E. Marevac, E. Kadusic, C. Ruland, Life senior member, N. Zivic: Application of Deep Learning and Neural Networks
for Smart Grid Stability Predictions, 2024 IEEE the 12th International Conference on Smart Energy Grid Engineering
Imad Buljić, E. Kadusic, E. Marevac, C. Ruland, N. Zivic: A Comparative Study on the Disparities and
Performance Metrics between NoSQL Graph and Relational Databases, Proc. of International Conference on Electrical and Computer Engineering Researches (ICECER 2024)
4-6 December 2024, Gaborone - Botswana
2022
Catovic, E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland:
AIR POLLUTION PREDICTION AND WARNING SYSTEM USING IOT AND
MACHINE LEARNING, 2022 International Conference on
Electrical, Computer, Communications and Mechatronics
Engineering (ICECCME), 16-18 November 2022, Maldives,
Maldives, Publisher: IEEE - DOI:
10.1109/ICECCME55909.2022.9987957
E. Kadusic, N. Hadzajlic, C. Ruland, N. Zivic: THE
FACTORS FOR CHOOSING AMONG NB-IOT, LORAWAN, AND SIGFOX
RADIO COMMUNICATION TECHNOLOGIES FOR IOT NETWORKING,
2022 International Conference on Connected Systems
& Intelligence (CSI), 31 August 2022 - 02 September
2022, Trivandrum, India, Publisher: IEEE - DOI:
10.1109/CSI54720.2022.9923999
E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland: THE
TRANSITIONAL PHASE OF BOOST.ASIO AND POCO C++
NETWORKING LIBRARIES TOWARDS IPV6 AND IOT NETWORKING
SECURITY, 2022 IEEE International Conference on Smart
Internet of Things (SmartIoT), 19-21 August 2022,
Suzhou, China, Publisher: IEEE - DOI:
10.1109/SmartIoT55134.2022.00022
E. Kadusic, N. Zivic, N. Hadzajlic, C. Ruland: A
SMART PARKING SOLUTION BY INTEGRATING NB-IOT RADIO
COMMUNICATION TECHNOLOGY INTO THE CORE IOT PLATFORM,
Future Internet 2022, 14(8), 219;
https://doi.org/10.3390/fi14080219, Published: 25 July
2022.
2020
C. Ruland (Hrsg): Jochen Saßmannshausen:
Attribute-based access control for smart grids and
industrial automation and control systems. In:
Forschungsberichte / Universität Siegen, Institut für
Digitale Kommunikationssysteme Band 40. Düren: Shaker
Verlag, 2020. - ISBN 978-3-8440-7507-6
2019
E. Kadusic, N. Zivic, A. Masovic, C. Ruland:
“Implementation of MQTT Native Application for Tizen-based
Smartwatches”, 6th Annual Conference on Computational
Science and Computational Intelligence, December 5-7, Las
Vegas, Nevada, USA
A. Tellabi, M. Parekh, C. Ruland, M. Ezziyyani , “A
case study of virtualization used in Mixed Criticality
Systems,” Advanced Intelligent Systems for Sustainable
Development (AI2SD), Marrakech, Morocco, 2019
J. Fehmi, A. Tellabi, S. AbdelBast, C. Ruland, “On
the Analysis of the Impact of Scheduling Plans in
Safety Critical Requirements in Virtualization,”
International Conference on Cybersecurity (ICOCSec),
Malaysia, 2019
A. Tellabi, C. Ruland, K. Waedt, A. Sabri,
“Self-Diagnostics and Isolation mechanisms for Mixed
Criticality Systems,”. In Journal of Communications
Software and Systems (JCOMSS), 2019. DOI:
http://dx.doi.org/10.24138/jcomss.v15i4.810
A. Tellabi, C. Ruland, "Empirical Study of
Real-Time Hypervisors for Industrial Systems," 2019
International Conference on Computational Science and
Computational Intelligence (CSCI), 2019, pp. 208-213,
doi: 10.1109/CSCI49370.2019.00042
N. Zivic, C. Ruland and O. Ur-Rehman, "Addressing
Byzantine Fault Tolerance in Blockchain
Technology," 2019 8th International Conference
on Modeling Simulation and Applied Optimization
(ICMSAO), Manama, Bahrain, 2019, pp. 1-5 [Link].
N. Zivic, C. Ruland, J. Sassmannshausen:
Distributed Ledger Technologies for M2M Communications,
The 33rd International Conference on Information
Networking (ICOIN 2019) January 9-11, 2019, Kuala
Lumpur, Malaysia [Link].
O. Ur-Rehman, N. Zivic, C. Ruland: An Overview of
Automotive Security Standards, Mipro 2019, 20-24 May
2019, Opatija, Croatia [Link].
C. Ruland: Protect and Conserve Robot's
Transactions, Invited Talk on the 4th World Congress of
Robotics 2019 (WCR-2019), Aug. 31-Sep. 1, Shenyang,
China
C. Ruland, J. Sassmannshausen: System-wide
Traceability of Commands and Data Exchange in Smart
Grids, SEST'19 - 2nd International Conference on Smart
Energy Systems and Technologies, September 9-11, Porto,
Portugal (paper accepted).
2018
A. Tellabi, I. Ben Zid, C. Ruland, K. Waedt ,
“Virtualization on Secure Platforms for Industrial
Applications Current use cases and future perspectives, ”.
In: 12th International Conference on Reliability
Maintainability and Safety (ICRMS), 2018
A. Tellabi, L. Peters, C. Ruland, K. Waedt,
“Security Aspects of Hardware Virtualization
Technologies for Industrial Automation and Control
Systems,” GIACM Workshop on I4.0/IACS Standardization,
Berlin, 2018
C. Ruland, J. Sassmannshausen, Jyoti Pragyan
Satpathy "An Attribute Certificate Management System
for Attribute-based Access Control" 5th Annual
Conf. on Computational Science & Computational
Intelligence (CSCI'18), Las Vegas, Dec 13-15, 2018
[Link].
C. Ruland, J. Sassmannshausen "Access Control in
Safety Critical Environments" 12th
International Conference on Reliability,
Maintainability and Safety (ICRMS2018), Shanghai,
China, Oct 15-17, 2018 [Link].
C. Ruland, J. Sassmannshausen, "Firewall for
Attribute-Based Access Control in Smart
Grids," 2018 IEEE International Conference on
Smart Energy Grid Engineering (SEGE), Oshawa, ON,
Canada, 2018, pp. 336-341. [Link]
Asmaa Tellabi, Jochen Sassmannshausen, Edita
Bajramovic, and Karl Christoph Ruland. Overview of
authentication and access controls for i&c systems.
In 16th IEEE International Conference on Industrial
Informatics, INDIN 2018, Porto, Portugal, July 18-20,
2018, pages 882–889, 2018. [Link]
N. Zivic and C. Ruland, "Cognitive Channel
Decoding", Future of Information and Communication
Conference (FICC 2018), Singapore, Apr. 2018.
N. Zivic and C. Ruland, "Cognition for Enhanced
Biometric Authentication," The 32nd International
Conference on Information Networking (ICOIN 2018),
Chang Mai, Thailand, Jan. 2018.
2017
R. A.
Djeujo and C. Ruland, "QoSs definition and session
description protocol for secure communication using
compressive sensing," 6th International Conference on
Future Generation Communication Technologies Conference
(FGCT), Dublin, Ireland, Aug. 21-23, 2017, pp.
1-7.
R. A. Djeujo and C. Ruland, "Secret matrix
lifecycle management for compressive sensing based
cryptographic mechanisms," IEEE 3th Annual Conference
in Computing, Communication, Control, And Automation
Conference (ICC3A), Pune, India, Aug. 17-18, 2017, pp.
1-10.
O. Ur Rehman and N. Zivic, "Two-phase Method for
Image Authentication and Enhanced Decoding", IEEE
Access, vol. 5, issue 1, pp. 12158-12167, Dec.
2017.
R. Fay, C. Bender, N. Klein, D. Krönert, F.
Kußmaul, S. Merz, T. Pieper, J. Saßmannshausen, T.
Steinbring, and C. Wurmbach. Gefahrlos durch den Nebel
- Ein Sicherheitskonzept für das Fog Computing. 15.
Deutscher IT-Sicherheitskongress, BSI, Mai 16-18, 2017,
Bonn, Germany.
C. Ruland, J. Sassmannshausen, K.Waedt and N.
Zivic, "Smart grid security - an overview of standards
and guidelines", e & i Elektrotechnik und
Informationstechnik, vol 134, issues 1, pp. 19-25, Feb
2017, Springer Wien. [Link]
O. Ur Rehman and N. Živić, "Discrete Wavelet
Transform based Watermarking for Image Content
Authentication", 6th International Conference on
Pattern Recognition Applications and Methods, Porto,
Portugal, Feb. 24-26, 2017.
O. Ur Rehman, N. Živić and C. Ruland, "Approximate
Image Authentication and Correction Using Spatial and
Frequency Domain Features", 11th International ITG
Conference on Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9, 2017.
R. Fay and C. Ruland, "Compressed Sampling
and Authenticated-Encryption", 11th International ITG
Conference on Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9, 2017.
N. Živić, O. Ur Rehman and C. Ruland,
"Iterative Decoder for OFDM Transmission over Rayleigh
Channel", 31st International Conference on Information
Networking (ICOIN 2017), Da Nang, Vietnam, Jan. 11 -
13, 2017.
R. A. Djeujo and C. Ruland, “Embedding
cryptographically secure matrix transformation in
structured compressive sensing,” IEEE Annual Computing
and Communication Workshop and Conference (CCWC 2017),
pp. 529–535, Las Vegas, USA, Jan 9-11,
2017.
2016
N. Zivic and O. Ur Rehman, "Improved OFDM
Decoder for LTE and Beyond", The 2016 International
Conference on Computational Science and Computational
Intelligence (CSCI'16), Las Vegas, USA, Dec. 15 - 17,
2016.
R. Fay and C. Ruland, "Compressive Sensing
Encryption Modes and their Security", 11th
International Conference for Internet Technology and
Secured Transactions (ICITST-2016), Barcelona, Spain,
Dec. 5-7, 2016.
G. Gala, T. Koller, D. G. Pérez, G. Fohler and C.
Ruland, "Timing Analysis of Secure Communication
between Resource Managers in DREAMS," Workshop on
Security and Dependability of Critical Embedded
Real-Time Systems, Porto, Portugal, Nov. 29, 2016.
[Link]
N. Zivic and O. Ur Rehman, "Soft
Authentication Techniques for Images", 24th
Telecommunications Forum (TELFOR 2016), Belgrade,
Serbia, Nov. 22-23, 2016. [Link]
C. Ruland, N. Kang and J. Sassmannshausen,
"Rejuvenation of the IEC 61850 Protocol Stack for MMS",
IEEE International Conference on Smart Grid
Communications (SmartGridComm 2016), Sydney, Australia,
Nov. 6-9, 2016. [Link]
S. Abbas, F. Ahmed, N. Zivic and O. Ur
Rehman, "Perceptual Image Hashing using SVD based Noise
Resistant Local Binary Pattern", The 8th International
Congress on Ultra Modern Telecommunications and Control
Systems (ICUMT 2016), Lisbon, Portugal, Oct. 18-20,
2016. [Link]
T. Koller, G. Gala, D. G. Perez, C. Ruland,
G. Fohler, "DREAMS: Secure Communication between
Resource Management Components in Networked Multi-Core
Systems", IEEE Conference on Open Systems 2016 (ICOS
2016), Langkawi, Malaysia, Oct. 10-12, 2016
(Best paper award). [Link]
R. A. Djeujo and C. Ruland, “Secure matrix
generation for compressive sensing embedded
cryptography,” IEEE Annual Information Technology,
Electronics and Mobile Communication Conference (IEMCON
2016), pp. 250–257, Vancouver, BC, Canada, Oct. 13-15,
2016. [Link]
N. Zivic, O. Ur Rehman and C. Ruland, "Smart
Metering for Intelligent Buildings", Transactions on
Machine Learning and Artificial Intelligence, vol. 4,
no. 5, Oct. 2016. [Link]
T. Koller, D. Weber, "Security Services for
Mixed-Criticality Systems Based on Networked Multi-core
Chips", International Conference on Computer Safety,
Reliability and Security (SafeComp 2016), Trondheim,
Norway, Sep. 20-23, 2016. [Link]
M. Schneider and C. Ruland, "Verification of
Time Signals", 30th European Frequency and Time Forum
(EFTF), York, UK, Apr 4-7, 2016. [Link]
O. Ur Rehman, N. Zivic and C. Ruland,
"Content based Image Authentication with Error
Correction", IEEE International Conference on
Communications (IEEE ICC'16), Communication and
Information System Security Symposium, Kuala Lumpur,
Malaysia, May 23-27, 2016. [Link]
R. Fay, "Introducing the Counter Mode of
Operation to Compressed Sensing Based Encryption",
Information Processing Letters, Elsevier, Volume 116,
Issue 4, Apr 2016, pp. 279–283. [Link]
2015
J. Saßmannshausen and C. Ruland,
"Nachweisbarkeit in Smart Grids auf Basis von
XML-Signaturen", D.A.CH Security 2015, syssec IT
Security & IT Management, p. 98–109, Frechen,
Germany, Sep 8-9, 2015.
J. Saßmannshausen and C. Ruland,
"End-to-End-Authentication in Smart Grid Control", IEEE
International Conference on Smart Energy Grid
Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19,
2015. [ Link]
M. Schneider and C. Ruland, “Verification of time
telegrams in Long Wave Radio systems", IEEE 2015 Joint
Conference of the IEEE International Frequency Control
Symposium & the European Frequency and Time Forum
(IFCS-EFTF), Denver, Colorado, USA, pp. 270-275, Apr
12-16 2015. [Link]
S. Tabatabaei, O. Ur Rehman, N. Zivic, and C.
Ruland, "Secure and Robust Two-Phase Image
Authentication", IEEE Transactions on Multimedia, vol.
17, no. 7, pp. 945-956, May 2015. [Link]
O. Ur Rehman, A. E. Tabatabaei, N. Zivic, and
C. Ruland, "Spatial and Frequency Domain Complementary
Watermarks for Image Authentication and Correction," in
the 10th International ITG Conference on Systems,
Communications and Coding (SCC 2015), Hamburg, Germany,
pp.1-6, Feb 2-5, 2015. [Link]
O. Ur Rehman, N. Zivic, "Secure Design
Patterns for Security in Smart Metering Systems", 9th
IEEE European Modelling Symposium (EMS 2015), Madrid,
Spain, Oct 6-8, 2015. [Link]
O. Ur Rehman, N. Zivic, and C. Ruland,
"Security Issues in Smart Metering Systems", IEEE
International Conference on Smart Energy Grid
Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19,
2015 (Overall best paper award).
[Link]
N. Zivic, O. Ur Rehman and C. Ruland,
"Evolution of Smart Metering Systems", 23rd IEEE
Telecommunications Forum (TELFOR 2015), Belgrade,
Serbia, Nov 24-26, 2015. [Link]
J. Sassmannshausen, C. Ruland,
"Non-repudiation Services for the MMS Protocol of IEC
61850", Security Standardization Research Conference
(SSR 2015), Tokyo, Japan, Dec 15-16, 2015. [Link]
2014
C. Ling, O. Ur-Rehman and W. Zhang,
"Semi-fragile Watermarking Scheme for H.264/AVC Video
Content Authentication Based on Manifold Feature," KSII
Transactions on Internet and Information Systems, vol.
8, no. 12, pp. 4568-4587, Dec. 2014. [Link]
A. Schantin and C. Ruland, “A Bit-Error Based
Capture Model for EPCglobal RFID Systems,” in 52th
Annual Allerton Conference on Communication, Control,
and Computing (Allerton), 2014, pp. 221–226. [Link]
S. Tabatabaei and N. Zivic, “Revisiting a
Primitive: Analysis of Approximate Message
Authentication Codes,” inIEEEInternational Conference on
Communications (ICC'14):,Sydney, Australia,
10 - 14 Jun, 2014. [Link]
O. Ur Rehman, N. Zivic, "Soft decision
iterative error and erasure decoder for Reed–Solomon
codes," IET Communications, vol. 8, no. 16, pp.
2863-2870, Nov 2014. [Link]
J. Shin, and C. Ruland, "A Novel Design of
Content based Multimedia Security," in 9th Future
Security Conference, Berlin, Germany, 16 - 18 Sep.
2014.
J. Shin, and C. Ruland, "A Hybrid Approach
for Content Based Image Authentication," in 11th
International Conference on Security and Cryptography
(SECRYPT'14), Vienna, Austria, 28 - 30 Aug. 2014, pp.
371-378. [Link]
O. Ur Rehman, N. Živić, C. Ruland: "Security
in Smart Metering Systems under the Smart-Grid
Perspective", Tutorium, IEEE BlackSeaCom 2014, May
2014, Chisinau, Moldova
2013
S. Rostami, Bamohabbat S, and S. Tabatabaei,
“Related-key impossible differential cryptanalysis of
full-round HIGHT,” in10th International Conference on
Security and Cryptography
(SECRYPT’13),Reykjavik, Iceland,
29 - 31 Jul. 2013, pp. 537–542.
A. Schantin, “Iterative decoding of baseband
and channel codes in a long-range RFID system,”
inIEEE
International Conference on Industrial Technology
(ICIT),Cape Town, South Africa, 25 - 28 Feb. 2013, pp.
1671–1676.
A. Schantin and C. Ruland, “Retransmission
Strategies for RFID Systems Using the EPC Protocol,”
inIEEE
International Conference on RFID Technologies and
Applications (RFID-TA),Johor Bahru,
Malaysia, Johor Bahru, Malaysia, 4 - 5 Sep. 2013, pp.
1–6.
M. Schneider and C. Ruland, “Sicherheit von
Broadcast-Datendiensten im Smart Grid am Beispiel der
Rundsteuertechnik,” inInformationssicherheit stärken -
Vertrauen in die Zukunft schaffen:[Tagungsband zum 13. Deutschen
IT-Sicherheitskongress], Gau-Algesheim:
SecuMedia-Verl, pp. 483–496.
J. Shin and C. Ruland, “A Survey of Image
Hashing Technique for Data Authentication in WMSNs,”
inWorkshop on
Internet of Things Communications and Technologies (IOT
2013),Lyon, France, 7 - 9, Oct. 2013, pp.
253–258.
S. Tabatabaei and C. Ruland, “The Analysis of
an NMF-based Perceptual Image Hashing Scheme,”
in13th IEEE International Symposium on
Signal Processing and Information Technology
(ISSPIT'13),Athens, Greece, 12
- 15 Dec, 2013,
S. Tabatabaei, O. Ur Rehman, and N. Zivic,
“A DWT-based Image Authentication and Correction
Mechanism,” in55th International Symposium
ELMAR-2013,Zadar, Croatia, 25
- 27 Sep. 2013, pp. 79–82.
S. Tabatabaei, O. Ur Rehman, and N. Zivic,
“AACI: The Mechanism for Approximate Authentication and
Correction of Images,” inIEEE International Conference on
Communications 2013 (ICC'13), Workshop on Information
Security over Noisy and Lossy Communication
Systems,9 - 13 Jun. 2013, pp. 717–722.
O. Ur Rehman, S. Tabatabaei, N. Zivic, and C.
Ruland, “Soft Authentication and Correction of Images,”
inProceedings
of 2013 9th International ITG Conference on Systems,
Communication and Coding (SCC),Munich, Germany, 21
- 24 Jan. 2013, pp. 1–6.
O. Ur Rehman and N. Zivic, “Fuzzy
Authentication Algorithm with Applications to Error
Localization and Correction of Images,”WSEAS Transactions on
Systems, vol. 12, no. 7, pp. 371–383,
http://wseas.org/cms.action?id=6952, 2013.
2012
J. Holle and H. Cankaya, “Designing Open
Computing Platforms with Security in Mind,”
Presentation only. Doha, Feb. 2012.
H. Cankaya, C. Grepet, J. Holle, and J. Simó,
“Enabling the Deployment of Open In-Vehicle ITS
Stations,” in19th ITS World
Congress,Vienna, Austria, 22
- 26 Oct. 2012,
J. Holle, A. Platschek, J. Sánchez, and J.
Shin, “OVERSEE - A Secure and Open In-Vehicle ITS
Station,” in19th ITS World
Congress,Vienna, Austria, 22
- 26 Oct. 2012,
A. Schantin, “Forward Error Correction in
Long-Range RFID systems,” inProceedings of 2012 European
Conference on Smart Objects, Systems and Technologies
(SmartSysTech),Munich, Germany, 12
- 13 Jun. 2012, pp. 1–6.
R. Schick and C. Ruland, “Non-Repudiation of
Forwarding: Traceability of Confidential Data Via
Multiple Recipients,” in9th International Conference of
Security and Cryptography: SciTePress,
387–390.
R. Schick and C. Ruland, “On the Security of
the Non-Repudiation of Forwarding Service,” in9th International Conference on
Trust, Privacy and Security in Digital Business
(TrustBus), Berlin, Heidelberg, s.l.:
Imprint: Springer, 3 - 7, Sep. 2012,
167–178.
S. Tabatabaei and N. Zivic, “Security
analysis of the joint encryption and compressed
sensing,” in20th Telecommunications Forum Telfor
(TELFOR),Belgrade, Serbia,
20 - 22 Nov. 2012, pp. 799–802.
O. Ur Rehman and N. Zivic, “Iterative
Cross-layer Decoder for WiMAX Using Hybrid-ARQ,”
inIEEE 14th
International Conference on High Performance Computing
and Communication & 2012 IEEE 9th International
Conference on Embedded Software and Systems
(HPCC-ICESS),Liverpool, UK, 25 -
27, Jun. 2012, pp. 1158–1161.
O. Ur Rehman and N. Zivic, “Noise tolerant
image authentication with error localization and
correction,” in50th Annual Allerton Conference on
Communication, Control, and Computing
(Allerton),1 - 5, Oct. 2012,
pp. 2081–2087.
2011
J. Holle, “OVERSEE - Potentials and
Challenges for the Automotive Industry,” Nürnberg, Mar.
2011.
A. Groll, J. Holle, M. Wolf, and T.
Wollinger, “Platforma de TI para veículos,”RTI - Redes, Telecom e
Instalações, vol. XII, no. 136, 84–94,
http://www.arandanet.com.br/midiaonline/rti/2011/setembro/index.html,
2011.
J. Holle, A. Groll, C. Ruland, H. Cankaya,
and M. Wolf, “OPEN PLATFORMS ON THE WAY TO AUTOMOTIVE
PRACTICE,” in8th ITS European
Congress, Lyon.
J. Holle, A. Groll, M. Wolf, H. Cankaya, and
C. Grepet, “TOWARDS A SHARED DIGITAL COMMUNICATION
PLATFORM FOR VEHICLES,” in18th World Congress on Intelligent
Transport Systems, Orlando.
A. Mahmood and N. Zivic, “A New Scheme of
Forward Error Correction Using Block Ciphers,”
inIEEE
International Conference on Digital
Divergence, Hyderabad, India,
2011.
A. Mahmood and N. Zivic, “Bit Error Rate
Improvement Using Soft Outputs of MAP Decoder and
Avalanche Effect of Block Ciphers,” inIEEE International
Conference on Computers, Communications,Control and
Automation, Hong Kong, China,
2011.
A. Schantin, N. Zivic, and G. Bodean, “Soft
decision decoding of the matroid codes,” inMicrowave and
Telecommunication Technology (CriMiCo), 2011 21th
International Crimean Conference,
469–470.
R. Schick and C. Ruland, “Data Leakage
Tracking - Non-Repudiation of Forwarding,” inFirst Internation
Conference on Informatics Engineering and Information
Science, 2011, 163–173.
R. Schick and C. Ruland, “Document Tracking -
On the Way to a New Security Service,” inSixth Conference on
Network Architectures and Information Systems
Security, 2011, 89–93.
R. Schick and C. Ruland, “Introduction of a
New Non-Repudiation Service to Protect Sensitive
Private Data,” inSecond International Conference on
Advances in Information and Communication
Technologies, 2011.
O. Ur Rehman, N. Zivic, S. Tabatabaei, and C.
Ruland, “Error Correcting and Weighted Noise Tolerant
Message Authentication Codes,” inSignal Processing and
Communication Systems (ICSPCS), 2011 5th International
Conference on, pp. 1–8.
O. Ur Rehman and N. Zivic, “Impact of
Bit-Flip Combinations on Successive Soft Input Decoding
of Reed Solomon Codes,” inThe Fourth International
Conference on Communication Theory, Reliability, and
Quality of Service, Budapest, Hungary,
2011, 30–34.
O. Ur Rehman and N. Zivic, “Iterative Bit
Flip Type-II Hybrid-ARQ Scheme for Wireless Networks,”
in17th European Wireless Conference,
2011, Vienna, Austria, 2011,
45–50.
O. Ur Rehman and N. Zivic, “Multi-Layer Data
Protection using N-Channel Stop-and-Wait Hybrid-ARQ in
WiMAX,” inThe
Sixteenth IEEE International Symposium on Computers and
Communications, Corfu, Greece, 2011,
359–364.
O. Ur Rehman and N. Zivic, “Successive
Iterative Decoding of Reed Solomon Codes using
Cryptographic Hash Codes as Parity,” in7th International Conference on
Innovations in Information Technology, Abu
Dhabi, UAE, 2011, 1–6.
2010
C. Bodenstedt, C. Ruland, D. Weber, and A.
Kung, “Integration of Security and Dependability into
Resource constrained Embedded Systems,” inThe 3rd International
Conference on Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 93–98.
A. Groll, J. Holle, and C. Ruland, “Upcoming
Trends in the Automotive IT and Associated Security
Challenges,” inThe 3rd International Conference
on Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 25–30.
A. Groll, J. Holle, M. Wolf, and T.
Wollinger, “Next Generation of Automotive Security:
Secure Hardware and Secure Open Platforms,” in17th ITS World Congress Busan
2010, Busan, Korea.
A. Groll, M. Müter, and F. C. Freiling, “A
Structured Approach to Anomaly Detection for In-Vehicle
Networks,” inSixth International Conference on
Information Assurance and Security (IAS),
Atlanta, GA, 92–98.
A. Mahmood and N. Zivic, “Bit Error Rate
Improvement Using Soft Outputs of MAP Decoder and
Avalanche Effect of Block Ciphers,” inInternational
Symposium on Applied Sciences in Biomedical and
Communication Technologies, Rome, Italy,
2010.
R. Schick, S. Tcaciuc, and C. Ruland,
“Information Security of Multimodal Input Data
-Traceability of Image Data,” inThe 3rd International Conference
on Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical
University of Moldova, 31–34.
M. Schneider and C. Ruland, “Steckdose als
virtuelle Zapfsäule,” inEMA 2010 -
Elektromobilausstellung:Fachtagung, Wettbewerbe ; Vorträge
der ETG-Fachtagung vom 8. bis 9. Oktober 2010 in
Aschaffenburg, Berlin: VDE-Verl,
161–169.
M. Schneider, S. Tcaciuc, and C. Ruland,
“Secure metering for electrical vehicles,” inE-Mobility:Technologien - Infrastruktur -
Märkte ; VDE-Kongress 2010 Leipzig, 8.-9. November 2010
Congress Center Leipzig ;
Kongressbeiträge, Berlin: VDE-Verl, FZT
1.4.13.
O. Ur Rehman and N. Zivic, “Soft Input
Decoding of Reed Solomon Codes with Miscorrection
Detection and Avoidance,” inInternational Conference on Signal
Processing and Communication Systems,
Institute of Electrical and Electronics Engineers, Ed,
Gold Coast, Australia, 2010, 1–5.
O. Ur Rehman, N. Zivic, and C. Ruland,
“Iterative bit-flipped decoding of concatenated reed
solomon/convolutional codes with HMAC,” inIEEE International
Symposium on Performance Evaluation of Computer and
Telecommunication Systems, Ottawa, Canada,
2010, 410–415.
N. Zivic and C. Ruland, “Security
Architecture for Smart Metering Systems, Software
Services for E-World,” in10th IFIP Advances in Information
and Communication Technology, Buenos
Aires, Argentina: Springer-Verlag, 2010.
N. Zivic, “Simulation and Application of Soft
Input Decryption,” in2.Int. Conference on System
Simulation (SIMUL 2010), 2010.
N. Zivic and O. Ur Rehman, “On using the
message digest for error correction in wireless
comunication networks,” in21st International IEEE Conference
on Personal Indoor and Mobile Radio
Communications, Institute of Electrical
and Electronics Engineers, Ed, Istanbul, Türkei, 2010,
491–495.
N. Zivic, O. Ur Rehman, and C. Ruland, “On
the Probability and Impact of Collisions on Soft Input
Decryption,” inInternational Symposium on Applied
Sciences in Biomedical and Communication
Technologies, Rome, Italy, 2010,
1–5.
2009
M. Schneider, “Mobile Messdatenerfassung für
Elektrofahrzeuge,” Berlin, Oct. 2009.
A. Groll and M. Müter, “Attack Detection for
In-Vehicle Networks,” inAutomotive Security,
Ingolstadt.
A. Groll and C. Ruland, “Gefahren der
In-Fahrzeug-Kommunikation moderner Automobile,”
inSichere Wege
in der vernetzten Welt:[Tagungsband zum 11. Deutschen
IT-Sicherheitskongress ; vom 12. - 14. Mai 2009 in
Bonn], Gau-Algesheim:
SecuMedia-Verl.
A. Groll and C. Ruland, “Secure and Authentic
Communication on Existing Vehicle Networks,” inIEEE Intelligent
Vehicles Symposium, 2009:IV ; 3 - 5 June 2009, Xi'an,
China, Piscataway, NJ: IEEE.
J. Holle, A. Groll, C. Ruland, M. Wolf, T.
Wollinger, and F. Zweers, “OVERSEE - A Secure and Open
Communication and Runtime Platform for Innovative
Automotive Applications,” inProceedings of the 7th escar -
Embedded Security in Cars Conference,
Düsseldorf.
N. Zivic, C. Ruland, and O. Ur Rehman, “Error
Correction over Wireless Channel Using Symmetric
Cryptography,” inIEEE International Conference on
Wireless Communication Society, Vehicular Technology,
Information Theory and Aerospace & Electronic
Systems Technology, Aalborg, Denmark,
752–756.
N. Zivic, O. Ur Rehman, and C. Ruland,
“Analysis of Serial and Parallel Soft Input Decryption
Schemes over a Wireless Channel,” inIEEE International
Symposium on Performance Evaluation of Computer and
Telecommunication Systems, Istanbul,
Türkei: IEEE, 282–288.
N. Zivic, O. Ur Rehman, and C. Ruland, “Using
HMAC for Error correction over Wireless Channel,”
inSymposia and
Workshops on Ubiquitous, Autonomic and Trusted
Computing, Brisbane, Australien,
252–256.
2008
M. Dunte and C. Ruland, “Construction and
Usage of Time-limited Keys in Secure Multimedia
Distribution,” inThird International Conference on
Communications and Networking in China,
2008:ChinaCom 2008 ; 25 -
27 Aug. 2008, Hangzhou, China, Piscataway,
NJ: IEEE.
M. Dunte and C. Ruland, “Delivery
Infrastructure for Secure Scalable Coded Multimedia,”
in28th International Conference on
Distributed Computing Systems
workshops:17 - 20June 2008, Beijing, China ;
proceedings, Los Alamitos, Calif.: IEEE
Computer Society, 42–47.
M. Dunte and C. Ruland, “Realising
Time-Iimitation for Cryptographic Keys in Secure
Multimedia Distribution,”Security and Communication
Networks, vol. 1, no. 6, 451–459,
2008.
A. Groll, J. Holle, and C. Ruland,
“Simulative Bestimmung der CAN-Bus-Lastgrenzen,”
inAutomotive -
Safety & Security 2008 - Sicherheit und
Zuverlässigkeit für automobile
Informationstechnik:19.und 20. November 2008,
Stuttgart, Aachen: Shaker.
A. Groll and C. Ruland, “Trusted
Communication Groups for Authentic In-Car
Communication,” inProceedings of the 6th escar -
Embedded Security in Cars Conference,
Hamburg.
S. Tcaciuc and C. Ruland, “Optimizations of
Flow Control under QOS Aspects between Core Network and
Access Network Domains,” inProceeding of the 2nd
International Conference "Telecommunications,
Electronics and Informatics", Chisinau,
Moldova, 37–42.
N. Zivic and C. Ruland, “Joint Channel Coding
- Cryptography,” inInfoteh, Jahorina,
Bosnia, 2008.
N. Zivic and C. Ruland, “Method for
Improvement of Soft Input Decryption Performances,”
in12th WSEAS Conf. on Computer
Sciences:July 2008, Herklion,
Greece, 2008.
N. Zivic and C. Ruland, “Channel Coding as a
Cryptography Enhancer,”Transaction on
Communications, vol. 7, no. 3, 83–91,
2008.
N. Zivic and C. Ruland, “Feedback in Soft
Input Decryption,”WSEAS Transactions on
Communications, vol. 7, no. 5, 428–437,
2008.
N. Zivic and C. Ruland, “Optimization of Soft
Input Decryption,” inConference on Soft Computing, Brno
University of Technology, Brno University
of Technology, Czech Republic, 241–246.
N. Zivic and C. Ruland, “Parallel Joint
Channel Coding and Cryptography,”International Journal of Computer
Science and Engineering, WASET World Academy of
Science, Engineering and Technology, vol.
4, no. 2, 140–144, 2008.
N. Zivic and C. Ruland, “Parallel Joint
Channel Coding and Cryptography: July 2008,”Proceedings of World
Academy of Science, Engineering and
Technology, vol. 31, 536–539,
2008.
N. Zivic and C. Ruland, “Probability of
Collisions in Soft Input Decryption,” inRecent advances on
applied mathematics:Proceedings of the American
Conference on Applied Mathematics (MATH '08) :
Cambridge, Massachusetts, USA, March 24 -
26,2008, Athen: WSEAS Press,
362–366.
N. Zivic and C. Ruland, “Soft Input
Decryption using feedback,” in7th WSEAS International Conference
on Software Engineering, Parallel and Distributed
Systems(SEPAD '08),
University of Cambridge, UK, Feb 20 - Feb 22, 2008,
174–177.
