Publications

Property-based Taming Lying Mobile Nodes

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

Accepted for International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) at 20th IEEE International ­Conference on Advanced Information Networking and Applications (AINA 2006), 18.-20. April, Vienna, Austria. [IEEE CS Link]

Property-Based Taming of Lying Mobile Nodes.

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Reversed Responsibilities: Browser Authentication instead of Server Authentication.

2006 - Jörg Schwenk, Sebastian Gajek,

Workshop on Transparency and Usability of Web Authentication, New York (USA), 2006.

SSL-VA-Authentifizierung als Schutz vor Phishing und Pharming.

2006 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

accepted for Sicherheit - Schutz und Zuverlässigkeit, February 20, 2006, Magdeburg, Germany. [PDF]

Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.

2006 - Lijun Liao, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Security Engineering for Zero-knowledge Watermark Detection

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Special Session on Media Security, WIAMIS 2005, 13-15 April 2005, Montreux, Switzerland.

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

2005 - Ulrich Greveler, Andre Adelsbach,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Anonymous Data Broadcasting by Misuse of Satellite ISPs

2005 - Ulrich Greveler, Andre Adelsbach, Sven Löschner

Proceedings of 22C3 Chaos Computer Club (CCC) Congress, Berlin, 2005, to appear. [PDF]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), 07-10 November 2005, Washington, USA. [IEEE CS Link] [Bibtex] [PDF]

Datenschutzverletzungen bei Internetzugängen via Satellit

2005 - Ulrich Greveler, Andre Adelsbach,

Datenschutznachrichten, 01/2005, pp. 4-7. [PDF]

Effective Protection Against Phishing and Web Spoofing

2005 - Sebastian Gajek, Rolf Oppliger

9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677. pp 32-42. Copyrights Springer-Verlag, Heidelberg Berlin. [Springer] [Bibtex] [PDF]

Embedding Trust into Cars—Secure Software Delivery and Installation

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, November 29-30, 2005. Conference presentation [pdf]

Enforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing

2005 - Ulrich Greveler,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

2005 - Jörg Schwenk, Ulrich Greveler, Andre Adelsbach,

accepted for 9. Deutscher IT-Sicherheitskongress des BSI, Mai 2005.

How Pay-TV becomes E-Commerce

2005 - Ulrich Greveler,

7th International IEEE Conference on E-Commerce Technology, Munich 2005, IEEE Press P2277, ISBN 0-7695-2277-7. [PDF]

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Volume 2, International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290-294. IEEE Computer Society, 2005. [IEEE CS Link] [PDF] [Bibtex]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe

Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

9. Deutscher IT-Sicherheitskongress des BSI, 2005.

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation [Springer Link]

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

accepted for GI Fachtagung "Sicherheit 2005", 5-8 April 2005, Regensburg.

Satellite Communication without Privacy - Attacker's Paradise

2005 - Ulrich Greveler, Andre Adelsbach,

GI Fachtagung "Sicherheit 2005", Regensburg, April 2005, LNI Proceedings P-62, pp. 257-268. [PDF]

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267. [pdf]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Accepted for ACM DRM 2005.

Trustworthy Visualisation and Verification of Multiple XML-Signatures

2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adelsbach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

2004 - Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

2003 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Security and Watermarking of Multimedia Contents V, SPIE Electronic Imaging 2003. [pdf]

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser

XI European Signal Processing Conference, Volume I, pp. 446-449. [pdf]

Customer Identification for MPEG Video based on Digital Fingerprinting.

2001 - Jörg Schwenk, Enrico Hauer, Jana Dittman, Eva Saar, Claus Vielhauer

Proc. IEEE Pacific-Rim Conference on Multimedia (PCM-2001).

Optimized Self-Synchronizing Mode of Operation

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann

8th International Workshop on Fast Software Encryption, Yokohama, April 2001, LNCS, Springer-Verlag.

Tree based Key Agreement for Multicast.

2001 - Jörg Schwenk, T. Martin, R. Schaffelhofer

Proc. Communications and Multimedia Security 2001, Mai 2001, Darmstadt.

Zero-Knowledge Watermark Detection and Proof of Ownership

2001 - Ahmad-Reza Sadeghi, Andre Adelsbach,

Information Hiding: Fourth International Workshop, LNCS 2137, Springer-Verlag, Berlin, 2001, pp. 273-288. [Springer Link]

Anonymous fingerprinting with direct non-repudiation

2000 - Andre Adelsbach,

In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT‘2000, volume 1976 of Lecture Notes in Computer Science, pages 401-414, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.

Conditional Access for Business TV.

2000 - Jörg Schwenk,

Fernseh- und Kino-Technik 6/2000.

Proving ownership of digital content

2000 - Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann

In Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH ’99, volume 1768 of Lecture Notes in Computer Science, pages 126-141, Dresden, Germany, October 2000. Springer-Verlag, Berlin Germany.

Combining digital watermarks and collusion secure fingerprints for digital images.

1999 - Jörg Schwenk, A. Behr, Jana Dittman, J. Ueberberg, P Schmitt, M. Stabenau

Proc. Electronic Imaging'99, San Jose, USA.

How to securely broadcast a secret.

1999 - Jörg Schwenk,

In: B. Preneel (Ed.): Proceedings Communications an Multimedia Security '99, Kluwer Academic Publishers, 1999.

Public Key Encryption and Digital Signatures based on Permutation Polynomials.

1998 - Jörg Schwenk, Klaus Huber,

Electronics Letters, Vol 34 No. 8, 1998, 759-760.

Establishing a Key Hierarchy for Conditional Access without Encryption.

1996 - Jörg Schwenk,

Proc. IFIP Communications and Multimedia Security 1996, Chapman & Hall, London.

Public Key Encryption and Signature Schemes Based on Polynomials over Zn.

1996 - Jörg Schwenk, J. Eisfeld

Proc. EUROCRYPT 96, Ed. Ueli Maurer, Springer LNCS 1070 (1996), 60-71.
Page: