Claudia Eckert
Prof. Dr. Claudia Eckert
Chair
Address: | Technische Universität München |
Phone: | +49 (0)89 289-18577 |
Fax: | +49 (0)89 289-18579 |
E-Mail: | Claudia Eckert |
Room: | 01.08.054 |
Prof. Dr. Claudia Eckert ist Leiterin des Fraunhofer-Instituts für Angewandte und Integrierte Sicherheit AISEC in Garching und Professorin der Technischen Universität München, wo sie den Lehrstuhl für Sicherheit in der Informatik an der Fakultät für Informatik innehat. Zu ihren Forschungsschwerpunkten zählen die Entwicklung von Technologien zur Erhöhung der System- und Anwendungssicherheit, die Sicherheit eingebetteter Systeme und die Erforschung neuer Techniken zur Erhöhung der Resilienz und Robustheit von Systemen gegen Angriffe. Ihre Forschungsergebnisse wurden in über 160 begutachteten Fachbeiträgen veröffentlicht.
Seit 1.1.2018 ist sie die Sprecherin des Fraunhofer Clusters of Excellence Cognitive Internet Technologies CCIT, in dem die Expertisen von über 20 Fraunhofer-Instituten gebündelt werden, um neue kognitive Lösungen vom Sensor über Edge-Devices bis in die Cloud-Plattformen für die Digitalisierung insbesondere im industriellen Umfeld zu entwickeln und umzusetzen.
Als Mitglied verschiedener nationaler und internationaler industrieller Beiräte und wissenschaftlicher Gremien berät sie Unternehmen, Wirtschaftsverbände sowie die öffentliche Hand in allen Fragen der IT-Sicherheit. In Fachgremien wirkt sie mit an der Gestaltung der technischen und wissenschaftlichen Rahmenbedingungen in Deutschland sowie an der Ausgestaltung von wissenschaftlichen Förderprogrammen auf EU-Ebene.
Office Hours
Please contact our secretary to arrange individual appointments.
Anerkennung von Lehrveranstaltungen
Anerkennungen von Auslandssemestern, Gutachten und Empfehlungsschreiben durch Frau Prof. Eckert können nur nach einem persönlichen Gespräch erfolgen. Wir bitten Sie daher, über das Sekretariat einen Termin zu vereinbaren.
Kurzlebenslauf
2001 - 2008 | Professur für IT-Sicherheit an der Technischen Universität Darmstadt |
2001 - 2011 | Leitung des Fraunhofer-Instituts für Sichere Informationstechnologie SIT, Darmstadt |
seit 2008 | Professur für IT-Sicherheit an der Technischen Universität München und Leitung des Fraunhofer-Instituts für Angewandte und Integrierte Sicherheit AISEC |
seit 2018 | Sprecherin des Fraunhofer Clusters of Excellence Cognitive Internet Technologies CCIT |
Contact to the Fraunhofer Institute AISEC
Address: | Fraunhofer Institute for Applied and Integrated Security (AISEC) Lichtenbergstr. 11 85748 Garching (near Munich) |
Phone: | +49 (0)89 3229986-292 |
E-Mail: | claudia.eckert@aisec.fraunhofer.de |
Publications
2021 | Hybroid: Toward Android Malware Detectionand Categorization with Program Code and Network Traffic
International Security Conference (ISC 2021) |
|
Falcon: Malware Detection and Categorization with Network Traffic Images
ICANN - The International Conference on Artificial Neural Networks |
||
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs
ICANN - The International Conference on Artificial Neural Networks |
||
iTOP: Automating Counterfeit Object-Oriented Programming Attacks
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2021, San Sebastian, Spain, October 6-8, 2021, Proceedings |
||
2020 | ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
Annual Computer Security Applications Conference (ACSAC), ACM, 2020 |
|
Detecting and Categorizing Android Malware with Graph Neural Networks
The 36th ACM/SIGAPP Symposium On Applied Computing |
||
IntRepair: Informed Repairing of Integer Overflows
International Conference on Software Engineering (ICSE), Journal First, ACM/IEEE |
||
2019 | Analyzing Control Flow Integrity with LLVM-CFI
Annual Computer Security Applications Conference (ACSAC), ACM, 2019. |
|
IntRepair: Informed Repairing of Integer Overflows
Transactions on Software Engineering (TSE), IEEE |
||
MANIS: Evading Malware Detection System on Graph Structure
The 35th ACM/SIGAPP Symposium On Applied Computing |
||
2018 | Learning on a Budget for User Authentication on Mobile Devices
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018) |
|
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Annual Computer Security Applications Conference (ACSAC) |
||
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12,2018, Proceedings |
||
CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions with {LLVM}
Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I} |
||
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018 |
||
2017 | Cyber-Sicherheit in Industrie 4.0
Handbuch Industrie 4.0 Geschäftsmodelle, Prozesse, Technik |
|
Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Informatik-Spektrum 40 |
||
Dynamic Loader Oriented Programming on Linux
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) |
||
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) |
||
Empowering Convolutional Networks for Malware Classification and Analysis
30th International Joint Conference on Neural Networks (IJCNN) |
||
Combating Control Flow Linearization
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) |
||
2016 | CoKey: Fast token-based cooperative cryptography
