Publications

Effective Protection Against Phishing and Web Spoofing

2005 - Sebastian Gajek, Rolf Oppliger

9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677. pp 32-42. Copyrights Springer-Verlag, Heidelberg Berlin. [Springer] [Bibtex] [PDF]

Embedding Trust into Cars—Secure Software Delivery and Installation

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, November 29-30, 2005. Conference presentation [pdf]

Enforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing

2005 - Ulrich Greveler,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

2005 - Jörg Schwenk, Ulrich Greveler, Andre Adelsbach,

accepted for 9. Deutscher IT-Sicherheitskongress des BSI, Mai 2005.

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

How Pay-TV becomes E-Commerce

2005 - Ulrich Greveler,

7th International IEEE Conference on E-Commerce Technology, Munich 2005, IEEE Press P2277, ISBN 0-7695-2277-7. [PDF]

Identitätsmissbrauch im Onlinebanking

2005 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

Datenschutz und Datensicherheit, Ausgabe 11, 2005.

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Volume 2, International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290-294. IEEE Computer Society, 2005. [IEEE CS Link] [PDF] [Bibtex]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe

Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

9. Deutscher IT-Sicherheitskongress des BSI, 2005.

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation [Springer Link]

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

accepted for GI Fachtagung "Sicherheit 2005", 5-8 April 2005, Regensburg.

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

GI Fachtagung "Sicherheit 2005", Regensburg, April 2005, LNI Proceedings P-62, pp. 257-268. [PDF]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005. [Springer Link]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267. [pdf]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Accepted for ACM DRM 2005.

Trustworthy Visualisation and Verification of Multiple XML-Signatures

2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adelsbach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Moderne Verfahren der Kryptographie

2004 - Jörg Schwenk, Klaus-Dieter Wolfenstetter, Albrecht, Beutelsbacher

[Amazon]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

2004 - Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Security and Watermarking of Multimedia Contents V, SPIE Electronic Imaging 2003. [pdf]

Die digitale Signatur

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble

In J. Balfanz, J. Wendenburg (Hrsg.): Digitale Signaturen in der Praxis, AWV Verlag, 2003.

Watermark Detection with Zero-Knowledge Disclosure

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser

ACM Multimedia Systems Journal, Special Issue on Multimedia Security. [Springer Link]

Cryptographic Semantics For The Algebraic Models

2002 - Andre Adelsbach, Christian Stüble, S. Creese, B. Pfitzmann, P. Ryan, W. Simmonds, S. Steinbrechner, M. Steiner, M. Waidner

MAFTIA Deliverable D8, February 2002 [pdf]

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser

XI European Signal Processing Conference, Volume I, pp. 446-449. [pdf]

Final Report on Verification and Assessment

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble,

MAFTIA Deliverable D22, Project IST-1999-11583, January 2002.

Customer Identification for MPEG Video based on Digital Fingerprinting.

2001 - Jörg Schwenk, Enrico Hauer, Jana Dittman, Eva Saar, Claus Vielhauer

Proc. IEEE Pacific-Rim Conference on Multimedia (PCM-2001).

Optimized Self-Synchronizing Mode of Operation

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann

8th International Workshop on Fast Software Encryption, Yokohama, April 2001, LNCS, Springer-Verlag.

Tree based Key Agreement for Multicast.

2001 - Jörg Schwenk, T. Martin, R. Schaffelhofer

Proc. Communications and Multimedia Security 2001, Mai 2001, Darmstadt.

Zero-Knowledge Watermark Detection and Proof of Ownership

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Information Hiding: Fourth International Workshop, LNCS 2137, Springer-Verlag, Berlin, 2001, pp. 273-288. [Springer Link]

Anonymous fingerprinting with direct non-repudiation

2000 - Andre Adelsbach,

In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT‘2000, volume 1976 of Lecture Notes in Computer Science, pages 401-414, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.

Conditional Access for Business TV.

2000 - Jörg Schwenk,

Fernseh- und Kino-Technik 6/2000.

Proving ownership of digital content

2000 - Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann

In Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH ’99, volume 1768 of Lecture Notes in Computer Science, pages 126-141, Dresden, Germany, October 2000. Springer-Verlag, Berlin Germany.

Combining digital watermarks and collusion secure fingerprints for digital images.

1999 - Jörg Schwenk, A. Behr, Jana Dittman, J. Ueberberg, P Schmitt, M. Stabenau

Proc. Electronic Imaging'99, San Jose, USA.

How to securely broadcast a secret.

1999 - Jörg Schwenk,

In: B. Preneel (Ed.): Proceedings Communications an Multimedia Security '99, Kluwer Academic Publishers, 1999.

Public Key Encryption and Digital Signatures based on Permutation Polynomials.

1998 - Jörg Schwenk, Klaus Huber,

Electronics Letters, Vol 34 No. 8, 1998, 759-760.

Establishing a Key Hierarchy for Conditional Access without Encryption.

1996 - Jörg Schwenk,

Proc. IFIP Communications and Multimedia Security 1996, Chapman & Hall, London.

Public Key Encryption and Signature Schemes Based on Polynomials over Zn.

1996 - Jörg Schwenk, J. Eisfeld

Proc. EUROCRYPT 96, Ed. Ueli Maurer, Springer LNCS 1070 (1996), 60-71.

A Classification of Abelian Quasigroups

1995 - Jörg Schwenk,

Rendiconti di Matematica, Serie VII, Volume 15, Roma (1995), 161-172
Page: