N. Zivic, C. Ruland and O. Ur-Rehman, "Addressing Byzantine Fault
Tolerance in Blockchain Technology," 2019 8th International Conference on Modeling Simulation and Applied
Optimization (ICMSAO), Manama, Bahrain, 2019, pp. 1-5 [Link].
N. Zivic, C. Ruland, J. Sassmannshausen: Distributed Ledger Technologies
for M2M Communications, The 33rd International Conference on Information
Networking (ICOIN 2019) January 9-11, 2019, Kuala Lumpur, Malaysia [Link].
O. Ur-Rehman, N. Zivic, C. Ruland: An Overview of Automotive Security
Standards, Mipro 2019, 20-24 May 2019, Opatija, Croatia [Link].
C. Ruland: Protect and Conserve Robot's Transactions, Invited Talk on the
4th World Congress of Robotics 2019 (WCR-2019), Aug. 31-Sep. 1, Shenyang,
China
C. Ruland, J. Sassmannshausen: System-wide Traceability of Commands and
Data Exchange in Smart Grids, SEST'19 - 2nd International Conference on
Smart Energy Systems and Technologies, September 9-11, Porto, Portugal
(paper accepted).
2018
C. Ruland, J. Sassmannshausen, Jyoti Pragyan Satpathy "An Attribute
Certificate Management System for Attribute-based Access Control" 5th Annual Conf. on Computational Science & Computational
Intelligence (CSCI'18), Las Vegas, Dec 13-15, 2018 [Link].
C. Ruland, J. Sassmannshausen "Access Control in Safety Critical
Environments" 12th International Conference on Reliability, Maintainability and
Safety (ICRMS2018), Shanghai, China, Oct 15-17, 2018 [Link].
C. Ruland, J. Sassmannshausen, "Firewall for Attribute-Based Access
Control in Smart Grids," 2018 IEEE International Conference on Smart Energy Grid Engineering
(SEGE), Oshawa, ON, Canada, 2018, pp. 336-341. [Link]
Asmaa Tellabi, Jochen Sassmannshausen, Edita Bajramovic, and Karl
Christoph Ruland. Overview of authentication and access controls for
i&c systems. In 16th IEEE International Conference on Industrial
Informatics, INDIN 2018, Porto, Portugal, July 18-20, 2018, pages 882–889,
2018. [Link]
N. Zivic and C. Ruland, "Cognitive Channel Decoding", Future of
Information and Communication Conference (FICC 2018), Singapore, Apr.
2018.
N. Zivic and C. Ruland, "Cognition for Enhanced Biometric
Authentication," The 32nd International Conference on Information
Networking (ICOIN 2018), Chang Mai, Thailand, Jan. 2018.
2017
R. A. Djeujo and C. Ruland, "QoSs definition and session description protocol for secure communication using compressive sensing," 6th International Conference on Future Generation Communication Technologies Conference (FGCT), Dublin, Ireland, Aug. 21-23, 2017, pp. 1-7.
R. A. Djeujo and C. Ruland, "Secret matrix lifecycle management for compressive sensing based cryptographic mechanisms," IEEE 3th Annual Conference in Computing, Communication, Control, And Automation Conference (ICC3A), Pune, India, Aug. 17-18, pp. 1-10.
O. Ur Rehman and N. Zivic, "Two-phase Method for Image Authentication and Enhanced Decoding", IEEE Access, vol. 5, issue 1, pp. 12158-12167, Dec. 2017.
R. Fay, C. Bender, N. Klein, D. Krönert, F. Kußmaul, S. Merz, T. Pieper,
J. Saßmannshausen, T. Steinbring, and C. Wurmbach. Gefahrlos durch
den Nebel - Ein Sicherheitskonzept für das Fog Computing. 15. Deutscher
IT-Sicherheitskongress, BSI, Mai 16-18, 2017, Bonn, Germany.
C. Ruland, J. Sassmannshausen, K.Waedt and N. Zivic,
"Smart grid security - an overview of standards and
guidelines", e & i Elektrotechnik und
Informationstechnik, vol 134, issues 1, pp. 19-25, Feb
2017, Springer Wien. [Link]
O. Ur Rehman and N. Živić, "Discrete Wavelet Transform
based Watermarking for Image Content Authentication", 6th
International Conference on Pattern Recognition
Applications and Methods, Porto, Portugal, Feb. 24-26,
2017.
O. Ur Rehman, N. Živić and C. Ruland, "Approximate
Image Authentication and Correction Using Spatial and
Frequency Domain Features", 11th International ITG
Conference on Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9, 2017.
R. Fay and C. Ruland, "Compressed Sampling and
Authenticated-Encryption", 11th International ITG
Conference on Systems, Communications and Coding (SCC
2017), Hamburg, Germany, Feb. 6 - 9, 2017.
N. Živić, O. Ur Rehman and C. Ruland, "Iterative
Decoder for OFDM Transmission over Rayleigh Channel", 31st
International Conference on Information Networking (ICOIN
2017), Da Nang, Vietnam, Jan. 11 - 13, 2017.
R. A. Djeujo and C. Ruland, “Embedding
cryptographically secure matrix transformation in
structured compressive sensing,” IEEE Annual Computing and
Communication Workshop and Conference (CCWC 2017), pp.
529–535, Las Vegas, USA, Jan 9-11, 2017.
2016
N. Zivic and O. Ur Rehman, "Improved OFDM Decoder
for LTE and Beyond", The 2016 International Conference on
Computational Science and Computational Intelligence
(CSCI'16), Las Vegas, USA, Dec. 15 - 17, 2016.
R. Fay and C. Ruland, "Compressive Sensing
Encryption Modes and their Security", 11th International
Conference for Internet Technology and Secured Transactions
(ICITST-2016), Barcelona, Spain, Dec. 5-7,
2016.
G. Gala, T. Koller, D. G. Pérez, G. Fohler and C.
Ruland, "Timing Analysis of Secure Communication between
Resource Managers in DREAMS," Workshop on Security and
Dependability of Critical Embedded Real-Time Systems,
Porto, Portugal, Nov. 29, 2016. [Link]
N. Zivic and O. Ur Rehman, "Soft Authentication
Techniques for Images", 24th Telecommunications Forum
(TELFOR 2016), Belgrade, Serbia, Nov. 22-23, 2016.
[Link]
C. Ruland, N. Kang and J. Sassmannshausen,
"Rejuvenation of the IEC 61850 Protocol Stack for MMS",
IEEE International Conference on Smart Grid Communications
(SmartGridComm 2016), Sydney, Australia, Nov. 6-9, 2016.
