Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2018Innovative measurement technologies for met-ocean and soil conditions
Lange, Bernhard; Gottschall, Julia; Patschke, E.; Viergutz, Thomas; Bastigkeit, Ilona; Rudolph, Claudia; Meier, Florian; Ramos, Carlos; Wolken-Möhlmann, Gerrit; Spieß, Volkhard
Presentation
2017Cooperative guidance and control in highly automated convoys - StrAsRob
Baltzer, Marcel; Rudolph, Claudia; Lopez Hernandez, Daniel; Flemisch, Frank
Conference Paper
2017Measurement results from FLS during the OBLEX-F1 campaign
Gottschall, J.; Rudolph, C.; Wolken-Möhlmann, G.; Viergutz, T.; Lange, B.
Presentation
2017Security knowledge representation artifacts for creating secure IT systems
Ruiz, J.F.; Arjona, M.; Mana, A.; Rudolph, C.
Journal Article
2017Translation of angiotensin-converting enzyme 2 upon liver- and lung-targeted delivery of optimized chemically modified mRNA
Schrom, E.; Huber, M.; Aneja, M.; Dohmen, C.; Emrich, D.; Geiger, J.; Hasenpusch, G.; Herrmann-Janson, A.; Kretzschmann, V.; Mykhailyk, O.; Pasewald, T.; Oak, P.; Hilgendorff, A.; Wohlleber, D.; Hoymann, H.-G.; Schaudien, D.; Plank, C.; Rudolph, C.; Kubisch-Dohmen, R.
Journal Article
2016Advanced carriers on legacy CMP tools - an intelligent solution for flexible production environments and R&D labs
Franz, M.; Schubert, I.; Junghans, R.; Martinka, R.; Rudolph, C.; Wachsmuth, H.; Trojan, D.; VanDevender, B.; Wrschka, P.; Gottfried, K.
Conference Paper
2016Innovative measurement technologies for offshore wind site characterization
Lange, B.; Gottschall, J.; Rudolph, C.; Wolken-Möhlmann, G.; Viergutz, T.; Meier, F.; Spieß, V.
Presentation
2015Challenges of TSV backside process integration
Rudolph, C.; Wachsmuth, H.; Boettcher, M.; Steller, W.; Wolf, M.J.
Conference Paper
2015Distributed security management for the IoT
Lincke, N.; Kuntze, N.; Rudolph, C.
Conference Paper
2015Forensic readiness: Emerging discipline for creating reliable and secure digital evidence
Endicott-Popovsky, B.; Kuntze, N.; Rudolph, C.
Journal Article
2015Fraunhofer IWES Wind LIDAR Buoy Validation
Gottschall, Julia; Wolken-Möhlmann, Gerrit; Viergutz, Thomas; Rudolph, Claudia; Lange, Bernhard
Presentation
2015Innovative measurement technologies for met-ocean and soil conditions
Lange, Bernhard; Gottschall, Julia; Rudolph, Claudia; Wolken-Möhlmann, Gerrit; Viergutz, Thomas; Meier, Florian; Spieß, Volkhard
Presentation
2015An integrated security and systems engineering process and modelling framework
Ruiz, J.F.; Mana, A.; Rudolph, C.
Journal Article
2015μ-Raman spectroscopy and FE-modeling for TSV-Stress-characterization
Saettler, P.; Hecker, M.; Boettcher, M.; Rudolph, C.; Wolter, K.J.
Journal Article, Conference Paper
2015On the secure distribution of vendor-specific keys in deployment scenarios
Kuntze, Nicolai; Fuchs, Anderas; Rudolph, Carsten
Conference Paper
2015Potential applications of the Fraunhofer IWES Wind Lidar Buoy
Gottschall, Julia; Wolken-Möhlmann, Gerrit; Viergutz, Thomas; Rudolph, Claudia; Lange, Bernhard
Presentation
2015Security vs. safety: Why do people die despite good safety?
