronous
Broadband Networks,” in Tagungsband
Cryptographic Hardware and Embedded
Systems, Lecture Notes in Computer
Science, Worcester, USA,
1999.
- S. Kuhn, C. Ruland, and K.
Wollenweber, “ATM-Encryption with 155
Mbit,” in IEEE ATM-Workshop
'99, Kochi-Japan,
1999.
- S. Kuhn, C. Ruland, and K.
Wollenweber, “ATM-Verschlüsselung mit 155
Mbit/s,” in Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim:
Secumedia-Verlag, 1999,
287–295.
- C. Ruland, “Security vor dem
Wachstumsschub,” Comparex
Journal, vol. 28, 10–11,
1999.
- C. Ruland and O. Weissmann,
“Zugangskontrolle für universelle
Dienstenutzung in Agentensystemen,”
in Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Secumedia-Verlag:
Ingelheim, 1999, 455–460.
1998
- C. Ruland, “Electronic
Commerce,” 25 Jahre Telemation
Jubiläumsausgabe, no. 10, 1–9,
1998.
1997
- C. Ruland,
“Breitbandverschlüsselung (155 Mbit/s) mit
Selbstsynchronisation,” in
5.
Deutscher
IT-Sicherheitskongreß des BSI 1997, „Mit
Sicherheit in die
Informationsgesellschaft“, Tagungsband
erschienen im SecuMedia
Verlag, Ingelheim:
Secumedia-Verlag, 1997,
289–301.
- C. Ruland, “Regierung umgeht
Datenschutz: Orwell durch die
Hintertür?,” Computerwoche,
no. 15, 20, 1997.
1995
- D. Fox, T. Henn, K. Reichel, and
C. Ruland, “Guardeded Authentic Local Area
Network - GALAN -,” in Proceedings der
Fachtagung Verläßliche
Systeme: – VIS'95,DuD-Fachberichte,
Braunschweig: Vieweg-Verlag, 1995,
163–180.
- C. Ruland, “Datenkompression,”
in Das
Telekommunikationswerk, D.
Schulte, Ed, Augsburg: Interest Verlag
GmbH, 1995, 1–48.
- C. Ruland, “Sichere Kommunikation
zwischen ISDN-Endgeräten,”
Datacom,
108–116, 1995.
- C. Ruland, “Sicherheit in
Verteilten Systemen,” in
Tutoriumsband:
KiVS'95,
Chemnitz, 1995, 1–45.
1994
- D. Dienst, D. Fox, and C. Ruland,
“Transparente Sicherheitsmechanismen für
ISDN-Anwendungen,” in Nutzung u. Technik von
Kommunikationsendgeräten, G.
Kleinke, Ed, Offenbach: VDE-Verlag, 1994,
81–95.
- C. Ruland, “Kontrollierter
Zugang,” Business Computing
Januar, no. 1, 28–31,
1994.
- C. Ruland, “Secure Common ISDN
Application Programming Interface
(S-CAPI),” in Sicherheitsschnittstellen
– Konzepte, Anwendungen und
Einsatzbeispiel: DUV Deutscher
Universitätsverlag; Gabler Vieweg
Westdeutscher Verlag, 1994.
1993
- C. Ruland, Informationssicherheit
in Datennetzen. Bergheim:
datacom Verlag, 1993.
- C. Ruland, “Realizing Digital
Signatures with One-Way Hash
Functions,” Cryptologia,
vol. 17, no. 3, 285–300, 1993.
1991
- H. Kallerhoff and C. Ruland,
“Statistische Untersuchungen von
Pseudozufallszahlenfolgen,”
KES
Kommunikations- und
EDV-Sicherheit, no. 3,
156–163, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und
Übersicht,” Datacom,
no. 4, 88–96, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und Übersicht
(Fortsetzung),” Datacom,
no. 5, 113–120, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Implementation und
Vergleichstests,” Datacom,
no. 8, 97–103, 1991.
1990
- C. Ruland, “Datensicherheit in
Lokalen Netzen, Teil 2,”
Datacom,
no. 1, 100–107, 1990.
- C. Ruland, “Sichere Übertragung
und Archivierung elektronischer
Dokumente,” Datacom,
no. 3, 120–130, 1990.
- C. Ruland, “Sicherheit und
Sicherheitsmanagement in Offenen
Kommunikationssystemen,”
Sonderheft
Netzwerkmanagement Spezial, Datacom
Verlag, 202–213,
1990.
- C. Ruland, “Vertrauenswürdigkeit
und Vertraulichkeit elektronischer
Dokumente,” Recht der
Datenverarbeitung (RDV), no.
4, 168–174, 1990.
1989
- D. Bong and C. Ruland, “Optimized
Software Implementation of the Modular
Exponentiation on General Purpose
Microprocessors,” Computers &
Security, no. 8, 621–630,
1989.
- N. Pohlmann and C. Ruland,
“Datensicherheit bei Kommunikation über
Datex-P,” Datacom,
no. 1, 64–70, 1989.
- C. Ruland, “Datensicherheit in
Lokalen Netzen, Teil 1,”
Datacom,
no. 12, 94–99, 1989.
- C. Ruland, “Zur Datensicherheit
in Lokalen Netzen,” Recht der
Datenverarbeitung (RDV), no.
5/6, 210–218, 1989.
1988
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 4:
Sicherheitsmechanismen und
ISO-Referenzmodell,” Datacom,
no. 1, 92–97, 1988.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 5: Realisierung
einer Datenschutzeinrichtung,”
Datacom,
no. 3, 114–120, 1988.
1987
- C. Ruland, Datenschutz in
Kommunikations-Systemen.
Pulheim: datacom Verlag, 1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 1: Einführung
und Begriffe,” Datacom,
no. 1, 78–84, 1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 2:
Verschlüsselungsverfahren,”
Datacom,
no. 4, 98–104, 1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 3:
Authentizitätsprüfungs-verfahren und
Schlüsselverteilung,” Datacom,
no. 9, 172–177, 1987.
- C. Ruland,
“Sicherheitsarchitektur in Offenen
Kommunikationssystemen,”
Elektrotechnik
und Maschinenbau (E und M),
no. 12, 533–537, 1987.
1981
- C. Ruland, “Algorithmen zur
adaptiven Berechnung der schnellsten Wege
in Virtuellen Netzen,” Angewandte
Informatik, no. 11, 492-496,
1981.
- C. Ruland, “Routing in Virtuellen
Netzen,” Elektronische
Rechenanlagen, vol. 23, no. 4,
164–167, 1981.
- C. Ruland, “Virtuelle Netze für
verschiedene Benutzerklassen,”
Online
Heft 6, 456–458,
1981.
- C. Ruland, “Was ist ein
Virtuelles Netz?,” Elektronische
Rechenanlagen, vol. 23, no. 3,
134–136, 1981.
1978
- C. Ruland, “Ein Verfahren zur
Lösung von (Δ + k2) u = 0 in
Außengebieten mit Ecken,”
Applicable
Analysis, vol. 7, 69–79,
1978.
1976
- C. Ruland, “Ein Verfahren zur
Berechnung der Lösung des Dirichletschen
Außenraumproblems zur Helmholtzschen
Schwingungsgleichung bei stückweise glatten
Rändern,” Bonner Mathematische
Schriften, 1976.
1973
- C. Ruland, “Zur theoretischen und
numerischen Lösbarkeit des Dirichletschen
Außenraumproblems für die Helmholtzsche
Schwingungsgleichung,” Diplomarbeit,
Universität Bonn, Bonn, 1973.
|