[Link]
S. Abbas, F. Ahmed, N. Zivic and O. Ur Rehman,
"Perceptual Image Hashing using SVD based Noise Resistant
Local Binary Pattern", The 8th International Congress on
Ultra Modern Telecommunications and Control Systems (ICUMT
2016), Lisbon, Portugal, Oct. 18-20, 2016. [Link]
T. Koller, G. Gaula, D. G. Perez, C. Ruland, G.
Fohler, "DREAMS: Secure Communication between Resource
Management Components in Networked Multi-Core Systems",
IEEE Conference on Open Systems 2016 (ICOS 2016), Langkawi,
Malaysia, Oct. 10-12, 2016 (Best paper
award).[Link]
R. A. Djeujo and C. Ruland, “Secure matrix generation
for compressive sensing embedded cryptography,” IEEE Annual
Information Technology, Electronics and Mobile
Communication Conference (IEMCON 2016), pp. 250–257,
Vancouver, BC, Canada, Oct. 13-15, 2016. [Link]
N. Zivic, O. Ur Rehman and C. Ruland, "Smart
Metering for Intelligent Buildings", Transactions on
Machine Learning and Artificial Intelligence, vol. 4, no.
5, Oct. 2016. [Link]
T. Koller, D. Weber, "Security Services for
Mixed-Criticality Systems Based on Networked Multi-core
Chips", International Conference on Computer Safety,
Reliability and Security (SafeComp 2016), Trondheim,
Norway, Sep. 20-23, 2016. [Link]
M. Schneider and C. Ruland, "Verification of Time
Signals", 30th European Frequency and Time Forum (EFTF),
York, UK, Apr 4-7, 2016. [Link]
O. Ur Rehman, N. Zivic and C. Ruland, "Content
based Image Authentication with Error Correction", IEEE
International Conference on Communications (IEEE ICC'16),
Communication and Information System Security Symposium,
Kuala Lumpur, Malaysia, May 23-27, 2016. [Link]
R. Fay, "Introducing the Counter Mode of
Operation to Compressed Sensing Based Encryption",
Information Processing Letters, Elsevier, Volume 116, Issue
4, Apr 2016, pp. 279–283. [Link]
2015
J. Saßmannshausen and C. Ruland, "Nachweisbarkeit
in Smart Grids auf Basis von XML-Signaturen", D.A.CH
Security 2015, syssec IT Security & IT
Management, p. 98–109, Frechen, Germany, Sep 8-9,
2015.
J. Saßmannshausen and C. Ruland,
"End-to-End-Authentication in Smart Grid Control", IEEE
International Conference on Smart Energy Grid Engineering
(SEGE 2015), Oshawa, Canada, Aug 17-19, 2015. [ Link]
M. Schneider and C. Ruland, “Verification of time
telegrams in Long Wave Radio systems", IEEE 2015 Joint
Conference of the IEEE International Frequency Control
Symposium & the European Frequency and Time Forum
(IFCS-EFTF), Denver, Colorado, USA, pp. 270-275, Apr 12-16
2015. [Link]
S. Tabatabaei, O. Ur Rehman, N. Zivic, and C.
Ruland, "Secure and Robust Two-Phase Image Authentication",
IEEE Transactions on Multimedia, vol. 17, no. 7, pp.
945-956, May 2015. [Link]
O. Ur Rehman, A. E. Tabatabaei, N. Zivic, and C.
Ruland, "Spatial and Frequency Domain Complementary
Watermarks for Image Authentication and Correction," in the
10th International ITG Conference on Systems,
Communications and Coding (SCC 2015), Hamburg, Germany,
pp.1-6, Feb 2-5, 2015. [Link]
O. Ur Rehman, N. Zivic, "Secure Design Patterns
for Security in Smart Metering Systems", 9th IEEE European
Modelling Symposium (EMS 2015), Madrid, Spain, Oct 6-8,
2015. [Link]
O. Ur Rehman, N. Zivic, and C. Ruland, "Security
Issues in Smart Metering Systems", IEEE International
Conference on Smart Energy Grid Engineering (SEGE 2015),
Oshawa, Canada, Aug 17-19, 2015 (Overall best paper
award). [Link]
N. Zivic, O. Ur Rehman and C. Ruland,
"Evolution of Smart Metering Systems", 23rd IEEE
Telecommunications Forum (TELFOR 2015), Belgrade, Serbia,
Nov 24-26, 2015. [Link]
J. Sassmannshausen, C. Ruland, "Non-repudiation
Services for the MMS Protocol of IEC 61850", Security
Standardization Research Conference (SSR 2015), Tokyo,
Japan, Dec 15-16, 2015. [Link]
2014
C. Ling, O. Ur-Rehman and W. Zhang, "Semi-fragile
Watermarking Scheme for H.264/AVC Video Content
Authentication Based on Manifold Feature," KSII
Transactions on Internet and Information Systems, vol. 8,
no. 12, pp. 4568-4587, Dec. 2014. [Link]
A. Schantin and C. Ruland, “A Bit-Error Based
Capture Model for EPCglobal RFID Systems,” in 52th Annual
Allerton Conference on Communication, Control, and
Computing (Allerton), 2014, pp. 221–226. [Link]
S. Tabatabaei and N. Zivic, “Revisiting a
Primitive: Analysis of Approximate Message Authentication
Codes,” inIEEEInternational Conference on
Communications (ICC'14):,Sydney, Australia, 10 -
14 Jun, 2014. [Link]
O. Ur Rehman, N. Zivic, "Soft decision iterative
error and erasure decoder for Reed–Solomon codes," IET
Communications, vol. 8, no. 16, pp. 2863-2870, Nov 2014.
[Link]
J. Shin, and C. Ruland, "A Novel Design of
Content based Multimedia Security," in 9th Future Security
Conference, Berlin, Germany, 16 - 18 Sep. 2014.
J. Shin, and C. Ruland, "A Hybrid Approach for
Content Based Image Authentication," in 11th International
Conference on Security and Cryptography (SECRYPT'14),
Vienna, Austria, 28 - 30 Aug. 2014, pp. 371-378. [Link]
O. Ur Rehman, N. Živić, C. Ruland: "Security in
Smart Metering Systems under the Smart-Grid Perspective",
Tutorium, IEEE BlackSeaCom 2014, May 2014, Chisinau,
Moldova
2013
S. Rostami, Bamohabbat
S, and S. Tabatabaei, “Related-key impossible differential
cryptanalysis of full-round HIGHT,” in 10th International
Conference on Security and Cryptography (SECRYPT’13),
Reykjavik, Iceland, 29 - 31 Jul. 2013, pp.
537–542.
A. Schantin,
“Iterative decoding of baseband and channel codes in a
long-range RFID system,” in IEEE International Conference
on Industrial Technology (ICIT), Cape Town, South Africa,
25 - 28 Feb. 2013, pp. 1671–1676.
A. Schantin and C.
Ruland, “Retransmission Strategies for RFID Systems Using
the EPC Protocol,” in IEEE International Conference on RFID
Technologies and Applications (RFID-TA), Johor Bahru,
Malaysia, Johor Bahru, Malaysia, 4 - 5 Sep. 2013, pp.
1–6.
M. Schneider and C.
Ruland, “Sicherheit von Broadcast-Datendiensten im Smart
Grid am Beispiel der Rundsteuertechnik,” in
Informationssicherheit stärken - Vertrauen in die Zukunft
schaffen: [Tagungsband zum 13. Deutschen
IT-Sicherheitskongress], Gau-Algesheim: SecuMedia-Verl, pp.
483–496.
J. Shin and C. Ruland,
“A Survey of Image Hashing Technique for Data
Authentication in WMSNs,” in Workshop on Internet of Things
Communications and Technologies (IOT 2013), Lyon, France, 7
- 9, Oct. 2013, pp. 253–258.
S. Tabatabaei and C.
Ruland, “The Analysis of an NMF-based Perceptual Image
Hashing Scheme,” in 13th IEEE International Symposium on
Signal Processing and Information Technology (ISSPIT'13),
Athens, Greece, 12 - 15 Dec, 2013.
S. Tabatabaei, O. Ur
Rehman, and N. Zivic, “A DWT-based Image Authentication and
Correction Mechanism,” in 55th International Symposium
ELMAR-2013, Zadar, Croatia, 25 - 27 Sep. 2013, pp.
79–82.
S. Tabatabaei, O. Ur
Rehman, and N. Zivic, “AACI: The Mechanism for Approximate
Authentication and Correction of Images,” in IEEE
International Conference on Communications 2013 (ICC'13),
Workshop on Information Security over Noisy and Lossy
Communication Systems, 9 - 13 Jun. 2013, pp.
717–722.
O. Ur Rehman, S.
Tabatabaei, N. Zivic, and C. Ruland, “Soft Authentication
and Correction of Images,” in Proceedings of 2013 9th
International ITG Conference on Systems, Communication and
Coding (SCC), Munich, Germany, 21 - 24 Jan. 2013, pp.
1–6.
O. Ur Rehman and N.
Zivic, “Fuzzy Authentication Algorithm with Applications to
Error Localization and Correction of Images,” WSEAS
Transactions on Systems, vol. 12, no. 7, pp. 371–383,
http://wseas.org/cms.action?id=6952, 2013.
2012
H. Cankaya, C. Grepet, J. Holle, and J. Simó: "Enabling
the Deployment of Open In-Vehicle ITS Stations",
in 19th ITS World Congress
Vienna 2012, 2012.
J. Holle and H. Cankaya, "Designing Open Computing
Platforms with Security in Mind", Presentation only. Doha: ETSI, Feb.
2012.
J. Holle, A. Platschek, J. Sánchez, and J. Shin,
"OVERSEE - A Secure and Open In-Vehicle ITS Station",
in 19th ITS World Congress
Vienna 2012 , 2012.
R. Schick and C. Ruland: "Non-Repudiation of
Forwarding: Traceability of Confidential Data Via Multiple
Recipients", in 9th
International Conference of Security and Cryptography :
SciTePress,2012, pp. 387–390.
R. Schick and C. Ruland, "On the Security of the
Non-Repudiation of Forwarding Service", in Trust, Privacy and Security in
Digital Business: 9th International Conference, TrustBus
2012,Vienna, Austria, September 3-7, 2012. Proceedings ,
Berlin, Heidelberg, s.l.: Imprint: Springer,2012, pp.
167–178.
2011
A.Groll, J. Holle, M. Wolf, and T. Wollinger:
“Platforma de TI para veículos,” , RTI - Redes, Telecom e Instalações,
vol. XII, no. 136, pp.
84–94,http://www.arandanet.com.br/midiaonline/rti/2011/setembro/index.html,
2011.,
J. Holle, “OVERSEE - Potentials and Challenges for the
Automotive Industry,” , Nürnberg: embedded World Conference
2011, Mar. 2011.,
J. Holle, A.Groll,. Wolf, H. M Cankaya, and C. Grepet
“TOWARDS A SHARED DIGITAL COMMUNICATION PLATFORM FOR
VEHICLES,”, in 18th World
Congress on IntelligentTransport Systems, Orlando,
2011.,
Mahmood, A., Zivic, N.: A New Scheme of Forward Error
Correction Using Block Cliphers, IEEE International Conference on
Digital Divergence, Hyderabad, India,2011
Mahmood, A., Zivic, N.: Bit Error Rate Improvement
Using Soft Output of MAP Decoder and Avalanche Effect of
Block Ciphers, IEEE
International Conference on Computers, Communications,
Control and Automation, Hong Kong, China, 2011
Rehman, O.-U., Zivic, N.: Impact of Bit-Flip
Combinations on Successive Soft Input Decoding of Reed
Solomon Codes, 4th Intern.
Conference on Communication Theory, Reliability, and
Quality of Service Budapest,Hungary,2011
Rehman, O.-U., Zivic, N.: Iterative Bit Flip Type-II
Hybrid-ARQ Scheme for Wireless Networks, 17th European Wireless
Conference, Vienna, Austria, 2011
Rehman, O.-U., Zivic, N.: Multi-Layer Data Protection
using N-Channel Stop-and-Wait Hybrid-ARQ in WiMAX,
16th IEEE International
Symposium on Computers and Communications, Corfu,
Greece, 2011
Rehman, O.-U., Zivic, N.: Successive Iterative Decoding
of Reed Solomon Codes using Cryptographic Hash Codes as
Parity, 7th International
Conference on Innovations in Information Technology,
Abu Dhabi, UAE, 2011
A. Schantin, N. Zivic, and G. Bodean,: “Soft decision
decoding of the matroid codes,”, in Microwave and Telecommunication
Technology (CriMiCo), 2011 21th International Crimean
Conference , 2011, pp. 469–470.
R. Schick; C. Ruland, "Data Leakage Tracking- Non
Repudiation of Forwarding," in First Internation Conference on
Informatics Engineering and Information Science, 2011, pp.
163-173.
R. Schick; C. Ruland, "Document Tracking- On the Way to
a New Security Service," in Sixth Conference on Network
Architectures and Information Systems Security, 2011, pp.
89-93.
R. Schick; C. Ruland, "Introduction of a New
Non-Repudiation Service to Protect Sensitive Private Data,"
in Second Intrnational
Conference on Advances in Information and Communication
Technologies, 2011.
