2019
- N. Zivic, C. Ruland, J.
Sassmannshausen: Distributed Ledger
Technologies for M2M Communications,
The 33rd International Conference
on Information Networking (ICOIN
2019) January 9-11, 2019, Kuala Lumpur,
Malaysia (will be published at
IEEExplore)[Link].
- O. Ur-Rehman, N. Zivic, C. Ruland:
An Overview of Automotive Security
Standards, Mipro 2019, 20-24 May 2019,
Opatija, Croatia [Link].
- C. Ruland: Protect and Conserve
Robot's Transactions, Invited Talk on
the 4th World Congress of Robotics 2019
(WCR-2019), Aug. 31-Sep. 1, Shenyang,
China
- C. Ruland, J. Sassmannshausen:
System-wide Traceability of Commands
and Data Exchange in Smart Grids,
SEST'19 - 2nd International Conference
on Smart Energy Systems and
Technologies, September 9-11, Porto,
Portugal (paper accepted).
2018
- C. Ruland, J. Sassmannshausen,
Jyoti Pragyan Satpathy "An Attribute
Certificate Management System for
Attribute-based Access Control" 5th
Annual Conf. on Computational Science
& Computational Intelligence
(CSCI'18), Las Vegas, Dec 13-15,
2018 [Link].
- C. Ruland, J. Sassmannshausen
"Access Control in Safety Critical
Environments" 12th International
Conference on Reliability,
Maintainability and Safety
(ICRMS2018), Shanghai, China, Oct
15-17, 2018 [Link].
- C. Ruland, J. Sassmannshausen,
"Firewall for Attribute-Based Access
Control in Smart Grids," 2018 IEEE
International Conference on Smart
Energy Grid Engineering (SEGE),
Oshawa, ON, Canada, 2018, pp. 336-341.
[Link]
- Asmaa Tellabi, Jochen
Sassmannshausen, Edita Bajramovic, and
Karl Christoph Ruland. Overview of
authentication and access controls for
i&c systems. In 16th IEEE
International Conference on Industrial
Informatics, INDIN 2018, Porto,
Portugal, July 18-20, 2018, pages
882–889, 2018. [Link]
- N. Zivic and C. Ruland, "Cognitive
Channel Decoding", Future of
Information and Communication
Conference (FICC 2018), Singapore, Apr.
2018.
- N. Zivic and C. Ruland, "Cognition
for Enhanced Biometric Authentication,"
The 32nd International Conference on
Information Networking (ICOIN 2018),
Chang Mai, Thailand, Jan. 2018.
2017
- T. Wu and C. Ruland, "A redundancy
based compressive sensing recovery
optimization," 2017 40th International
Conference on Telecommunications and
Signal Processing (TSP), Barcelona,
2017, pp. 502-505.
- R. A. Djeujo and C. Ruland, "QoSs
definition and session description
protocol for secure communication using
compressive sensing," 6th International
Conference on Future Generation
Communication Technologies Conference
(FGCT), Dublin, Ireland, Aug. 21-23,
2017, pp. 1-7.
- R. A. Djeujo and C. Ruland, "Secret
matrix lifecycle management for
compressive sensing based cryptographic
mechanisms," IEEE 3th Annual Conference
in Computing, Communication, Control,
And Automation Conference (ICC3A),
Pune, India, Aug. 17-18, 2017, pp.
1-10.
- C. Ruland and J. Sassmannshausen,
"Transaction-based security for Smart
Grids", IEEE International Conference
on Smart Energy Grid Engineering (SEGE
2017), Oshawa, Canada, Aug 14-17, 2017.
[Link]
- C. Ruland, J. Sassmannshausen,
K.Waedt and N. Zivic, "Smart grid
security - an overview of standards and
guidelines", e & i Elektrotechnik
und Informationstechnik, vol. 134,
issue 1, pp. 19-25, Feb 2017, Springer
Wien. [Link]
- O. Ur Rehman, N. Živić and C.
Ruland, "Approximate Image
Authentication and Correction Using
Spatial and Frequency Domain Features",
11th International ITG Conference on
Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9,
2017.
- R. Fay and C. Ruland,
"Compressed Sampling and
Authenticated-Encryption", 11th
International ITG Conference on
Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9,
2017.
- N. Živić, O. Ur Rehman and C.
Ruland, "Iterative Decoder for OFDM
Transmission over Rayleigh Channel",
31st International Conference on
Information Networking (ICOIN 2017), Da
Nang, Vietnam, Jan. 11 - 13,
2017.
- R. A. Djeujo and C. Ruland,
“Embedding cryptographically secure
matrix transformation in structured
compressive sensing,” IEEE Annual
Computing and Communication Workshop
and Conference (CCWC 2017), pp.
529–535, Las Vegas, USA, Jan 9-11,
2017.
2016
- G. Gala, T. Koller, D. G. Pérez, G.
Fohler and C. Ruland, "Timing Analysis
of Secure Communication between
Resource Managers in DREAMS," Workshop
on Security and Dependability of
Critical Embedded Real-Time Systems,
Porto, Portugal, Nov. 29, 2016.
[Link]
- C. Ruland, N. Kang and J.
Sassmannshausen, "Rejuvenation of the
IEC 61850 Protocol Stack for MMS", IEEE
International Conference on Smart Grid
Communications (SmartGridComm 2016),
Sydney, Australia, Nov. 6-9, 2016.