Association for Computing Machinery -ACM- |
|
Deep Learning for Classification of Malware System Call Sequences
29th Australasian Joint Conference on Artificial Intelligence (AI) |
||
POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany |
||
Novel weaknesses in IEC 62351 protected Smart Grid control systems
IEEE International Conference on Smart Grid Communications, SmartGridComm 2016 |
||
Policy-based implicit attestation for microkernel-based virtualized systems
Information security. 19th international conference, ISC 2016 |
||
SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing
19th International Conference on Information Security (ISC) |
||
DeepFuzz: Triggering vulnerabilities deeply hidden in binaries
Detection of intrusions and malware, and vulnerability assessment. 13th International Conference |
||
Adaptive Semantics-Aware Malware Classification
13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA) |
||
Interactive Function Identification Decreasing the Effort of Reverse Engineering
Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015) |
||
2015 | Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices
Intelligent Data Engineering and Automated Learning--IDEAL 2015 |
|
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015) |
||
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015) |
||
Counteracting Data-Only Malware with Code Pointer Examination
18th International Symposium on Research in Attacks, Intrusions and Defenses |
||
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
TechDays Cyber Security Workshop, Munich, Germany |
||
Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
International Conference on Computer Safety, Reliability & Security (SAFECOMP), Delft, The Netherlands, September 2015. Springer LNCS |
||
Virtual Machine Introspection with Xen on ARM
2nd Workshop on Security in highly connected IT systems (SHCIS) |
||
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
International Conference on Software Quality, Reliability and Security Companion (QRS-C), Vancouver, Canada |
||
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography |
||
Is Feature Selection Secure against Training Data Poisoning?
Proceedings of The 32nd International Conference on Machine Learning (ICML'15) |
||
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Security Network Munich and BICCnet Workshop, Munich, Germany |
||
Retrospective Protection utilizing Binary Rewriting
14. Deutscher IT-Sicherheitskongress |
||
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts
Proceedings of the 11th International Conference on Information Security Practice and Experience (ISPEC 2015) |
||
Detecting Fingerprinted Data in TLS Traffic
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) |
||
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
Informatik-Spektrum |
||
Blind Format String Attacks
Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014) |
||
2014 | SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14) |
|
IT-Sicherheit und Cloud Computing
Springer Vieweg |
||
Efficient Attack Forest Construction for Automotive On-board Networks
Lecture Notes in Computer Science |
||
Code Validation for Modern OS Kernels
Workshop on Malware Memory Forensics (MMF) |
||
Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution
International Workshop on Innovative Software Development Methodologies and Practices (InnoSWDev), Hong Kong, China |
||
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
1st Workshop on Security in highly connected IT systems |
||
Support Vector Machines under Adversarial Label Contamination
Journal of Neurocomputing, Special Issue on Advances in Learning with Label Noise |
||
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Proceedings of the 23rd USENIX Security Symposium |
||
Persistent Data-only Malware: Function Hooks without Code
Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS) |
||
2013 | Identities for Embedded Systems Enabled by Physical Unclonable Functions
Number Theory and Cryptography (Lecture Notes in Computer Science) |
|
Security Issues of Multi-Core Architectures—The Automotive Case
it-Information Technology |
||
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks
EAI Endorsed Transactions on Mobile Communications and Applications |
||
Practical Information-Flow Aware Middleware for In-Car Communication
Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR’13) |
||
Leveraging In-Car Security by Combining Information Flow Monitoring Techniques
Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013) |
||
Automotive Proxy-based Security Architecture for CE Device Integration
Mobile Wireless Middleware, Operating Systems, and Applications |
||
Improving Mobile Device Security with Operating System-level Virtualization
28th IFIP International Information Security and Privacy Conference (SEC 2013) |
||
Online Lazy Gaussian Process Committee and its Application in Real-Time Trajectory Prediction
Information Sciences |
||
Efficient Online Sequence Prediction with Side Information
IEEE International Conference on Data Mining (ICDM) |
||
Active File Integrity Monitoring using Paravirtualized Filesystems.
Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013) |
||
Indicative Support Vector Clustering with its Application on Anomaly Detection
IEEE 12th International Conference on Machine Learning and Applications (ICMLA'13) |
||
Verifiable Trust between Electronic Control Units based on a single Trust Anchor
11th Embedded Security in Cars (escar) |
||
Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks
Proceedings of the ISC 2013: The 16th Information Security Conference |
||
Lazy Gaussian Process Committee for Real-Time Online Regression
27th AAAI Conference on Artificial Intelligence (AAAI '13) |
||
Leveraging String Kernels for Malware Detection
Proceedings of the 7th International Conference on Network and System Security |
||
X-TIER: Kernel Module Injection
Proceedings of the 7th International Conference on Network and System Security |
||
Learning from Multiple Observers with Unknown Expertise
Proceedings of 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining |
||
OPARS: Objective Photo Aesthetics Ranking System
34th European Conference on Information Retrieval (ECIR'13) |
||
2012 | Smart Mobile Apps -- Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse
Springer |
|
Actively Learning Probabilistic Subsequential Transducers
Proceedings of ICGI |
||
Automotive Proxy-based Security Architecture for CE Device Integration
MOBILWARE 2012, 5th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, Berlin, Germany, November 13–14, 2012 |
||
Towards Secure Fieldbus Communication
31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) |
||
Flash: Efficient, Stable and Optimal K-Anonymity
Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT) |
||
Adversarial Label Flips Attack on Support Vector Machines
20th European Conference on Artificial Intelligence (ECAI) |
||
Highly Efficient Optimal K-Anonymity For Biomedical Datasets
Proceedings of the 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS) |
||
Evasion Attack of Multi-Class Linear Classifiers
Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) |
||
Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
Proceedings of {EuroSec}'12, 5th European Workshop on System Security |
||
Bridging the Semantic Gap Through Static Code Analysis
Proceedings of {EuroSec}'12, 5th European Workshop on System Security |
||
2011 | Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen
Datenschutz und Datensicherheit |
|
Innovative Sicherheitstechnologien: sine-qua-non für safety-kritische Systeme?
IT-Sicherheit zwischen Regulierung und Innovation, Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit |
||
Nitro: Hardware-based System Call Tracing for Virtual Machines
Advances in Information and Computer Security |
||
A Universal Semantic Bridge for Virtual Machine Introspection
Information Systems Security |
||
T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks
7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm) |
||
2010 | Grammatical Inference Algorithms in MATLAB
ICGI 2010: Proceedings of the 10th International Colloquium on Grammatical Inference |
|
PSMA: A Parallel Algorithm for Learning Regular Languages
NIPS Workshop on Learning on Cores, Clusters and Clouds |
||
Improving the Quality of Ring Oscillator PUFs on FPGAs
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010) |
||
Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER
GI Jahrestagung (2) |
||
Datenschutz und Datensicherheit in intelligenten Energienetzen
DACH Security 2010 |
||
Exploiting the x86 Architecture to Derive Virtual Machine State Information
Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010) |
||
Digitale Daten in Geräten und Systemen
Carl-Heymanns-Verlag |
||
2009 | PDoS-Resilient Push Protocols for Sensor Networks
The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009) |
|
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption
Bulletin of the Korean Mathematical Society |
||
A Formal Model for Virtual Machine Introspection
Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec '09) |
||
On Controlled Sharing of Virtual Goods
Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods |
||
ITK-Kompendium 2010
FAZ-Institut |
||
Enhancing Control of Service Compositions in Service-Oriented Architectures
Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009) |
||
2008 | Ways to Track Your Lover
Proceedings of the WiVeC Symposium 2008 |
|
Measuring Unlinkability Revisited
Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08) |
||
Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security |
||
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications |
||
On Handling Insider Attacks in Wireless Sensor Networks
Information Security Technical Report |
||
Distributed Attribute-Based Encryption
11th International Conference on Information Security and Cryptology (ICISC 08) |
||
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008) |
||
A Reputation System for Electronic Negotiations
Computer Standards & Interfaces |
||
Improving the Scalability of Platform Attestation
Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08) |
||
Distributed Attribute-Based Encryption
11th International Conference on Information Security and Cryptology (ICISC 08) |
||
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008) |
||
Measuring Unlinkability Revisited
Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08) |
||
2007 | Situation-based Policy Enforcement
Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'07) |
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks |
||
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks |
||
A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
2nd International Conference on Availability, Reliability and Security ({ARES}) 2007 |
||
Ambient Intelligence: Neue Herausforderungen fuer die IT-Sicherheit
TU-Darmstadt, thema Forschung |
||
2006 | Artificial Immune Systems for IT-Security
it-Information Technology (Systems Biology and Information Technology) |
|
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006) |
||
On Permutation Masks in Hamming Negative Selection
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006) |
||
Hades - Hardware Assisted Document Security
Second Workshop on Advances in Trusted Computing (WATC '06 Fall) |
||
A Robust Integrity Reporting Protocol for Remote Attestation
Second Workshop on Advances in Trusted Computing (WATC '06 Fall) |
||
History-based Access Control and Information Flow Control for Structured Documents
Proceedings of the First International Workshop on Security (IWSEC 2006) |
||
Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.