Kuntze, N.; Rudolph, C.; Brisbois, G.B.; Boggess, M.; Endicott-Popovsky, B.; Leivesley, S.
Conference Paper
2015Testing floating LiDARs offshore - as a prerequisite for a cost-efficient wind resource assessment
Gottschall, Julia; Wolken-Möhlmann, Gerrit; Viergutz, Thomas; Rudolph, Claudia; Lange, B.
Conference Paper
2014CeMoSS - certification and model-driven development of safe and secure software
Huhn, M.; Gerken, S.; Rudolph, C.
Conference Paper
2014Integrity based relationships and trustworthy communication between network participants
Oberle, Alexander; Larbig, Pedro; Kuntze, Nicolai; Rudolph, Carsten
Conference Paper
2014Integrity protection in a smart grid environment for wireless access of smart meters
Detken, K.-O.; Genzel, C.-H.; Rudolph, C.; Jahnke, M.
Conference Paper
2014A resilient and distributed cabin network architecture
Kuntze, N.; Rudolph, C.; Hanka, O.; Tobeck, N.; Shaw, D.
Conference Paper
2014Resilient core networks for energy distribution
Kuntze, N.; Rudolph, C.; Leivesley, S.; Manz, D.; Endicott-Popovsky, B.
Conference Paper
2014A security engineering process for systems of systems using security patterns
Ruiz, J.F.; Rudolph, C.; Maña, A.; Arjona, M.
Conference Paper
2014Security foundation for a distributed cabin core architecture
Kuntze, N.; Rudolph, C.; Hanka, O.
Conference Paper
2014Trusted neighborhood discovery in critical infrastructures
Göttert, N.; Kuntze, N.; Rudolph, C.; Wahid, K.F.
Conference Paper
2014TSV-annealing: A thermo-mechanical assessment
Saettler, P.; Hecker, M.; Boettcher, M.; Rudolph, C.; Wolter, K.J.
Conference Paper
20133D TSV - Influence of electrolyte composites and anneal temperatures to copper protrusion and planarization
Rudolph, C.; Wachsmuth, H.; Bartusseck, I.; Parthenopoulos, M.; Goerner, L.; Boettcher, M.; Grafe, J.; Wolf, J.M.
Conference Paper
2013Bath chemistry and copper overburden as influencing factors of the TSV annealing
Saettler, P.; Boettcher, M.; Rudolph, C.; Wolter, K.-J.
Conference Paper
2013Beweiswert digitaler Asservate
Grosskopf, Lambert; Kuntze, Nicolai; Rudolph, Carsten
Journal Article
2013Building secure systems using a security engineering process and security building blocks
Rein, Andre; Rudolph, Carsten; Ruiz, J.F.
Conference Paper
2013Demo: Zero touch configuration
Kuntze, Nicolai; Larbig, Pedro; Rudolph, Carsten
Conference Paper
2013Enhancing security testing via automated replication of IT-asset topologies
Birkholz, H.; Sieverdingbeck, I.; Kuntze, N.; Rudolph, C.
Conference Paper
2013Forensic readiness for cloud-based distributed workflows
Rudolph, C.; Kuntze, N.; Endicott-Popovsky, B.
Conference Paper
2013Integrating trust establishment into routing protocols of today's MANET's
Oberle, Alexander; Rein, Andre; Kuntze, Nicolai; Rudolph, Carsten; Paatero, Janne; Lunn, Andrew; Racz, Peter
Conference Paper
2013Introducing security building block models
Rein, A.; Rudolph, C.; Ruiz, J.F.; Arjona, M.
Conference Paper
2013LMM: A common component for software license management on cloud
Kiyomoto, S.; Rein, A.; Nakano, Y.; Rudolph, C.; Miyake, Y.
Conference Paper
2013On the automatic establishment of security relations for devices
Kuntze, Nicolai; Rudolph, Carsten
Conference Paper
2013Secure deployment of SmartGrid equipment
Kuntze, N.; Rudolph, C.