J. Holle, A. Groll, C. Ruland, H. Cankaya and M. Wolf,
"OPEN PLATFORMS ON THE WAY TO AUTOMOTIVE PRACTICE,"
in 8th ITS European
Congress, Lyon, 2011.
2010
C. Bodenstedt, C. Ruland, D. Weber, and A. Kung :
“Integration of Security and Dependability into Resource
constrained Embedded Systems,” , in The 3rd International Conference on
Telecommunications, Electronics and Inforatics ,
Chisinau, Moldova: Technical University of Moldova, 2010,
pp. 93–98.
A. Groll, J. Holle, M. Wolf, and T. Wollinger: “Next
Generation of Automotive Security: Secure Hardware and
Secure Open Platforms,” in Seventinth ITS World Congress Busan
2010 , Busan, Korea, 2010.
A. Groll, J. Holle, and C. Ruland “Upcoming Trends in
the Automotive IT and Associated Security Challenges,” ,
in The 3rd International
Conference on Telecommunications, Electronics and
Inforatics, Chisinau, Moldova: Technical University
of Moldova, 2010, pp. 25–30.
A. Groll, M. Müter, and F. C. Freiling,“A Structured
Approach to Anomaly Detection for In-Vehicle Networks,” ,
in Sixth International
Conference on Information Assurance and Security
(IAS), Atlanta, GA, 2010, pp. 92–98.
A. Mahmood and N. Zivic, “Bit Error Rate Improvement
Using Soft Outputs of MAP Decoder and Avalanche Effect of
Block Ciphers,” ,” in
International Symposium on Applied Sciences in Biomedical
and Communication Technologies, Rome , Italy,
2010
Zivic, N., O. ur Rehman: Soft Input Decoding of Reed
Solomon Codes with Miscorrrection 4th Intern. Conference on Signal
Processing and Communications Systems / IEEE, December
2010, Gold Coast/Australia
Zivic, N., Ruland, C.: Security Architecture of
Smart Metering Systems, 10th IFIP WG 6.11 Conference on
e-Business, e-Services, and e-Society, I3E 2010, Buenos
Aires, Argentina , November 2010, Proceedings,ISBN:
3-642-16282-7 Verlag Springer, pp. 249-259
R. Schick, S. Tcaciuc, and C. Ruland,
“Information Security of Multimodal Input Data
-Traceability of Image Data,”, in The 3rd International Conference on
Telecommunications, Electronics and Inforatics, Chisinau,
Moldova: Technical University of Moldova, 2010, pp.
31–34.
M. Schneider and C. Ruland: “Steckdose als virtuelle
Zapfsäule"in EMA
2010 , Elektromobilausstellung: Fachtagung,
Wettbewerbe ; Vorträge der ETG-Fachtagung vom 8. bis 9.
Oktober 2010 in Aschaffenburg , Berlin: VDE-Verl, 2010, pp.
161–169.
M. Schneider, S. Tcaciuc, and C. RulandZ: “Secure
metering for electrical vehicles,” , in E-Mobility: Technologien -
Infrastruktur - Märkte ; VDE-Kongress 2010 Leipzig, 8.-9.
November 2010 Congress Center Leipzig ;
Kongressbeiträge, Berlin: VDE-Verl, 2010, pp. FZT
1.4.13.
Zivic, N., Mahmood, A.,: Improvement of Channel
Decoding using Block Cypher 4th Intern. Conference on Mobile
Ubiquitous Computing, Systems, Services and Technologies
(UBICOMM 2010)/IEEE, October 2010,
Florence/Italy
Zivic, N.: On using the message digest for error
correction in wireless comunication networks Int. Werkshop on Wireless Distributed
Networks (WDN2010), Istanbul, Turkey, September
2010
Zivic, N.: Simulation and Application of Soft Input
Decryption, In: 2. Int.
Conference on System Simulation (SIMUL 2010), Nice,
France, August 2010
Zivic, N., O.ur Rehman, Ruland,C.: Iterative
Bit-Flipped Decoding of Concatenated Reed
Solomon/Convolutional Codes with HMAC Int. Simulat.-Multiconference,
Ottawa, Canada, 12.-14. Juli 2010, ISSN 1-56555-344-6
(CD)
N. Zivic, O.-U. Rehman, and C. Ruland: “On the
Probability and Impact of Collisions on Soft Input
Decryption,” in
International Symposium on Applied Sciences in Biomedical
and Communication Technologies, Rome , Italy, 2010,
pp. 1–5.
2009
A. Groll.: "Authentischer Nachrichtenaustausch über
In-Fahrzeug-CAN-Netze unter Berücksichtigung automobiler
Anforderungen,". In: in
Wissenschaftliches Kommunikations-und Sicherheitskolloquium
2009 , C. Ruland, Ed.: Shaker Verlag, 2009, pp.
117–129.
N. Zivic, O. Ur Rehman: Cryptographic check functions
for Forward Correction MASAUM Journal of Computing
(MJC),Vol 1, No 4, November 2009.
N. Zivic, O. Ur Rehman: Analysis of Serial and Parallel
Soft Input Decryption Schemes over a Wireless Channel
IEEE SPECTS 2009,
Istanbul, Türkei, 13.-16. Juli 2009, IEEE Press,
Piscataway, NJ/USA, ISBN 978-1-4244-4165-5.
N. Zivic, O. Ur Rehman: Using HMAC for Error correction
over Wireless Channel IEEE
WiMo 2009, Brisbane, Australien, 7.-10. Juli 2009 ,
IEEE Computer Society, ISBN 978-7695-3737-5, pp.
252-256.
N. Zivic, O. Ur Rehman: Error Correction over Wireless
Channel Using Symmetric Cryptography IEEE Wireless ViTAE, Aalborg,
Denmark, 17.-20. Mai 2009, ISBN 978-1-4244-4067-2, pp.
752-756.
A. Groll: Secure and Authentic Communication on
Existing Vehicle Networks Proceedings of the IEEE Intelligent
Vehicles Symposium (IV) Xi'an, China, 2009, ISBN:
978-1-4244-3504-3 IEEE Explore pp 1093-1097.