[Link]
- R. A. Djeujo and C. Ruland,
“Secure matrix generation for
compressive sensing embedded
cryptography,” IEEE Annual Information
Technology, Electronics and Mobile
Communication Conference (IEMCON 2016),
pp. 250–257, Vancouver, BC, Canada,
Oct. 13-15, 2016. [Link]
- T. Koller, G. Gala, D. G. Perez, C.
Ruland, G. Fohler, "DREAMS: Secure
Communication between Resource
Management Components in Networked
Multi-Core Systems", IEEE Conference on
Open Systems 2016 (ICOS 2016),
Langkawi, Malaysia, Oct. 10-12, 2016
(Best paper award).
[Link]
- N. Živić, O. Ur Rehman and C.
Ruland, "Smart Metering for Intelligent
Buildings", Transactions on Networks
and Communications, vol. 4, no. 5, Oct.
2016. [Link]
- M. Schneider and C. Ruland,
"Verification of Time Signals", 30th
European Frequency and Time Forum
(EFTF), York, UK, Apr 4-7, 2016.
[Link]
- O. Ur Rehman, N. Zivic and C.
Ruland, "Content based Image
Authentication with Error Correction",
IEEE International Conference on
Communications (IEEE ICC'16),
Communication and Information System
Security Symposium, Kuala Lumpur,
Malaysia, May 23-27, 2016. [Link]
2015
- M. Schneider and C. Ruland,
“Verification of time telegrams in Long
Wave Radio systems", IEEE 2015 Joint
Conference of the IEEE International
Frequency Control Symposium & the
European Frequency and Time Forum
(IFCS-EFTF), Denver, Colorado, USA, pp.
270-275, Apr 12-16 2015. [Link]
- A. E. Tabatabaei, O. Ur
Rehman, N. Živić, and C. Ruland,
“Secure and Robust Two-phase Image
Authentication", IEEE Transactions on
Multimedia, vol. 17, no. 7, pp.
945-956, Jul 2015. [Link]
- O. Ur Rehman, A. E.
Tabatabaei, N. Živić, and C. Ruland:
"Spatial and Frequency Domain
Complementary Watermarks for Image
Authentication and Correction,” the
10th International ITG Conference on
Systems, Communications and Coding (SCC
2015) , Hamburg, Germany, pp. 1-6, Feb
2-5, 2015. [Link]
- O. Ur Rehman, N. Živić, and
C. Ruland, "Security Issues in Smart
Metering Systems", (Overall
best paper and innovation
award), IEEE International
Conference on Smart Energy Grid
Engineering (SEGE 2015), Oshawa Canada,
Aug 17-19, 2015. [Link]
- J. Saßmannshausen and C.
Ruland, "Nachweisbarkeit in Smart Grids
auf Basis von XML-Signaturen", D.A.CH
Security 2015, syssec IT Security
& IT Management, p. 98–109,
Frechen, Germany, Sep 8-9,
2015.
- J. Saßmannshausen and C.
Ruland, "End-to-End-Authentication in
Smart Grid Control", IEEE International
Conference on Smart Energy Grid
Engineering (SEGE 2015), Oshawa,
Canada, Aug 17-19, 2015. [ Link]
- N.
Živić, O. Ur Rehman
and C. Ruland, "Evolution of Smart
Metering Systems", 23rd IEEE
Telecommunications Forum (TELFOR 2015),
Belgrade, Serbia, Nov 24-26, 2015.
[Link]
- J. Sassmannshausen, C. Ruland,
"Non-repudiation Services for the MMS
Protocol of IEC 61850", Security
Standardization Research Conference
(SSR 2015), Tokyo, Japan, Dec 15-16,
2015. [Link]
2014
- A. Schantin and C. Ruland, “A
Bit-Error Based Capture Model for
EPCglobal RFID Systems,” in 52th Annual
Allerton Conference on Communication,
Control, and Computing (Allerton),
2014, pp. 221–226. [Link]
- J. Shin, D. Kim, and C.
Ruland, "Content based Image
Authentication using HOG feature
descriptor," in IEEE International
Conference on Image Processing, Paris,
France, 27 - 30 Oct. 2014. [Link]
- J. Shin, and C. Ruland, "A
Novel Design of Content based
Multimedia Security," in 9th Future
Security Conference, Berlin, Germany,
16 - 18 Sep. 2014.
- J. Shin, and C. Ruland, "A
Hybrid Approach for Content Based Image
Authentication," in 11th International
Conference on Security and Cryptography
(SECRYPT'14), Vienna, Austria, 28 - 30
Aug. 2014, pp. 371-378. [Link]
- O. Ur Rehman, N. Živić, C.
Ruland: "Security in Smart Metering
Systems under the Smart-Grid
Perspective", Tutorium, IEEE
BlackSeaCom 2014, May 2014, Chisinau,
Moldova
2013
- A. Schantin and C. Ruland,
“Retransmission Strategies for RFID
Systems Using the EPC Protocol,”
International Conference on RFID
Technologies and Applications
(RFID-TA), Johor Bahru, Malaysia, Sep.
4-5, 2013. [Link]
- M. Schneider and C. Ruland,
“Sicherheit von Broadcast-Datendiensten
im Smart Grid am Beispiel der
Rundsteuertechnik,” in
Informationssicherheit
stärken - Vertrauen in die Zukunft
schaffen:
[Tagungsband
zum 13. Deutschen
IT-Sicherheitskongress],
Gau-Algesheim: SecuMedia-Verl, 2013,
pp. 483–496.