Conference Paper
2013Security engineering based on structured formal reasoning
Fuchs, A.; Rudolph, C.
Conference Paper
2013Seizure of digital data and "selective suppression" of digital evidence
Kuntze, N.; Rudolph, C.; Schilling, H.; Alva, A.; Brisbois, B.; Endicott-Popovsky, B.
Conference Paper
2013Sicherstellung elektronischer Daten und "selektive Datenlöschung"
Schilling, Hellen; Kuntze, Nicolai; Rudolph, Carsten
Journal Article
2013Vorrichtung, System und Verfahren zur entfernten Inbesitznahme und Etablierung von Geheimnissen in Maschinen zu Maschinen Kommunikation
Kuntze, Nicolai; Rudolph, Carsten; Larbig, Pedro
Patent
2013ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software
Huhn, M.; Gerken, S.; Rudolph, C.
Conference Paper
20123D integration - technology and test strategy
Dobritz, S.; Grafe, J.; Rudolph, C.; Böttcher, M.; Wolf, M.J.; Lang, K.-D.
Conference Paper
2012Assessing the capabilities of acoustic Doppler sensors for quantifying dynamic phenomena in tidal streams
Richard, J.-B.; Bard, J.; Rudolph, C.; Milovich, M.
Conference Paper
2012Como garantir a seguranca da informacao (Internet do Futuro)
Rieke, R.; Rudolph, C.
Journal Article
2012Establishing trust between nodes in mobile ad-hoc networks
Kuntze, N.; Rudolph, C.; Paatero, J.
Conference Paper
2012On the Creation of Reliable Digital Evidence
Kuntze, N.; Rudolph, C.; Alva, A.; Endicott-Popovsky, B.; Christiansen, J.; Kemmerich, T.
Conference Paper
2012Redefining security engineering
Rudolph, C.; Fuchs, A.
Conference Paper
2012Sicherheit von Messgeräten und der Beweiswert digitaler Daten
Rudolph, Carsten; Großkopf, Lambert; Endicott-Popovsky, Barbara; Kemmerich, Thomas; Kuntze, Nicolai; Alva, Aaron; Christiansen, John
Conference Paper
2012Trust areas: A security paradigm for the future Internet
Rudolph, C.
Conference Paper
2012Trusted service access with dynamic security infrastructure configuration
Marx, R.; Kuntze, N.; Rudolph, C.; Bente, I.; Vieweg, J.
Conference Paper
2011Formal Notions of Trust and Confidentiality - Enabling Reasoning about System Security
Fuchs, Andreas; Gürgens, Sigrid; Rudolph, Carsten
Journal Article
2011Interoperable device Identification in Smart-Grid Environments
Kuntze, N.; Rudolph, C.; Bente, I.; Vieweg, J.; Helden, J. von
Conference Paper
2011PEGylation Improves Nanoparticle Formation and Transfection Efficiency of Messenger RNA
Üzgün, S.; Nica, G.; Pfeifer, C.; Bosinco, M.; Michaelis, K.; Lutz, J.-F.; Schneider, M.; Rosenecker, J.; Rudolph, C.
Journal Article
2011A property based security risk analysis through weighted simulation
Winkelvos, T.; Rudolph, C.; Repp, J.
Conference Paper
2011Secure digital chains of evidence
Kuntze, N.; Rudolph, C.
Conference Paper
2010Adaptronics - state of the art and some future challenges
Hanselka, H.; Melz, T.; Nuffer, J.; Kuntze, N.; Rudolph, C.; Cupelli, M.; Liu, J.; Monti, A.
Conference Paper
2010Characterization of tailor-made copolymers of oligo(ethylene glycol) methyl ether methacrylate (OEGMA) and N,N-dimethylaminoethyl methacrylate (DMAEMA) as nonviral gene transfer agents
Üzgün, S.; Akdemir, Ö.; Hasenpusch, G.; Maucksch, C.; Golas, M.M.; Sander, B.; Stark, H.; Imker, R.; Lutz, J.-F.; Rudolph, C.