N. Zivic and S. Tcaciuc, “Feedback using
dummy bits,” inProccedings of the Applied
Computing Conference, Istanbul, Turkey,
104–107.
N. Zivic and O. Ur Rehman, “Cryptographic
Check Values as Channel Coding Redundancy,” in12th IEEE International Multitopic
Conference, Institute of Electrical and
Electronics Engineers, Ed, Karachi, Pakistan, 2008,
178–181.
2007
M. Dunte and C. Ruland, “On the Way to Secure
Delivery of Scalable Coded Media,” inMikulášská
kryptobesídka, Prag, Tschechische
Republik, 2007, 51–59.
M. Dunte and C. Ruland, “Secure
Voice-over-IP,”IJCNS International Journal of
Computer Science and Network Security,
vol. 7, no. 6, 63–68, 2007.
S. Hick and C. Ruland, “Security Aspects for
Secure Download of Regulated Software,” inTrust, privacy and
security in digital business:4th international conference,
TrustBus 2007, Regensburg, Germany, September 4 - 6,
2007 ; proceedings, Berlin: Springer,
219–227.
T. Lohmann and C. Ruland, “Digital Signatures
Based on Elliptic Curves in RFIDs,”IJCNS International Journal of
Computer Science and Network Security,
vol. 7, no. 1, 275–281, 2007.
N. Oikonomidis, C. Ruland, and S. Tcaciuc,
“Deployment of E-Government Municipal Services:
Enforcement of Security Polices,” inSecure E-government
web services, A. Mitrakas, Ed, Hershey:
Idea Group Publ, 2007, 111–123.
C. Ruland, “Secure Online Metering for a
Liberalized Energy Market,” inSecure E-government web
services, A. Mitrakas, Ed, Hershey: Idea
Group Publ, 2007, 97–110.
C. Ruland and N. Zivic, “Joint Coding and
Decryption,” inIctis' 07, Fes,
Marokko, 2007.
N. Zivic and C. Ruland, “Soft Input
Decryption and its Iterative Application,” inTELFOR:November 20-22,
Belgrade, Serbia, 2007.
N. Zivic and C. Ruland, “Channel coding as a
cryptography enhancer,” inProceedings in the 11 th WSEAS
international conference on
Communications, Crete Island, Greece,
2007, 273–278.
N. Zivic and C. Ruland, “Improvement of
Digital Signature Error Rates,” inInformation, Communication and
Automation Technologies ICAT 2007,
Sarajewo, 2007.
N. Zivic and C. Ruland, “Probability of
Collisions in Soft Input Decryption,”International Journal
of Applied Mathematics and Informatics,
vol. 1, no. 1, 21–27, 2007.
2006
N. Kang, L. Lo Iacono, C. Ruland, and Y. Kim,
“Efficient Application of IPsec VPNs in Wireless
Networks,” inISWPC 2006 Conference
Proceedings:IEEE conference International
Symposium on Wireless Pervasive Computing
2006, Phuket, Thailand,
337–341.
L. Lo Iacono, S. Müller, C. Ruland, and N.
Zisky, “Sicherheitslösung für die automatisierte
Messdatenkommunikation - Best-Practice Lösung im
liberalisierten Energiemarkt,”Datenschutz und Datensicherheit
(DuD), no. 6, 347–352, 2006.
L. Lo Iacono, C. Ruland, and N. Zisky,
“Secure transfer of measurement data in open
systems,”Computer Standards &
Interfaces, vol. 28, 2006.
T. Lohmann and C. Ruland, “Security Levels of
Bluetooth,” inWorkshop on Intelligent
Transportation, Hamburg.
C. Ruland, T. Lohmann, and M. Schneider,
“Analysis of Power Constraints for Cryptographic
Algorithms in Mid-Cost RFID Tags,” inSmart Card Research
and Advanced Applications:7th IFIP WG 8.8/11.2 International
Conference, CARDIS 2006, Tarragona, Spain, April 19-21,
2006, Proceedings, Berlin Heidelberg:
Springer-Verlag GmbH, 278–288.
C. Ruland and N. Zivic, “Soft Input
Decryption, Turbo Coding 2006,” inTurbo-Coding-2006:4th International Symposium on
Turbo Codes & Related Topics ; 6th International
ITG-Conference on Source and Channel Coding ; April 03
- 07, 2006, Munich, Berlin: VDE
Verl.
2005
L. H. B. Dietze, L. Lo Iacono, and C. Ruland,
“Qualifizierte Signatur im elektronischen
Messdatenaustausch,” inQualifizierte elektronische
Signaturen in Theorie und Praxis (QSIG
2005):Workshop im Rahmen der
GI Tagung, Sicherheit 2005,
Regensburg.
K. Hong, S. W. Jung, L. Lo Iacono, and C.
Ruland, “Impacts of Security Protocols on Real-time
Multimedia Communications,”Lecture Notes, Computer
Science, vol. 3325, no. 2, 1–13,
2005.
S. W. Jung, N. Kang, C. Ruland, and Y. Kim,
“Efficient Way to Employ Stream Authentication Schemes
in Multicast Using Short-lived Keys,” inPreproceedings of WISA
2005 vol.6, The 6th International Workshop on
Information Security Applications, Jeju in
Korea.
M. Kahmann, L. Lo Iacono, C. Ruland, and T.
Schütze, “Sicherheitskonzept,” inPTB-BerichtIT,
Informationstechnik, vol. 12,Das
SELMA-Projekt:Konzepte, Modelle,
Verfahren, N. Zisky, Ed, Bremerhaven:
Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005,
165–246.
A. Kaliotzoglou, A. Karantjias, N.
Oikonomidis, C. Ruland, and S. Tcaciuc, “Design
Principles and Aspects for Cross-Border Municipal
Service Deployment,” inWorkshop and Poster Proceedings of
the 4th International EGOV Conference, EGOV'05 4th
International Conference on Electronic
Government, Denmark.
N. Kang, A. Kunz, L. Lo Iacono, and C.
Ruland, “Analysis of the QoS Requirements under Radio
Access Network Planning Aspects for GPRS/EDGE and
UMTS,” inIEEE
WirelessCom 2005 Conference, First International
Symposium on Wireless Quality-of-Service
(WiQoS'05), Maui, Hawaii, USA.
N. Kang and C. Ruland, “MDS: Multiplexed
Digital Signature for Real-time Streaming over
Multisessions,” inThe International Conference on
Information Networking (ICOIN) 2005, Jeju,
Korea, 824–834.
N. Kang and C. Ruland, “Security analysis of
DoS Vulnerability in Stream Authentication Schemes
Using Hash Chaining,”IEICE Transaction on
Communications, vol. E88-B, no. 3,
2005.
N. Oikonomidis, C. Ruland, and S. Tcaciuc,
“An Architecture for Secure Policy Enforcement in
E-Government Services Deployment,” inCommunications and
multimedia security:9th IFIP TC-6 TC-11 international
conference, CMS 2005, Salzburg, Austria, September
19-21, 2005 ; proceedings, Berlin:
Springer.