Wireless Personal Multimedia Communications (WPMC) |
||
Secure Mobility in Beyond 3G
Wireless Personal Multimedia Communications (WPMC) |
||
The Link between r-contiguous Detectors and k-CNF Satisfiability
Proceedings of the Congress on Evolutionary Computation (CEC-2006) |
||
Generalization Regions in Hamming Negative Selection
Intelligent Information Systems (IIS-2006) |
||
Interworking von UMTS und WLAN: Nutzen und Sicherheitsaspekte
Telekommunikation Aktuell, Berichte aus Forschung und Entwicklung in Informationstechnik und Telekommunikation |
||
2005 | Secure mobile business solutions for real-time enterprises
Springer-Verlag |
|
Security Issues of Mobile Devices
Security in Pervasive Computing, Second International Conference, SPC 2005 |
||
RBAC Policy Engineering with Patterns
Proceedings of the Semantic Web and Policy Workshop |
||
Is Negative Selection Appropriate for Anomaly Detection ?
Proceedings of the ACM SIGEVO Genetic and Evolutionary Computation Conference (GECCO-2005) |
||
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005) |
||
Mobile Kommunikation: Technik und Sicherheitsprobleme
Datenschutz in der mobilen Welt - Realität oder Utopie? |
||
Kundenbindung durch ein anonymes Rabattsystem
Konferenz D-A-CH Security |
||
Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken
9ter deutscher Sicherheitskongreß des BSI |
||
Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit
PIK |
||
Identification of Security Requirements in WLAN-WLAN Inter-Domain Handovers based on Threat And Risk Analysis
The 8th International Symposium on Wireless Personal Multimedia Communications WPMC 2005 |
||
On the Appropriateness of Negative Selection defined over Hamming Shape-Space as a Network Intrusion Detection System
Proceedings of the Congress on Evolutionary Computation (CEC-2005) |
||
2004 | An Investigation of R-Chunk Detector Generation on Higher Alphabets
Genetic and Evolutionary Computation GECCO 2004 |
|
Protected Transmission of Biometric Authentication Data for Oncard-Matching
SAC 2004 Security |
||
NGN, AII-IP, B3G: Enabler für das Future Net?! Üerblick über Entwicklungen im Bereich zukünftiger Netze
Informatik-Spektrum |
||
Interworking von UMTS und WLAN: eine sicherheitstechnische Betrachtung
18. DFN-Tagung |
||
Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net
18. DFN-Tagung |
||
SIMS - eine Simulationsumgebung zur Analyse von Klassen von Angriffen
Konferenz D-A-CH Security, |
||
IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen
TU-Darmstadt, thema Forschung |
||
2003 | Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit
Zeitschrift FifF-Kommunikation |
|
Mobil, aber sicher!
Springer Verlag |
||
Schwerpunkt "IT-Sicherheit" Mobiles Arbeiten, sind Sie sicher?
Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit" |
||
Sicherheit und E-Learning
Workshop "E-Learning: Beherrschbarkeit und Sicherheit" |
||
Die Technik in der IT-Sicherheit
Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit" |
||
Schutz biometrischer Daten bei Authentisierung auf Smartcards
Konferenz D-A-CH Security |
||
Sicherheit -- Bremse oder Schrittmacher?
Comtec zeitschrift für Telekommunikationstechnik |
||
2002 | Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler
Konferenz Elektronische Geschäftsprozesse |
|
IT-Sicherheit - Schrittmacher oder Bremser der Innovationen
Springer Verlag |
||
IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft
M, Fachzeitschrift für Information Management & Consulting |
||
Ein Vergleich moderner Linux-Sicherheitsmechanismen
Konferenz Elektronische Geschäftsprozesse |
||
2001 | Anonym im Internet? Probleme und Lösungen
Arbeitskonferenz Kommunikationssicherheit |
|
Internet Anonymity: Problems and Solutions
Proceedings of the International Conference on Information Security, Trusted Information - The New Decade Challenge |
||
Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme
Arbeitskonferenz Kommunikationssicherheit |
||
2000 | Mobile Devices In eBusiness - New Opportunities And New Risks
Proceedings of the SIS2000 Workshop |
|
Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?
9th ACM SIGOPS European Workshop Beyond the PC: New Challenges for the Operating Systems |
||
GSFS - a New Group-Aware Cryptographic File System
Proceedings of the World Computer Congress, SEC2000 |
||
Flexible, Distributed and Adaptive Ressource Managament in MoDIS
Proceedings Europar2000 |
||
GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem
Arbeitskonferenz Systemsicherheit |
||
1999 | Improving Resource Management in Distributed Systems using Language-level Structuring Concepts
The Journal of Supercomputing |
|
1998 | Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol
Zeitschrift der Datenschutz-Berater |
|
Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen
|