- J. Shin and C. Ruland, “A
Survey of Image Hashing Technique for
Data Authentication in WMSNs,” in
Workshop on Internet of Things
Communications and Technologies (IOT
2013), Lyon, 2013, pp.
264–269. [Link]
- O. Ur Rehman, Tabatabaei, S.
Amir Hossein A. E, N. Zivic, and C.
Ruland, “Soft Authentication and
Correction of Images,” in
Systems,
Communication and Coding (SCC),
Proceedings of 2013 9th International
ITG Conference on, 2013,
pp. 1–6. [Link]
2012
- R. Schick and C. Ruland,
“Non-Repudiation of Forwarding:
Traceability of Confidential Data Via
Multiple Recipients,” in
9th
International Conference of Security
and Cryptography:
SciTePress, 2012, 387–390.
- R. Schick and C. Ruland, “On
the Security of the Non-Repudiation of
Forwarding Service,” in
Trust,
Privacy and Security in Digital
Business:
9th
International Conference, TrustBus
2012, Vienna, Austria, September 3-7,
2012. Proceedings, Berlin,
Heidelberg, s.l.: Imprint: Springer,
2012, 167–178. [Link]
2011
- J. Holle, A. Groll, C.
Ruland, H. Cankaya, and M. Wolf, “OPEN
PLATFORMS ON THE WAY TO AUTOMOTIVE
PRACTICE,” in 8th
ITS European Congress,
Lyon, 2011.
- R. Schick and C. Ruland,
“Data Leakage Tracking -
Non-Repudiation of Forwarding,”
in First Internation
Conference on Informatics Engineering
and Information Science,
2011, 163–173. [Link]
- R. Schick and C. Ruland,
“Document Tracking - On the Way to a
New Security Service,” in
Sixth
Conference on Network Architectures and
Information Systems
Security, 2011, 89–93.
[Link]
- R. Schick and C. Ruland,
“Introduction of a New Non-Repudiation
Service to Protect Sensitive Private
Data,” in Second
International Conference on Advances in
Information and Communication
Technologies,
2011.
- O. Ur Rehman, N. Zivic, S.
Tabatabaei, and C. Ruland, “Error
Correcting and Weighted Noise Tolerant
Message Authentication Codes,”
in Signal Processing
and Communication Systems (ICSPCS),
2011 5th International Conference
on, 2011, pp. 1–8.
[Link]
2010
- C. Bodenstedt, C. Ruland, D.
Weber, and A. Kung, "Integration of
Security and Dependability into
Resource constrained Embedded Systems,"
in The 3rd International Conference on
Telecommunications, Electronics and
Inforatics, Chisinau, Moldova:
Technical University of Moldova, 2010,
93–98.
- A. Groll, J. Holle, and C.
Ruland, "Upcoming Trends in the
Automotive IT and Associated Security
Challenges," in The 3rd International
Conference on Telecommunications,
Electronics and Inforatics, Chisinau,
Moldova: Technical University of
Moldova, 2010, 25–30. [Link]
- R. Schick, S. Tcaciuc, and C.
Ruland, "Information Security of
Multimodal Input Data -Traceability of
Image Data," in The 3rd International
Conference on Telecommunications,
Electronics and Inforatics, Chisinau,
Moldova: Technical University of
Moldova, 2010, 31–34.
- M. Schneider and C. Ruland,
“Steckdose als virtuelle Zapfsäule,” in
EMA 2010 - Elektromobilausstellung:
Fachtagung, Wettbewerbe; Vorträge der
ETG-Fachtagung vom 8. bis 9. Oktober
2010 in Aschaffenburg, Berlin:
VDE-Verl, 2010, 161–169. [Link]
- M. Schneider, S. Tcaciuc, and
C. Ruland, "Secure metering for
electrical vehicles," in E-Mobility:
Technologien - Infrastruktur - Märkte;
VDE-Kongress 2010 Leipzig, 8.-9.
November 2010 Congress Center Leipzig;
Kongressbeiträge, Berlin: VDE-Verl,
2010, FZT 1.4.13. [Link]
- O. Ur Rehman, N. Zivic, and
C. Ruland, "Iterative bit-flipped
decoding of concatenated reed
solomon/convolutional codes with HMAC,"
in IEEE International Symposium on
Performance Evaluation of Computer and
Telecommunication Systems, Ottawa,
Canada, 2010, 410–415. [Link]
- N. Zivic and C. Ruland,
"Security Architecture for Smart
Metering Systems, Software Services for
E-World," in 10th IFIP Advances in
Information and Communication
Technology, Buenos Aires, Argentina:
Springer-Verlag, 2010. [Link]
- N. Zivic, O. Ur Rehman, and
C. Ruland, "On the Probability and
Impact of Collisions on Soft Input
Decryption," in International Symposium
on Applied Sciences in Biomedical and
Communication Technologies, Rome,
Italy, 2010, 1–5. [Link]
2009
- A. Groll and C. Ruland,
“Gefahren der In-Fahrzeug-Kommunikation
moderner Automobile,” in
Sichere Wege in
der vernetzten Welt:
[Tagungsband
zum 11. Deutschen
IT-Sicherheitskongress ; vom 12. - 14.
Mai 2009 in Bonn],
Gau-Algesheim: SecuMedia-Verl,
2009.
- A. Groll and C. Ruland,
“Secure and Authentic Communication on
Existing Vehicle Networks,” in
IEEE
Intelligent Vehicles Symposium,
2009:
IV ; 3
- 5 June 2009, Xi'an,
China, Piscataway, NJ:
IEEE, 2009.
- J. Holle, A. Groll, C.
Ruland, M. Wolf, T. Wollinger, and F.
Zweers, “OVERSEE - A Secure and Open
Communication and Runtime Platform for
Innovative Automotive Applications,”
in Proceedings of the
7th escar - Embedded Security in Cars
Conference, Düsseldorf,
2009.
- N. Zivic, C. Ruland, and O.
Ur Rehman, “Error Correction over
Wireless Channel Using Symmetric
Cryptography,” in IEEE International
Conference on Wireless Communication
Society, Vehicular Technology,
Information Theory and Aerospace &
Electronic Systems
Technology, Aalborg,
Denmark, 2009, 752–756. [Link]
- N. Zivic, O. Ur Rehman, and
C. Ruland, “Analysis of Serial and
Parallel Soft Input Decryption Schemes
over a Wireless Channel,” in
IEEE
International Symposium on Performance
Evaluation of Computer and
Telecommunication Systems,
Istanbul, Türkei: IEEE, 2009, 282–288.
[Link]
- N. Zivic, O. Ur Rehman, and
C. Ruland, “Using HMAC for Error
correction over Wireless Channel,”
in Symposia and
Workshops on Ubiquitous, Autonomic and
Trusted Computing,
Brisbane, Australien, 2009, 252–256.
[Link]
2008
- M. Dunte and C. Ruland,
“Construction and Usage of Time-limited
Keys in Secure Multimedia
Distribution,” in Third
International Conference on
Communications and Networking in China,
2008:
ChinaCom 2008 ; 25
- 27 Aug. 2008, Hangzhou,
China, Piscataway, NJ:
IEEE, 2008. [Link]
- M. Dunte and C. Ruland,
“Delivery Infrastructure for Secure
Scalable Coded Multimedia,” in
28th
International Conference on Distributed
Computing Systems
workshops:
17 -
20 June 2008,
Beijing, China ;
proceedings, Los Alamitos,
Calif.: IEEE Computer Society, 2008,
42–47. [Link]
- M. Dunte and C. Ruland,
“Realising Time-Iimitation for
Cryptographic Keys in Secure Multimedia
Distribution,” Security and
Communication Networks,
vol. 1, no. 6, 451–459,
2008.
- A. Groll, J. Holle, and C.
Ruland, “Simulative Bestimmung der
CAN-Bus-Lastgrenzen,” in
Automotive -
Safety & Security 2008 - Sicherheit
und Zuverlässigkeit für automobile
Informationstechnik:
19.
und
20. November 2008,
Stuttgart, Aachen: Shaker,
2008.
- A. Groll and C. Ruland,
“Trusted Communication Groups for
Authentic In-Car Communication,”
in Proceedings of the
6th escar - Embedded Security in Cars
Conference, Hamburg,
2008.
- S. Tcaciuc and C. Ruland,
“Optimizations of Flow Control under
QOS Aspects between Core Network and
Access Network Domains,” in
Proceeding of the
2nd International Conference
"Telecommunications, Electronics and
Informatics", Chisinau,
Moldova, 2008, 37–42.
- N. Zivic and C. Ruland,
“Joint Channel Coding - Cryptography,”
in Infoteh,
Jahorina, Bosnia, 2008.
- N. Zivic and C. Ruland,
“Method for Improvement of Soft Input
Decryption Performances,” in
12th
WSEAS Conf. on Computer
Sciences:
July
2008, Herklion, Greece,
2008.
- N. Zivic and C. Ruland,
“Channel Coding as a Cryptography
Enhancer,” Transaction on
Communications, vol. 7,
no. 3, 83–91, 2008.
- N. Zivic and C. Ruland,
“Feedback in Soft Input
Decryption,” WSEAS Transactions
on Communications, vol. 7,
no. 5, 428–437, 2008.
- N. Zivic and C. Ruland,
“Optimization of Soft Input
Decryption,” in Conference on Soft
Computing, Brno University of
Technology, Brno
University of Technology, Czech
Republic, 2008, 241–246.
- N. Zivic and C. Ruland,
“Parallel Joint Channel Coding and
Cryptography: July 2008,”
Proceedings of
World Academy of Science, Engineering
and Technology, vol. 31,
536–539, 2008.
- N. Zivic and C. Ruland,
“Parallel Joint Channel Coding and
Cryptography,” International
Journal of Computer Science and
Engineering, WASET World Academy of
Science, Engineering and
Technology, vol. 4, no. 2,
140–144, 2008.
- N. Zivic and C. Ruland,
“Probability of Collisions in Soft
Input Decryption,” in
Recent
advances on applied
mathematics:
Proceedings of the
American Conference on Applied
Mathematics (MATH '08) : Cambridge,
Massachusetts, USA, March 24 -
26,2008, Athen: WSEAS
Press, 2008, 362–366.
- N. Zivic and C. Ruland, “Soft
Input Decryption using feedback,”
in 7th
WSEAS International Conference on
Software Engineering, Parallel and
Distributed Systems (SEPAD
'08), University of
Cambridge, UK, 2008,
174–177.
2007
- M. Dunte and C. Ruland, “On
the Way to Secure Delivery of Scalable
Coded Media,” in Mikulášská
kryptobesídka, Prag,
Tschechische Republik, 2007,
51–59.
- M. Dunte and C. Ruland,
“Secure Voice-over-IP,”
IJCNS
International Journal of Computer
Science and Network
Security, vol. 7, no. 6,
63–68, 2007.