A. Groll: Gefahren der In-Fahrzeug-Kommunikation
moderner Automobile Sichere Wege in der vernetzten Welt:
Tagungsband zum 11. Deutschen
IT-Sicherheitskongress,
SecuMedia-Verlag,Gau-Algesheim, 2009, ISBN:
978-3922746973
2008
A. Groll, J. Holle: Simulative Bestimmung der
CAN-Bus-Lastgrenzen Automotive-Safety & Security 2008
- Sicherheit und Zuverlässsigkeit für automotive
Informationstecnik: 19. u. 20.11.2008, Stuttgart,
Shakerverlag, 2008, ISBN: 978-3832276812
Groll, A. Trusted Communication Groups for Authentic
In-Car Communication Proceedings of the 6th escar -
Embedded Security in Cars Conference, 18.-19.11.2008,
Hamburg
Dunte, M., Ruland, C.: Realising Time-Iimitation for
Cryptographic Keys in Secure Multimedia Distribution
Security and Communication
Networks, Vol. 1 (2008), No. 6, pp 451-459. ISSN:
1939-0114.
Zivic, N., Ruland, C.: Parallel Joint Channel Coding
and Cryptography International Journal of Computer
Science and Engineering, WASET World Academy of Science,
Engineering and Technology, Volume 4, Number 2,
Spring 2008, pp. 140-144, ISSN: 2070-3945.
Zivic, N., Ruland, C.: Parallel Joint Channel Coding
and Cryptography Proceedings of World Academy of
Science, Engineering and Technology, Volume 31, July
2008, pp. 539-539, ISSN: 1307-6884.
Dunte, M., Ruland, C.: Construction and Usage of
Time-limited Keys in Secure Multimedia Distribution
Multimedia Security in
Communication (MUSIC'08). CHINACOM '08. 2008 International
Conference on, International Conference on
Multimedia Security in Communication (MUSIC'08), Hangzhou,
China, 25 - 28 August 2008. ISBN: 978-1-4244-2374-3.
Zivic, N., Ruland, C.: Optimization of Soft Input
Decryption Mendel
2008, 14th Intern. Conference on Soft
Computing, Brno University of Technology, Brno, Czech
Republic, 18.-20.6.2008, pp 241-246, ISBN:
978-80-214-3675-6.
Zivic, N., Ruland, C.: Feedback in Soft Input
Decryption WSEAS Transactions on Communications
Issue 5, Volume 7, pp 428-437, May 2008, ISSN:
1109-2742.
Dunte, M., Ruland, C.: Delivery Infrastructure for
Secure Scalable Coded Multimedia Distributed Computing Systems
Workshops,2008. ICDCS Workshops
2008. 28th IEEE International Conference on, pp.
42-47, 28th IEEE International Conference on Distributed
Computing Systems, Beijing, China, 17 - 20 June 2008. ISBN:
978-0-7695-3173-1.
Zivic, N., Tcaciuc, S.: Feedback using dummy bits
Proccedings of the Applied Computing Conference (ACC
'08),Istanbul, Turkey,
27.-30.5.2008, pp 104-107, ISBN:
978-960-6766-67-1.
Tcaciuc, S., Ruland, C.: Optimizations of Flow Control
under QOS Aspects between Core Network and Access Network
Domains Proceeding of the 2nd International Conference
"Telecommunications, Electronics and Informatics"
(ICTEI2008),Chisinau, Moldova,
15.-18.5.2008, Volume 1, 2008, pp 37-42,
ISBN: 978-9975-45-083-6.
Zivic, N., Ruland, C.: Probability of Collisions in
Soft Input Decryption International Journal of Applied
Mathematics and Informatics, Issue 1, Volume
1, 2007, pp 21-27.
Zivic, N., Ruland, C.: Probability of Collisions in
Soft Input Decryption Proceedings of the American
Conference on Applied Mathematics (MATH
'08), Cambridge, Massachusetts, USA, March
2008,pp 362-366, ISBN: 978-960-6766-47-3.
Zivic, N., Ruland, C.: Channel Coding as a Cryptography
Enhancer Transaction on
Communications,Issue 3, Volume 7, pp.
83-91, March 2008, ISSN: 1109-2742
Zivic, N., Ruland, C.: Soft Input Decryption using
feedback Advances on Software Engineering, Parallel and
Distributed Systems,Proceedings of the 2nd WSEAS
international conference on Computer Engineering and
Applications (CEA '08), pp. 174-177, University
of Cambridge, UK, 20.-22.2.2008, ISBN:
978-960-6766-42-8
2007
Zivic, N., Ruland, C.: Improvement of Digital Signature
Error Rates Information,
Communication and Automation Technologies ICAT 2007,
Sarajewo, 29.-31.10.2007, ISBN:
978-9958-629-21-1
Zivic, N., Ruland, C.: Channel coding as a cryptography
enhancer Proceedings in
the 11 th WSEAS international conference on
Communications, pp. 273-278, Crete Island, Greece,
26.-28.7.2007, ISSN: 1790-5117
Dunte, M., Ruland, C.: On the Way to Secure Delivery of
Scalable Coded Media Mikulášská kryptobesídka, pp.
51-59, Prag, Tschechische Republik, 2007. ISBN:
80-903083-8-4.
Dunte, M., Ruland, C.: Secure Voice-over-IP IJCNS
International Journal of Computer Science and Network
Security, Vol. 7 No. 6, 30. Juni 2007, pp. 63-68. ISSN
1738-7906.
Hick, S., Ruland, C.: Security Aspects for Secure
Download of Regulated Software Lambrinoudakis, C.,
Pernul, G., Tjoa, A M.: TrustBus 2007, LNCS 4657, pp.
219-227, 2007. Springer-Verlag Berlin Heidelberg 2007. ISBN
978-3-540-74408-5.
Lohmann, T., Ruland, C.: Digital Signatures Based on
Elliptic Curves in RFIDs IJCNS International Journal of
Computer Science and Network Security, Vol. 7 No 1,
30. Januar 2007, pp. 275-281. ISSN 1738-7906.
2006
Lo Iacono, L., Müller, S., Ruland, C., Zisky, N.:
Sicherheitslösung für die automatisierte
Messdatenkommunikation - Best-Practice Lösung im
liberalisierten Energiemarkt Datenschutz und
Datensicherheit (DuD) 06/2006, pp. 347-352. Vieweg
& Sohn Verlag, Wiesbaden: 2006. ISSN: 1614-0702.
Oikonomidis, N., Ruland, C., Tcaciuc, S.: Deployment of
E-Government Municipal Services: Enforcement of Security
Polices Secure eGovernment Web Services, Idea Group
Publication, Hershey, PA, USA, Juli 2006, pp. 111-123.
ISBN: 1-59904-138-3.
Ruland, C.: Secure Online Metering for a Liberalized
Energy Market Secure eGovernment Web Services, Idea
Group Publication, Hershey, PA, USA, Juli 2006, pp.
97-110. ISBN: 1-59904-138-3.
Lo Iacono, L., Ruland, C., Zisky, N.: Secure transfer
of measurement data in open systems Computer Standards
& Interfaces, Vol. 28, 2006. ISSN: 0920-5489.
Lohmann, T., Ruland, C.: Security Levels of Bluetooth
Workshop on Intelligent
Transportation (WIT), Hamburg,
14.-15.3.06.
Lohmann, T., Ruland, C., Schneider, M.: Analysis of
Power Constraints for Cryptographic Algorithms in Mid-Cost
RFID Tags, CARDIS '06, Tarragona, Spanien, 19.-21. April
2006 Smart Card Research and Advanced
Applications-CARDIS 2006, LNCS 3928, pp. 278-288,
Springer-Verlag, 2006. ISBN 978-3-540-33311-1.
Ruland, C., Zivic, N.: Soft Input Decryption, Turbo
Coding 2006, 4. Intern. Symposium on Turbo Codes &
Related Topics, München, 3.-7. April 2006 Turbo
Coding 2006, ITG Fachbericht Band 191. ISBN:
978-3-8007-2947-0.
Oikonomidis, N., Ruland, C., Tcaciuc, S.: Enforcement
of Security Policies for e-Government Services on Municipal
and Cross-Border Level Proceedings of the Int.
Conference on e-Government, Ottoawa, Canada, 27.-
28.10.2005, pp. 311-320.
Oikonomidis, N., Ruland, C., Tcaciuc, S.: An
Architecture for Secure Policy Enforcement in E-Government
Services Deployment Lecture Notes in Computer
Scence, Springer Verlag, ISSN: 0302-9743, Vol.
3677/2005, Communications and Multmedia Security, 9th IFIP
TC-6 TC-11 Intern. Conference, CMS 2005, Salzburg, Austria,
19.-21.9.2005. ISBN: 3-540-28791-4.
Kang, N., Kunz, A., Lo Iacono, L., Ruland, C.: Analysis
of the QoS Requirements under Radio Access Network Planning
Aspects for GPRS/EDGE and UMTS IEEE WirelessCom 2005
Conference, First International Symposium on Wireless
Quality-of-Service (WiQoS'05), 13-16 Juni 2005, Maui,
Hawaii, USA.
Kang, N., Lo Iacono, L., Ruland, C., Kim, Y.: Efficient
Application of IPsec VPNs in Wireless Networks ISWPC
2006 Conference Proceedings, pp. 337-341, IEEE
conference International Symposium on Wireless Pervasive
Computing 2006, 16-18 Jan. 2006, Phuket, Thailand.
2005
Jung, S., Kang, N., Kim, Y., Ruland, C.: Efficient Way
to Employ Stream Authentication Schemes in Multicast Using
Short-lived Keys Preproceedings of WISA 2005
vol.6, The 6th International Workshop on Information
Security Applications, 22-24 Aug., 2005, Jeju in
Korea.
Kahmann, M., Lo Iacono, L., Ruland, C., Schütze, T.:
Sicherheitskonzept Das SELMA-Projekt, Konzepte,
Modelle, Verfahren. Physikalisch-Technische
Bundesanstalt Braunschweig und Berlin Herausgeber: Norbert
Zisky, 2005, pp. 165-246, PTB-IT-12, ISBN:
3-86509-257-8.
Wahl (geb. Angele), M., Ruland, C., Schütze, T.:
Sicherheitsanalyse Das SELMA-Projekt, Konzepte,
Modelle, Verfahren. Physikalisch-Technische
Bundesanstalt Braunschweig und Berlin Herausgeber: Norbert
Zisky, 2005, pp. 117-164, PTB-IT-12, ISBN:
3-86509-257-8.
Kaliotzoglou, A., Karantjias, A., Oikonomidis, N.,
Ruland, C., Tcaciuc, S.: Design Principles and Aspects for
Cross-Border Municipal Service Deployment Workshop and
Poster Proceedings of the 4th International EGOV
Conference, EGOV'05 4th International Conference on
Electronic Government, 22-26 August 2005, Denmark, TRAUNER
VERLAG, ISBN 3-85487-830-3.
Oikonomidis, N., Ruland, C., Tcaciuc, S.: Provision of
Secure Policy Enforcement Between Small and Medium
Governmental Organizations Second International
Conference, TrustBus 2005, Copenhagen, Denmark,
22.-26. August 2005, Proceedigs, pp. 141-150,
Springer-Verlag Berlin Heidelberg, LNSC 3592, ISBN
3-540-28224-6.
Dietze, L., Holznagel, B., Lo Iacono, L., Ruland, C.:
Qualifizierte Signatur im elektronischen Messdatenaustausch
Qualifizierte elektronische Signaturen in Theorie und
Praxis (QSIG 2005), Workshop im Rahmen der GI Tagung,
Sicherheit 2005, 5.-8.4.2005, Regensburg, ISBN:
3-88579-391-1.
Hong, K., Jung, S., Lo Iacono, L., Ruland, C.: Impacts
of Security Protocols on Real-time Multimedia
Communications Lecture Notes, Computer Science, Volume
3325, pp. 1-13, 2/2005.
Kang, N., Ruland, C.: Security analysis of DoS
Vulnerability in Stream Authentication Schemes Using Hash
Chaining IEICE Transaction on Communications, Vol.
E88-B, No. 3, Mar. 2005, ISSN: 0916-8516.
Kang, N., Ruland, C.: MDS: Multiplexed Digital
Signature for Real-time Streaming over Multisessions
The International Conference on Information Networking
(ICOIN) 2005 31.1.-2.2.2005, Jeju, Korea, LNCS V.3391,
pp. 824-834, 2005.
2003
Ruland, C., Tcaciuc, S.: Scheduler Based Flow Control
under QoS Aspects in GPRS/EDGE Networks IEEE International
Conference on Networks 2004/ICON 2004, 16.11.-18.11.04,
Singapur.
Ruland, C., Tcaciuc, S.: A Table Based Scheduler for
the QoS enabled Flow Control in GPRS/EDGE Networks IASTED
International Conference on Communication Systems and
Networks CSN 2004, 1.-3.9.2004, Marbella, Spain.
Oikonomidis, N., Ruland, C.: Identity Based Protocols
for Secure Electronic Content Distribution and Licensing
4th International Conference on Web Delivering of Music
Proceedings of IEEE Computer Society, pp. 92-99,
Wedelmusic 2004, 13-14. Sept. 2004, Universität Pompeu
Fabra, Barcelona, Spain.
Ruland, C., Wahl, M.: Usage of Mobile Agents for
Wireless Multimedia Communication Proceedings of IASTED
conference on Communication Systems and Applications (CSA
2004), pp. 161-166, Acta-Press, IASTED conference on
Communication Systems and Applications (CSA 2004),
8.-10.7.2004, Banff, AB, Canada.