N. Oikonomidis, C. Ruland, and S. Tcaciuc,
“Enforcement of Security Policies for e-Government
Services on Municipal and Cross-Border Level,”
inProceedings
of the Int. Conference on e-Government,
Ottoawa, Canada, 311–320.
N. Oikonomidis, C. Ruland, and S. Tcaciuc,
“Provision of Secure Policy Enforcement Between Small
and Medium Governmental Organizations,” inSecond International
Conference, TrustBus 2005, Berlin
Heidelberg: Springer-Verlag, 141–150.
M. Wahl (geb. Angele), C. Ruland, and T.
Schütze, “Sicherheitsanalyse,” inPTB-BerichtIT,
Informationstechnik, vol. 12,Das
SELMA-Projekt:Konzepte, Modelle,
Verfahren, N. Zisky, Ed, Bremerhaven:
Wirtschaftsverl. NW Verl. für neue Wissenschaft, 2005,
117–164.
2004
N. Kang and C. Ruland, “DiffSig:
Differentiated Digital Signature for Real-time
Multicast Packet Flows,” inLecture Notes in Computer
Science:1st International Conference on
Trust and Privacy in Digital Business (TrustBus '04) in
conjunction with the 15th International Conference on
Database and Expert Systems Applications (DEXA
2004), Zaragoza, Spain.
N. Oikonomidis and C. Ruland, “Identity Based
Protocols for Secure Electronic Content Distribution
and Licensing 4th International Conference on Web
Delivering of Music,” inProceedings of IEEE Computer
Society, Universität Pompeu Fabra,
Barcelona, Spain, 92–99.
C. Ruland and S. Tcaciuc, “A Table Based
Scheduler for the QoS enabled Flow Control in GPRS/EDGE
Networks,” inIASTED International Conference on
Communication Systems and Networks CSN
2004, Marbella, Spain.
C. Ruland and S. Tcaciuc, “Scheduler Based
Flow Control under QoS Aspects in GPRS/EDGE Networks,”
inIEEE
International Conference on Networks 2004/ICON
2004, Singapur.
C. Ruland and M. Wahl, “Usage of Mobile
Agents for Wireless Multimedia Communication,”
inProceedings
of IASTED conference on Communication Systems and
Applications (CSA 2004):Acta-Press, IASTED conference on
Communication Systems and Applications (CSA
2004), Canada.
2003
L. Lo Iacono, C. Ruland, and M. Wahl,
“Einsatz der elektronischen Signatur für den
Messdatenaustausch im liberalisierten Energiemarkt
(Secure Electronic Exchange of Metering Data),”
inVDI Berichte
Nr. 1785, Telematik Tagung,
Siegen.
2002
A. Friesen and C. Ruland, “Das
eContract-Konzept Ein Sicherheitsmodell für
Multi-Service-Multi-Provider-Architekturen Enterprise
Security,” inTagungsband Enterprise
Security
A. Friesen and C. Ruland, “Design eines
Profil- und Zertifikatsmanagementsystem für das Service
by eContract-Konzept,” inLecture Notes in
Informatics:GI Jahrestagung,
GI-Edition, Bonn.
L. Lo Iacono and C. Ruland, “Confidential
Multimedia Communication in IP Networks,” in8th IEEE International Conference
on Communication Systems,
Singapur.
L. Lo Iacono and C. Ruland, “Eine
Sicherheitsarchitektur für den Austausch elektronischer
Messdaten im liberalisierten Energiemarkt,” inSELMA-Workshop,
Physikalisch-Technische Bundesanstalt,
Berlin.
L. Lo Iacono, C. Ruland, and N. Schweitzer,
“Signing Digital Streams,” inProceedings of 4th International
ITG Conference on Source and Channel
Coding:4th International ITG Conference on
Source and Channel Coding, Berlin,
324–334.
C. Ruland and F. Schlake, “A Security
Protocol Providing QOS in ATM Networks,” in8th IEEE International Conference
on Communication Systems,
Singapur.
C. Ruland and M. Wahl, “Sicherheitsanalyse
der Übertragung von Energiedaten über offene Netze,”
inSELMA-Workshop,
Physikalisch-Technische Bundesanstalt,
Berlin.
2001
A. Friesen and C. Ruland, “Service by
e-contract - a security model for authentication,
access control and online subscription management
multi-service-multi-provider architectures,” inProceedings, Volume II
Information Systems:World Multiconference on
Systemics, Cybernetics and Informatics,
Orlando, 581–585.
C. Geuer-Pollmann and C. Ruland,
“XML-Sicherheit - Stand heute,” inSicherheit im
Internet:Deutscher IT-Sicherheitskongress
BSI 2001, Bonn Bad Godesberg,
197–209.
O. Jung, S. Kuhn, C. Ruland, and K.
Wollenweber, “Enhanced Modes of Operation for the
Encryption in High-Speed Networks and Their Impact on
QoS,” inV.
Varadharajan u. Y. Mu (Eds), LNCS 2119,
Berlin Heidelberg, 344–359.
O. Jung, S. Kuhn, C. Ruland, and K.
Wollenweber, “Properties of Modes of Operation with
Statistical Self-Synchronization Mechanisms,” inICICS Shaping The New
Information ERA:3rd International Conference on
Information, Communications and Signal
Processing, Singapur.
O. Jung, S. Kuhn, C. Ruland, and K.
Wollenweber, “Suitability of Cryptographic Modes of
Operation for the Encryption in High- Speed Networks,”
inIEEE
Proceedings, Bangkok, Thailand,
134–139.
C. Ruland and N. Schweitzer, “Digitale
Signatur von Bitströmen,” in7.Deutscher IT-Sicherheitskongress
BSI 2001, Bonn Bad Godesberg:
Secumedia-Verlag, Ingelheim 2001.
2000
C. Geuer-Pollmann, C. Ruland, M. Moula, and
P. Sklavos, “Digital Signatures for Web Content
E-business,” inKey Issues, Applications and
Technologies, Amsterdam: IOS Press, 2000,
218–224.
C. Ruland and O. Weissmann, “Advanced
Encryption Standard,”Funkschau,
2000.
C. Ruland and O. Weissmann, “Secure
Subscription Management on Agent based Platforms,”
inGlobalcom
2000, San Francisco.
1999
A. Friesen, N. Oikonomidis, C. Ruland, and O.
Weissmann, “A Distributed Certificate Management System
for Use in Agent System,” inWorkshop Proceedings, M1-M9, 2nd
ACTS Workshop, Singapur.
C. Geuer-Pollmann and C. Ruland, “Das Simple
Signature Protocol für WWW-Sicherheit,” inTagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim: Secumedia-Verlag,
461–465.
O. Jung and C. Ruland, “Encryption with
Statistical Self-Synchronization in Synchronous
Broadband Networks,” inTagungsband Cryptographic Hardware
and Embedded Systems, Lecture Notes in Computer
Science, Worcester, USA.