- S. Hick and C. Ruland,
“Security Aspects for Secure Download
of Regulated Software,” in
Trust,
privacy and security in digital
business:
4th
international conference, TrustBus
2007, Regensburg, Germany, September 4
- 6, 2007 ; proceedings,
Berlin: Springer, 2007, 219–227.
[Link]
- T. Lohmann and C. Ruland,
“Digital Signatures Based on Elliptic
Curves in RFIDs,” IJCNS
International Journal of Computer
Science and Network
Security, vol. 7, no. 1,
275–281, 2007. [Link]
- N. Oikonomidis, C. Ruland,
and S. Tcaciuc, “Deployment of
E-Government Municipal Services:
Enforcement of Security Polices,”
in Secure
E-government web services,
A. Mitrakas, Ed, Hershey: Idea Group
Publ, 2007, 111–123.
- C. Ruland, “Secure Online
Metering for a Liberalized Energy
Market,” in Secure
E-government web services,
A. Mitrakas, Ed, Hershey: Idea Group
Publ, 2007, 97–110. [Link]
- C. Ruland and N. Zivic,
“Joint Coding and Decryption,”
in Ictis'
07, Fes, Marokko,
2007.
- N. Zivic and C. Ruland, “Soft
Input Decryption and its Iterative
Application,” in TELFOR:
November
20-22, Belgrade, Serbia,
2007.
- N. Zivic and C. Ruland,
“Channel coding as a cryptography
enhancer,” in Proceedings in the
11 th WSEAS international conference on
Communications, Crete
Island, Greece, 2007,
273–278.
- N. Zivic and C. Ruland,
“Improvement of Digital Signature Error
Rates,” in Information,
Communication and Automation
Technologies ICAT 2007,
Sarajewo, 2007.
- N. Zivic and C. Ruland,
“Probability of Collisions in Soft
Input Decryption,” International
Journal of Applied Mathematics and
Informatics, vol. 1, no.
1, 21–27, 2007.
2006
- N. Kang, L. Lo Iacono, C.
Ruland, and Y. Kim, “Efficient
Application of IPsec VPNs in Wireless
Networks,” in ISWPC 2006
Conference
Proceedings:
IEEE
conference International Symposium on
Wireless Pervasive Computing
2006, Phuket, Thailand,
2006, 337–341.
- L. Lo Iacono, S. Müller, C.
Ruland, and N. Zisky,
“Sicherheitslösung für die
automatisierte Messdatenkommunikation -
Best-Practice Lösung im liberalisierten
Energiemarkt,” Datenschutz und
Datensicherheit (DuD), no.
6, 347–352, 2006.
- L. Lo Iacono, C. Ruland, and
N. Zisky, “Secure transfer of
measurement data in open
systems,” Computer Standards
& Interfaces, vol. 28,
2006.
- T. Lohmann and C. Ruland,
“Security Levels of Bluetooth,”
in Workshop on
Intelligent
Transportation, Hamburg,
2006.
- C. Ruland, T. Lohmann, and M.
Schneider, “Analysis of Power
Constraints for Cryptographic
Algorithms in Mid-Cost RFID Tags,”
in Smart Card
Research and Advanced
Applications:
7th
IFIP WG 8.8/11.2 International
Conference, CARDIS 2006, Tarragona,
Spain, April 19-21, 2006,
Proceedings, Berlin
Heidelberg: Springer-Verlag GmbH, 2006,
278–288.
- C. Ruland and N. Zivic, “Soft
Input Decryption, Turbo Coding 2006,”
in Turbo-Coding-2006:
4th
International Symposium on Turbo Codes
& Related Topics ; 6th
International ITG-Conference on Source
and Channel Coding ; April 03 - 07,
2006, Munich, Berlin: VDE
Verl, 2006.
2005
- Proceedings of the
Int. Conference on
e-Government. Ottoawa,
Canada, 2005.
- L. H. B. Dietze, L. Lo
Iacono, and C. Ruland, “Qualifizierte
Signatur im elektronischen
Messdatenaustausch,” in
Qualifizierte
elektronische Signaturen in Theorie und
Praxis (QSIG 2005):
Workshop im Rahmen
der GI Tagung, Sicherheit
2005, Regensburg,
2005.
- K. Hong, S. W. Jung, L. Lo
Iacono, and C. Ruland, “Impacts of
Security Protocols on Real-time
Multimedia Communications,”
Lecture Notes,
Computer Science, vol.
3325, no. 2, 1–13, 2005.
- S. W. Jung, N. Kang, C.
Ruland, and Y. Kim, “Efficient Way to
Employ Stream Authentication Schemes in
Multicast Using Short-lived Keys,”
in Preproceedings of
WISA 2005 vol.6, The 6th International
Workshop on Information Security
Applications, Jeju in
Korea, 2005.
- M. Kahmann, L. Lo Iacono, C.
Ruland, and T. Schütze,
“Sicherheitskonzept,” in
PTB-BerichtIT,
Informationstechnik, vol.
12, Das
SELMA-Projekt:
Konzepte, Modelle,
Verfahren, N. Zisky, Ed,
Bremerhaven: Wirtschaftsverl. NW Verl.
für neue Wissenschaft, 2005,
165–246.
- A. Kaliotzoglou, A.
Karantjias, N. Oikonomidis, C. Ruland,
and S. Tcaciuc, “Design Principles and
Aspects for Cross-Border Municipal
Service Deployment,” in
Workshop and
Poster Proceedings of the 4th
International EGOV Conference, EGOV'05
4th International Conference on
Electronic Government,
Denmark, 2005.