Kang, N., Ruland, C.: DiffSig: Differentiated Digital
Signature for Real-time Multicast Packet Flows Lecture
Notes in Computer Science, pp. 251-260, Springer
Verlag, 1st International Conference on Trust and Privacy
in Digital Business (TrustBus '04) in conjunction with the
15th International Conference on Database and Expert
Systems Applications (DEXA 2004), Zaragoza, Spain,
30.8.-1.9.2004, ISBN 3-540-22919-1.
Lo Iacono, L., Ruland, C., Wahl, M.: Einsatz der
elektronischen Signatur für den Messdatenaustausch im
liberalisierten Energiemarkt (Secure Electronic Exchange of
Metering Data) VDI Berichte Nr. 1785, Telematik
Tagung, 17.+18.6.2003, Siegen.
2002
Ruland, C., Schlake, F.: A Security Protocol Providing
QOS in ATM Networks 8th IEEE International Conference on
Communication Systems, Singapore, 2002.
Friesen, A., Ruland, C.: Das eContract-Konzept Ein
Sicherheitsmodell für
Multi-Service-Multi-Provider-Architekturen Enterprise
Security Tagungsband Enterprise Security, pp.
37-42, IT Verlag, ISBN 3-936052-03-4.
Lo Iacono, L., Ruland, C.: Confidential Multimedia
Communication in IP Networks 8th IEEE International
Conference on Communication Systems, Singapore, 2002.
Friesen, A., Ruland, C.: Design eines Profil- und
Zertifikatsmanagementsystem für das Service by
eContract-Konzept Lecture Notes in Informatics, GI
Jahrestagung, GI-Edition, Bonn, 2002.
Lo Iacono, L., Ruland, C.: Eine Sicherheitsarchitektur
für den Austausch elektronischer Messdaten im
liberalisierten Energiemarkt SELMA-Workshop,
Physikalisch-Technische Bundesanstalt, Berlin 2002.
Ruland, C., Wahl, M.: Sicherheitsanalyse der
Übertragung von Energiedaten über offene Netze
SELMA-Workshop, Physikalisch-Technische Bundesanstalt,
Berlin 2002.
Lo Iacono, L., Ruland, C., Schweitzer, N.: Signing
Digital Streams Proceedings of 4th International ITG
Conference on Source and Channel Coding, pp. 324-334,
4th International ITG Conference on Source and Channel
Coding, 28.-30.1.2002, VDE-Verlag, Berlin, ISBN:
3-8007-2670-X.
2001
Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.:
Enhanced Modes of Operation for the Encryption in
High-Speed Networks and Their Impact on QoS V.
Varadharajan u. Y. Mu (Eds), LNCS 2119, pp. 344-359,
Springer-Verlag, Berlin Heidelberg, ACISP, 2001.
Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.:
Properties of Modes of Operation with Statistical
Self-Synchronization Mechanisms ICICS Shaping The New
Information ERA, 3rd International Conference on
Information, Communications and Signal Processing, 15-18
October 2001, Singapore, ISBN: 981-04-5149-0.
Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.:
Suitability of Cryptographic Modes of Operation for the
Encryption in High- Speed Networks IEEE
Proceedings, pp. 134-139, ICON 2001, Bangkok,
Thailand, Oktober 2001.
Friesen, A., Ruland, C.: Service by e-contract - a
security model for authentication, access control and
online subscription management multi-service-multi-provider
architectures Proceedings, Volume II Information
Systems, pp. 581-585, World Multiconference on
Systemics, Cybernetics and Informatics, Orlando, v. 22.-
25.7.2001, ISBN: 980-07-7542-0.
Geuer-Pollmann, C., Ruland, C.: XML-Sicherheit - Stand
heute Sicherheit im Internet, pp. 197-209, Bd. 7,
Ingelheim, SecuMedia Verlag, 2001, 7. Deutscher
IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg,
14.5.2001, ISBN 3-922746-36-5.
Ruland, C., Schweitzer, N.: Digitale Signatur von
Bitströmen, 7. Deutscher IT-Sicherheitskongress BSI 2001,
Bonn Bad Godesberg, Mai 2001, Secumedia-Verlag, Ingelheim
2001.
2000
Ruland, C., Weissmann, O.: Advanced Encryption Standard
Funkschau, 2000
Ruland, C., Weissmann, O.: Secure Subscription
Management on Agent based Platforms Globalcom 2000, San
Francisco, 27.11.-1.12.2000.
Geuer-Pollmann, C., Moula, M., Ruland, C., Sklavos, P.:
Digital Signatures for Web Content E-business: Key Issues,
Applications and Technologies, pp. 218-224, IOS Press,
Amsterdam, Oktober 2000.
1999
Friesen, A., Oikonomidis, N. , Ruland, C., Weissmann,
O.: A Distributed Certificate Management System for Use in
Agent System Workshop Proceedings, M1-M9, 2nd ACTS
Workshop, Singapore, 12/1999.
Jung, O., Ruland, C.: Encryption with Statistical
Self-Synchronization in Synchronous Broadband Networks
Tagungsband Cryptographic Hardware and Embedded
Systems, Lecture Notes in Computer Science, Springer
Verlag, CHES Workshop, 12-13 August 1999, Worcester,
USA.
Ruland, C.: Security vor dem Wachstumsschub
Comparex Journal, Nr. 28/1999, pp. 10-11, Comparex
Inform. Systeme, Mannheim
Geuer-Pollmann, C., Ruland, C.: Das Simple Signature
Protocol für WWW-Sicherheit Tagungsband 6. Deutscher
IT-Sicherheitskongreß des BSI 1999, pp. 461-465,
Secumedia-Verlag, Ingelheim 1999.
Ruland, C., Weissmann, O.: Zugangskontrolle für
universelle Dienstenutzung in Agentensystemen
Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI
1999, pp. 455-460, Secumedia-Verlag, Ingelheim
1999.
Kuhn, S., Ruland, C., Wollenweber, K.:
ATM-Verschlüsselung mit 155 Mbit/s Tagungsband 6.
Deutscher IT-Sicherheitskongreß des BSI 1999, pp.
287-295, SecuMedia-Verlag, Ingelheim 1999.
1998
Ruland, C.: Electronic Commerce 25 Jahre
Telemation, Jubiläumsausgabe 10/1998, S.1-9.
1997
Ruland, C.: Regierung umgeht Datenschutz: Orwell durch
die Hintertür? Computerwoche 15/1997,
S.20.
Ruland, C.: Breitbandverschlüsselung (155 Mbit/s) mit
Selbstsynchronisation 5. Deutscher
IT-Sicherheitskongreß des BSI 1997, „Mit Sicherheit in die
Informationsgesellschaft“, Tagungsband erschienen im
SecuMedia Verlag, Ingelheim,1997,Seite 289-301.