S. Kuhn, C. Ruland, and K. Wollenweber,
“ATM-Encryption with 155 Mbit,” inIEEE ATM-Workshop
'99, Kochi-Japan.
S. Kuhn, C. Ruland, and K. Wollenweber,
“ATM-Verschlüsselung mit 155 Mbit/s,” inTagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI
1999, Ingelheim: Secumedia-Verlag,
287–295.
C. Ruland, “Security vor dem
Wachstumsschub,”Comparex Journal,
vol. 28, 10–11, 1999.
C. Ruland and O. Weissmann, “Zugangskontrolle
für universelle Dienstenutzung in Agentensystemen,”
inTagungsband
6. Deutscher IT-Sicherheitskongreß des BSI
1999, Secumedia-Verlag: Ingelheim,
455–460.
1998
C. Ruland, “Electronic Commerce,”25Jahre Telemation
Jubiläumsausgabe, no. 10, 1–9,
1998.
1997
C. Ruland, “Breitbandverschlüsselung (155
Mbit/s) mit Selbstsynchronisation,” in5.Deutscher IT-Sicherheitskongreß
des BSI 1997, „Mit Sicherheit in die
Informationsgesellschaft“, Tagungsband erschienen im
SecuMedia Verlag, Ingelheim:
Secumedia-Verlag, 289–301.
C. Ruland, “Regierung umgeht Datenschutz:
Orwell durch die Hintertür?,”Computerwoche, no.
15, 20, 1997.
1995
D. Fox, T. Henn, K. Reichel, and C. Ruland,
“Guardeded Authentic Local Area Network - GALAN -,”
inProceedings
der Fachtagung Verläßliche Systeme:–VIS'95,DuD-Fachberichte,
Braunschweig: Vieweg-Verlag, 163–180.
C. Ruland, “Datenkompression,” inDas
Telekommunikationswerk, D. Schulte, Ed,
Augsburg: Interest Verlag GmbH, 1995, 1–48.
C. Ruland, “Sichere Kommunikation zwischen
ISDN-Endgeräten,”Datacom, 108–116,
1995.
C. Ruland, “Sicherheit in Verteilten
Systemen,” inTutoriumsband:KiVS'95, Chemnitz,
1–45.
1994
D. Dienst, D. Fox, and C. Ruland,
“Transparente Sicherheitsmechanismen für
ISDN-Anwendungen,” inNutzung u. Technik von
Kommunikationsendgeräten, G. Kleinke, Ed,
Offenbach: VDE-Verlag, 1994, 81–95.
C. Ruland, “Kontrollierter Zugang,”Business Computing
Januar, no. 1, 28–31, 1994.
C. Ruland, “Secure Common ISDN Application
Programming Interface (S-CAPI),” inSicherheitsschnittstellen –
Konzepte, Anwendungen und Einsatzbeispiel:
DUV Deutscher Universitätsverlag; Gabler Vieweg
Westdeutscher Verlag, 1994.
1993
C. Ruland, “Realizing Digital Signatures with
One-Way Hash Functions,”Cryptologia, vol. 17,
no. 3, 285–300, 1993.
1991
H. Kallerhoff and C. Ruland, “Statistische
Untersuchungen von Pseudozufallszahlenfolgen,”KES Kommunikations-
und EDV-Sicherheit, no. 3, 156–163,
1991.
M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und Übersicht,”Datacom,
no. 4, 88–96, 1991.
M. Longerich and C. Ruland,
“Datenkompression, Grundlagen und Übersicht
(Fortsetzung),”Datacom, no. 5,
113–120, 1991.
M. Longerich and C. Ruland,
“Datenkompression, Implementation und
Vergleichstests,”Datacom, no. 8,
97–103, 1991.
1990
C. Ruland, “Datensicherheit in Lokalen
Netzen, Teil 2,”Datacom, no. 1,
100–107, 1990.
C. Ruland, “Sichere Übertragung und
Archivierung elektronischer Dokumente,”Datacom,
no. 3, 120–130, 1990.
C. Ruland, “Sicherheit und
Sicherheitsmanagement in Offenen
Kommunikationssystemen,”Sonderheft Netzwerkmanagement
Spezial, Datacom Verlag, 202–213,
1990.
C. Ruland, “Vertrauenswürdigkeit und
Vertraulichkeit elektronischer Dokumente,”Recht der
Datenverarbeitung (RDV), no. 4, 168–174,
1990.
1989
D. Bong and C. Ruland, “Optimized Software
Implementation of the Modular Exponentiation on General
Purpose Microprocessors,”Computers &
Security, no. 8, 621–630,
1989.
N. Pohlmann and C. Ruland, “Datensicherheit
bei Kommunikation über Datex-P,”Datacom, no. 1,
64–70, 1989.
C. Ruland, “Datensicherheit in Lokalen
Netzen, Teil 1,”Datacom, no. 12,
94–99, 1989.
C. Ruland, “Zur Datensicherheit in Lokalen
Netzen,”Recht
der Datenverarbeitung (RDV), no. 5/6,
210–218, 1989.
1988
C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 4: Sicherheitsmechanismen
und ISO-Referenzmodell,”Datacom, no. 1,
92–97, 1988.
C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 5: Realisierung einer
Datenschutzeinrichtung,”Datacom, no. 3,
114–120, 1988.
1987
C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 1: Einführung und
Begriffe,”Datacom, no. 1,
78–84, 1987.
C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 2:
Verschlüsselungsverfahren,”Datacom, no. 4,
98–104, 1987.
C. Ruland, “Datenschutz in
Kommunikationssystemen Teil 3:
Authentizitätsprüfungs-verfahren und
Schlüsselverteilung,”Datacom, no. 9,
172–177, 1987.
C. Ruland, “Sicherheitsarchitektur in Offenen
Kommunikationssystemen,”Elektrotechnik und Maschinenbau (E
und M), no. 12, 533–537, 1987.
1981
C. Ruland, “Algorithmen zur adaptiven
Berechnung der schnellsten Wege in Virtuellen
Netzen,”Angewandte
Informatik, no. 11, 492-496,
1981.
C. Ruland, “Routing in Virtuellen
Netzen,”Elektronische
Rechenanlagen, vol. 23, no. 4, 164–167,
1981.
C. Ruland, “Virtuelle Netze für verschiedene
Benutzerklassen,”Online Heft 6,
456–458, 1981.
C. Ruland, “Was ist ein Virtuelles
Netz?,”Elektronische
Rechenanlagen, vol. 23, no. 3, 134–136,
1981.
1978
C. Ruland, “Ein Verfahren zur Lösung von (Δ +
k2) u = 0 in Außengebieten mit Ecken,”Applicable
Analysis, vol. 7, 69–79, 1978.
1973
C. Ruland, “Zur theoretischen und numerischen
Lösbarkeit des Dirichletschen Außenraumproblems für die
Helmholtzsche Schwingungsgleichung,” Diplomarbeit,
Universität Bonn, Bonn, 1973.