- N. Kang, A. Kunz, L. Lo
Iacono, and C. Ruland, “Analysis of the
QoS Requirements under Radio Access
Network Planning Aspects for GPRS/EDGE
and UMTS,” in IEEE WirelessCom
2005 Conference, First International
Symposium on Wireless
Quality-of-Service
(WiQoS'05), Maui, Hawaii,
USA, 2005.
- N. Kang and C. Ruland, “MDS:
Multiplexed Digital Signature for
Real-time Streaming over
Multisessions,” in The International
Conference on Information Networking
(ICOIN) 2005, Jeju, Korea,
2005, 824–834.
- N. Kang and C. Ruland,
“Security analysis of DoS Vulnerability
in Stream Authentication Schemes Using
Hash Chaining,” IEICE Transaction
on Communications, vol.
E88-B, no. 3, 2005.
- N. Oikonomidis, C. Ruland,
and S. Tcaciuc, “An Architecture for
Secure Policy Enforcement in
E-Government Services Deployment,”
in Communications and
multimedia security:
9th
IFIP TC-6 TC-11 international
conference, CMS 2005, Salzburg,
Austria, September 19-21, 2005 ;
proceedings, Berlin:
Springer, 2005.
- N. Oikonomidis, C. Ruland,
and S. Tcaciuc, “Enforcement of
Security Policies for e-Government
Services on Municipal and Cross-Border
Level,” in Proceedings of the
Int. Conference on
e-Government, Ottoawa,
Canada, 2005, 311–320.
- N. Oikonomidis, C. Ruland,
and S. Tcaciuc, “Provision of Secure
Policy Enforcement Between Small and
Medium Governmental Organizations,”
in Second
International Conference, TrustBus
2005, Berlin Heidelberg:
Springer-Verlag, 2005,
141–150.
- M. Wahl (geb. Angele), C.
Ruland, and T. Schütze,
“Sicherheitsanalyse,” in
PTB-BerichtIT,
Informationstechnik, vol.
12, Das
SELMA-Projekt:
Konzepte, Modelle,
Verfahren, N. Zisky, Ed,
Bremerhaven: Wirtschaftsverl. NW Verl.
für neue Wissenschaft, 2005,
117–164.
2004
- N. Kang and C. Ruland,
“DiffSig: Differentiated Digital
Signature for Real-time Multicast
Packet Flows,” in Lecture Notes in
Computer Science:
1st
International Conference on Trust and
Privacy in Digital Business (TrustBus
'04) in conjunction with the 15th
International Conference on Database
and Expert Systems Applications (DEXA
2004), Zaragoza, Spain,
2004.
- N. Oikonomidis and C. Ruland,
“Identity Based Protocols for Secure
Electronic Content Distribution and
Licensing 4th International Conference
on Web Delivering of Music,” in
Proceedings of
IEEE Computer Society,
Universität Pompeu Fabra, Barcelona,
Spain, 2004, 92–99.
- C. Ruland and S. Tcaciuc, “A
Table Based Scheduler for the QoS
enabled Flow Control in GPRS/EDGE
Networks,” in IASTED
International Conference on
Communication Systems and Networks CSN
2004, Marbella, Spain,
2004.
- C. Ruland and S. Tcaciuc,
“Scheduler Based Flow Control under QoS
Aspects in GPRS/EDGE Networks,”
in IEEE International
Conference on Networks 2004/ICON
2004, Singapur,
2004.
- C. Ruland and M. Wahl, “Usage
of Mobile Agents for Wireless
Multimedia Communication,” in
Proceedings of
IASTED conference on Communication
Systems and Applications (CSA
2004):
Acta-Press, IASTED
conference on Communication Systems and
Applications (CSA 2004),
Canada, 2004.
2003
- L. Lo Iacono, C. Ruland, and
M. Wahl, “Einsatz der elektronischen
Signatur für den Messdatenaustausch im
liberalisierten Energiemarkt (Secure
Electronic Exchange of Metering Data),”
in VDI Berichte Nr.
1785, Telematik Tagung,
Siegen, 2003.
2002
- A. Friesen and C. Ruland,
“Das eContract-Konzept Ein
Sicherheitsmodell für
Multi-Service-Multi-Provider-Architekturen
Enterprise Security,” in
Tagungsband
Enterprise Security,
2002.
- A. Friesen and C. Ruland,
“Design eines Profil- und
Zertifikatsmanagementsystem für das
Service by eContract-Konzept,”
in Lecture Notes in
Informatics:
GI
Jahrestagung, GI-Edition,
Bonn, 2002.
- L. Lo Iacono and C. Ruland,
“Confidential Multimedia Communication
in IP Networks,” in 8th
IEEE International Conference on
Communication Systems,
Singapur, 2002.
- L. Lo Iacono and C. Ruland,
“Eine Sicherheitsarchitektur für den
Austausch elektronischer Messdaten im
liberalisierten Energiemarkt,”
in SELMA-Workshop,
Physikalisch-Technische
Bundesanstalt, Berlin,
2002.
- L. Lo Iacono, C. Ruland, and
N. Schweitzer, “Signing Digital
Streams,” in Proceedings of 4th
International ITG Conference on Source
and Channel Coding:
4th
International ITG Conference on Source
and Channel Coding,
Berlin, 2002, 324–334.