1995
Fox, D., Henn, T., Reichel, K., Ruland, C.: Guardeded
Authentic Local Area Network - GALAN -. In: Brüggemann,
H.-H.; Proceedings der Fachtagung Verläßliche Systeme
– VIS'95,DuD-Fachberichte, Vieweg-Verlag,
Braunschweig, Seite 163-180.
Ruland, C.: Datenkompression. In: Das
Telekommunikationswerk (Hrsg. D. Schulte), Interest
Verlag GmbH, Augsburg, 1995, Teil 4, Kap. 11, S. 1-48.
Ruland, C.: Sicherheit in Verteilten Systemen. In:
Tutoriumsband, KiVS'95, Chemnitz, 1995, S.
1-45.
Ruland, C.: Sichere Kommunikation zwischen
ISDN-Endgeräten. Datacom, Januar 1995, S. 108-116.
1994
Fox, D., Ruland, C.: Secure Common ISDN
ApplciatioProgramming Interface (S-CAPI). In:
Sicherheitsschnittstellen – Konzepte, Anwendungen und
Einsatzbeispiel, DUV Deutscher Universitätsverlag, Gabler
Vieweg Westdeutscher Verlag, 1994.
Dienst, D., Fox, D., Ruland, C.; Transparente
Sicherheitsmechanismen für ISDN-Anwendungen. Nutzung
u. Technik von Kommunikationsendgeräten, G. Kleinke,
VDE-Verlag, Offenbach 1994, S.81-95 ISBN 3-8007-2037-X.
Ruland, C.: Kontrollierter Zugang.Business
Computing Januar 1994 (1), Vogel-Verlag, München, S. 28-31
1993
Ruland, C.: Realizing Digital Signatures with
One-Way Hash Functions. In:Cryptologia. July 1993,
Vol. XVII, Number 3, p. 285-300.
1991
Kallerhoff, H., Ruland, C.: Statistische
Untersuchungen von Pseudozufallszahlenfolgen. In: KES
Kommunikations- und EDV-Sicherheit, Heft 3 (1991), S.
156-163.
Longerich, M., Ruland, C.:
Datenkompression, Implementation und
Vergleichstests>. In: datacom Heft 8, (1991), S.
97-103.
Longerich, M., Ruland, C.: Datenkompression, Grundlagen
und Übersicht (Fortsetzung). In: datacom Heft 5, (1991), S.
113-120.
Longerich, M., Ruland, C.: Datenkompression,
Grundlagen und Übersicht. In: datacom Heft 4, (1991), S.
88-96.
1990
Ruland, C.: Sichere Übertragung und
Archivierung elektronischer Dokumente. In: datacom Heft 3,
(1990), S. 120-130.
Ruland, C.: Sicherheit und
Sicherheitsmanagement in Offenen Kommunikationssystemen.
In: Sonderheft Netzwerkmanagement Spezial, Datacom Verlag,
1990, S. 202-213.
Ruland, C.: Vertrauenswürdigkeit und
Vertraulichkeit elektronischer Dokumente. In: Recht der
Datenverarbeitung (RDV), Heft 4, (1990), S. 168-174.
Ruland, C.: Datensicherheit in Lokalen Netzen,
Teil 2. In: datacom Heft 1, (1990), S. 100-107.
1989
Ruland, C.: Datensicherheit in Lokalen Netzen,
Teil 1. In: datacom Heft 12, (1989), S. 94-99.
Bong, D., Ruland, C.:Optimized Software
Implementation of the Modular Exponentiation on General
Purpose Microprocessors. In: Computers & Security, 8
(1989), p. 621-630.
Ruland, C.: Zur Datensicherheit in Lokalen
Netzen. In: Recht der Datenverarbeitung (RDV), Heft 5/6,
1989 (5. Jahrgang), S. 210-218.
Pohlmann, N., Ruland, C.:Datensicherheit bei
Kommunikation über Datex-P. In: datacom Heft 1, (1989), S.
64-70.
1988
Ruland, C.: Datenschutz in
Kommunikationssystemen Teil 5: Realisierung einer
Datenschutzeinrichtung. In: datacom Heft 3, (1988), S.
114-120.
Ruland, C.: Datenschutz in
Kommunikationssystemen Teil 4: Sicherheitsmechanismen und
ISO-Referenzmodell. In: datacom Heft 1, (1988), S. 92-97.
1987
Ruland, C.: Datenschutz in
Kommunikationssystemen Teil 3:
Authentizitätsprüfungs-verfahren und Schlüsselverteilung.
In: datacom Heft 9, (1987), S. 172-177.
Ruland, C.: Datenschutz in
Kommunikationssystemen Teil 2: Verschlüsselungsverfahren.
In: datacom Heft 4, (1987), S. 98-104.
Ruland, C.: Datenschutz in
Kommunikationssystemen Teil 1: Einführung und Begriffe. In:
datacom Heft 1, (1987), S. 78-84.
Ruland, C.: Sicherheitsarchitektur in Offenen
Kommunikationssystemen. In: Elektrotechnik und Maschinenbau
(E und M), Heft 12, 1987 (104. Jahrgang), S. 533-537.
1981
Ruland, C.: Algorithmen zur adaptiven
Berechnung der schnellsten Wege in Virtuellen Netzen. In:
Angewandte Informatik, 1981, Heft 11, (November), S.
492-496.
Ruland, C.: Routing in Virtuellen Netzen. In:
Elektronische Rechenanlagen, 1981 (Jahrgang 23), Heft 4,
Seite 164-167.
Ruland, C.: Was ist ein Virtuelles Netz? In:
Elektronische Rechenanlagen, 1981 (Jahrgang 23), Heft 3, S.
134-136.
Ruland, C.: Virtuelle Netze für verschiedene
Benutzerklassen. In: Online Heft 6, (Juni) 1981, S.
456-458.
1978
Ruland, C.: Ein Verfahren zur Lösung von (? +
k2) u = 0 in Außengebieten mit Ecken. In:
Applicable Analysis, Vol. 7, pp. 69-79, 1978.
1976
Ruland, C.: Ein Verfahren zur Berechnung der
Lösung des Dirichletschen Außenraumproblems zur
Helmholtzschen Schwingungsgleichung bei stückweise glatten
Rändern. In: Bonner Mathematische Schriften, Nr. 88, 1976.
1973
Ruland, C.: Zur theoretischen und numerischen
Lösbarkeit des Dirichletschen Außenraumproblems für die
Helmholtzsche Schwingungsgleichung. Diplomarbeit,
Universität Bonn 1973.