- C. Ruland and F. Schlake, “A
Security Protocol Providing QOS in ATM
Networks,” in 8th
IEEE International Conference on
Communication Systems,
Singapur, 2002.
- C. Ruland and M. Wahl,
“Sicherheitsanalyse der Übertragung von
Energiedaten über offene Netze,”
in SELMA-Workshop,
Physikalisch-Technische
Bundesanstalt, Berlin,
2002.
2001
- A. Friesen and C. Ruland,
“Service by e-contract - a security
model for authentication, access
control and online subscription
management multi-service-multi-provider
architectures,” in Proceedings,
Volume II Information
Systems:
World
Multiconference on Systemics,
Cybernetics and
Informatics, Orlando,
2001, 581–585.
- C. Geuer-Pollmann and C.
Ruland, “XML-Sicherheit - Stand heute,”
in Sicherheit im
Internet:
Deutscher
IT-Sicherheitskongress BSI
2001, Bonn Bad Godesberg,
2001, 197–209.
- O. Jung, S. Kuhn, C. Ruland,
and K. Wollenweber, “Enhanced Modes of
Operation for the Encryption in
High-Speed Networks and Their Impact on
QoS,” in V. Varadharajan u.
Y. Mu (Eds), LNCS 2119,
Berlin Heidelberg, 2001,
344–359.
- O. Jung, S. Kuhn, C. Ruland,
and K. Wollenweber, “Properties of
Modes of Operation with Statistical
Self-Synchronization Mechanisms,”
in ICICS Shaping The
New Information ERA:
3rd
International Conference on
Information, Communications and Signal
Processing, Singapur,
2001.
- O. Jung, S. Kuhn, C. Ruland,
and K. Wollenweber, “Suitability of
Cryptographic Modes of Operation for
the Encryption in High- Speed
Networks,” in IEEE
Proceedings, Bangkok,
Thailand, 2001, 134–139.
- C. Ruland and N. Schweitzer,
“Digitale Signatur von Bitströmen,”
in 7.
Deutscher
IT-Sicherheitskongress BSI
2001, Bonn Bad Godesberg:
Secumedia-Verlag, Ingelheim 2001,
2001.
2000
- C. Geuer-Pollmann, C. Ruland,
M. Moula, and P. Sklavos, “Digital
Signatures for Web Content E-business,”
in Key Issues,
Applications and
Technologies, Amsterdam:
IOS Press, 2000, 218–224.
- C. Ruland and O. Weissmann,
“Advanced Encryption Standard,”
Funkschau,
2000.
- C. Ruland and O. Weissmann,
“Secure Subscription Management on
Agent based Platforms,” in
Globalcom
2000, San Francisco,
2000.
1999
- A. Friesen, N. Oikonomidis,
C. Ruland, and O. Weissmann, “A
Distributed Certificate Management
System for Use in Agent System,”
in Workshop
Proceedings, M1-M9, 2nd ACTS
Workshop, Singapur,
1999.
- C. Geuer-Pollmann and C.
Ruland, “Das Simple Signature Protocol
für WWW-Sicherheit,” in
Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim:
Secumedia-Verlag, 1999,
461–465.
- O. Jung and C. Ruland,
“Encryption with Statistical
Self-Synchronization in Synchronous
Broadband Networks,” in
Tagungsband
Cryptographic Hardware and Embedded
Systems, Lecture Notes in Computer
Science, Worcester, USA,
1999.
- S. Kuhn, C. Ruland, and K.
Wollenweber, “ATM-Encryption with 155
Mbit,” in IEEE ATM-Workshop
'99, Kochi-Japan,
1999.
- S. Kuhn, C. Ruland, and K.
Wollenweber, “ATM-Verschlüsselung mit
155 Mbit/s,” in Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim:
Secumedia-Verlag, 1999,
287–295.
- C. Ruland, “Security vor dem
Wachstumsschub,” Comparex
Journal, vol. 28, 10–11,
1999.
- C. Ruland and O. Weissmann,
“Zugangskontrolle für universelle
Dienstenutzung in Agentensystemen,”
in Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Secumedia-Verlag:
Ingelheim, 1999, 455–460.
1998
- C. Ruland, “Electronic
Commerce,” 25
Jahre
Telemation
Jubiläumsausgabe, no. 10,
1–9, 1998.
1997
- C. Ruland,
“Breitbandverschlüsselung (155 Mbit/s)
mit Selbstsynchronisation,” in
5.
Deutscher
IT-Sicherheitskongreß des BSI 1997,
„Mit Sicherheit in die
Informationsgesellschaft“, Tagungsband
erschienen im SecuMedia
Verlag, Ingelheim:
Secumedia-Verlag, 1997,
289–301.
- C. Ruland, “Regierung umgeht
Datenschutz: Orwell durch die
Hintertür?,” Computerwoche,
no. 15, 20, 1997.
1995
- D. Fox, T. Henn, K. Reichel,
and C. Ruland, “Guardeded Authentic
Local Area Network - GALAN -,”
in Proceedings der
Fachtagung Verläßliche
Systeme:
–
VIS'95,DuD-Fachberichte,
Braunschweig: Vieweg-Verlag, 1995,
163–180.
- C. Ruland,
“Datenkompression,” in
Das
Telekommunikationswerk, D.
Schulte, Ed, Augsburg: Interest Verlag
GmbH, 1995, 1–48.
- C. Ruland, “Sichere
Kommunikation zwischen
ISDN-Endgeräten,” Datacom,
108–116, 1995.
- C. Ruland, “Sicherheit in
Verteilten Systemen,” in
Tutoriumsband:
KiVS'95,
Chemnitz, 1995, 1–45.
1994
- D. Dienst, D. Fox, and C.
Ruland, “Transparente
Sicherheitsmechanismen für
ISDN-Anwendungen,” in
Nutzung u. Technik
von
Kommunikationsendgeräten,
G. Kleinke, Ed, Offenbach: VDE-Verlag,
1994, 81–95.
- C. Ruland, “Kontrollierter
Zugang,” Business Computing
Januar, no. 1, 28–31,
1994.
- C. Ruland, “Secure Common
ISDN Application Programming Interface
(S-CAPI),” in Sicherheitsschnittstellen
– Konzepte, Anwendungen und
Einsatzbeispiel: DUV
Deutscher Universitätsverlag; Gabler
Vieweg Westdeutscher Verlag,
1994.
1993
- C. Ruland,
Informationssicherheit
in Datennetzen. Bergheim:
datacom Verlag, 1993.
- C. Ruland, “Realizing Digital
Signatures with One-Way Hash
Functions,” Cryptologia,
vol. 17, no. 3, 285–300,
1993.
1991
- H. Kallerhoff and C. Ruland,
“Statistische Untersuchungen von
Pseudozufallszahlenfolgen,”
KES
Kommunikations- und
EDV-Sicherheit, no. 3,
156–163, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und
Übersicht,” Datacom,
no. 4, 88–96, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und
Übersicht (Fortsetzung),”
Datacom,
no. 5, 113–120, 1991.
- M. Longerich and C. Ruland,
“Datenkompression, Implementation und
Vergleichstests,” Datacom,
no. 8, 97–103, 1991.
1990
- C. Ruland, “Datensicherheit
in Lokalen Netzen, Teil 2,”
Datacom,
no. 1, 100–107, 1990.
- C. Ruland, “Sichere
Übertragung und Archivierung
elektronischer Dokumente,”
Datacom,
no. 3, 120–130, 1990.
- C. Ruland, “Sicherheit und
Sicherheitsmanagement in Offenen
Kommunikationssystemen,”
Sonderheft
Netzwerkmanagement Spezial, Datacom
Verlag, 202–213,
1990.
- C. Ruland,
“Vertrauenswürdigkeit und
Vertraulichkeit elektronischer
Dokumente,” Recht der
Datenverarbeitung (RDV),
no. 4, 168–174, 1990.
1989
- D. Bong and C. Ruland,
“Optimized Software Implementation of
the Modular Exponentiation on General
Purpose Microprocessors,”
Computers &
Security, no. 8, 621–630,
1989.
- N. Pohlmann and C. Ruland,
“Datensicherheit bei Kommunikation über
Datex-P,” Datacom,
no. 1, 64–70, 1989.
- C. Ruland, “Datensicherheit
in Lokalen Netzen, Teil 1,”
Datacom,
no. 12, 94–99, 1989.
- C. Ruland, “Zur
Datensicherheit in Lokalen
Netzen,” Recht der
Datenverarbeitung (RDV),
no. 5/6, 210–218, 1989.
1988
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 4:
Sicherheitsmechanismen und
ISO-Referenzmodell,”
Datacom,
no. 1, 92–97, 1988.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 5:
Realisierung einer
Datenschutzeinrichtung,”
Datacom,
no. 3, 114–120, 1988.
1987
- C. Ruland,
Datenschutz
in
Kommunikations-Systemen.
Pulheim: datacom Verlag,
1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 1:
Einführung und Begriffe,”
Datacom,
no. 1, 78–84, 1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 2:
Verschlüsselungsverfahren,”
Datacom,
no. 4, 98–104, 1987.
- C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 3:
Authentizitätsprüfungs-verfahren und
Schlüsselverteilung,”
Datacom,
no. 9, 172–177, 1987.
- C. Ruland,
“Sicherheitsarchitektur in Offenen
Kommunikationssystemen,”
Elektrotechnik und
Maschinenbau (E und M),
no. 12, 533–537, 1987.
1981
- C. Ruland, “Algorithmen zur
adaptiven Berechnung der schnellsten
Wege in Virtuellen Netzen,”
Angewandte
Informatik, no. 11,
492-496, 1981.
- C. Ruland, “Routing in
Virtuellen Netzen,” Elektronische
Rechenanlagen, vol. 23,
no. 4, 164–167, 1981.
- C. Ruland, “Virtuelle Netze
für verschiedene
Benutzerklassen,” Online Heft
6, 456–458,
1981.
- C. Ruland, “Was ist ein
Virtuelles Netz?,” Elektronische
Rechenanlagen, vol. 23,
no. 3, 134–136, 1981.
1978
- C. Ruland, “Ein Verfahren zur
Lösung von (Δ + k2) u = 0 in
Außengebieten mit Ecken,”
Applicable
Analysis, vol. 7, 69–79,
1978.
1976
- C. Ruland, “Ein Verfahren zur
Berechnung der Lösung des
Dirichletschen Außenraumproblems zur
Helmholtzschen Schwingungsgleichung bei
stückweise glatten Rändern,”
Bonner
Mathematische Schriften,
1976.
1973
- C. Ruland, “Zur theoretischen
und numerischen Lösbarkeit des
Dirichletschen Außenraumproblems für
die Helmholtzsche
Schwingungsgleichung,” Diplomarbeit,
Universität Bonn, Bonn,
1973.
|