Journal Article
2010A Formal Notion of Trust - Enabling Reasoning about Security Properties
Fuchs, Andreas; Gürgens, Sigrid; Rudolph, Carsten
Conference Paper
2010Messgerät und Messverfahren
Kuntze, N.; Rudolph, C.; Richter, C.; Nüll, S. von der; Emanuelsson, P.
Patent
2010Privacy in Distributed Commercial Applications
Kuntze, Nicolai; Rudolph, Carsten
Conference Paper
2010Securing digital evidence
Richter, J.; Kuntze, N.; Rudolph, C.
Conference Paper
2010Security engineering for embedded systems - The SecFutur vision
Gürgens, S.; Rudolph, C.; Mana, A.; Nadjm-Tehrani, S.
Conference Paper
2010Trust in peer-to-peer content distribution protocols
Kuntze, N.; Rudolph, C.; Fuchs, A.
Conference Paper
2010Trust infrastructures for future energy networks
Kuntze, N.; Rudolph, C.; Cupelli, M.; Liu, J.; Monti, A.
Conference Paper
2010A user-centric privacy manager for future energy systems
Phom, H.S.; Kuntze, N.; Rudolph, C.; Cupelli, M.; Liu, J.; Monti, A.
Conference Paper
2009On the security validation of integrated security solutions
Fuchs, A.; Gürgens, S.; Rudolph, C.
Conference Paper
2009Reliable Identities using off-the-shelf hardware security in MANETs
Kuntze, N.; Fuchs, A.; Rudolph, C.
Conference Paper
2009Secure web service workflow execution
Rudolph, C.; Velikova, Z.; Kuntze, N.
Conference Paper, Journal Article
2009Targeting of the beta(2)-adrenoceptor increases nonviral gene delivery to pulmonary epithelial cells in vitro and lungs in vivo
Elfinger, M.; Geiger, J.; Hasenpusch, G.; Üzgün, S.; Sieverling, N.; Aneja, M.K.; Maucksch, C.; Rudolph, C.
Journal Article
2009Towards a generic process for security pattern integration
Fuchs, A.; Gürgens, S.; Rudolph, C.
Conference Paper
2009Trust in Distributed Small Sized Data Centers
Kuntze, N.; Rudolph, C.
Conference Paper
2009Verification of S&D Solutions for Network Communications and Devices
Rudolph, C.; Compagna, L.; Carbone, R.; Munoz, A.; Repp, J.
Book Article
2008Specification and Security-Analysis of an Application using the SHVT. Tutorial
Rudolph, C.; Repp, J.
Report
2008Trust in business processes
Kuntze, N.; Schmidt, A.U.; Velikova, Z.; Rudolph, C.
Conference Paper
2007Biocompatible, thermoresponsive, and biodegradable
Lutz, J.-F.; Andrieu, J.; Uzgun, S.; Rudolph, C.; Agarwal, S.
Journal Article
2007Covert identity information in direct anonymous attestation (DAA)
Rudolph, C.
Conference Paper
2007Facilitating the use of TPM technologies through S&D pattern
Gürgens, S.; Rudolph, C.; Mana, A.; Munoz, A.
Conference Paper
2007Security evaluation of scenarios based on the TCG's TPM specification
Gürgens, S.; Rudolph, C.; Scheuermann, D.; Atts, M.; Plaga, R.
Conference Paper
2007Thyroid hormone (T3)-modification of polyethyleneglycol (PEG)-polyethyleneimine (PEI) graft copolymers for improved gene delivery to hepatocytes
Rudolph, C.; Sieverling, N.; Schillinger, U.; Lesina, E.; Plank, C.; Thünemann, A.F.; Schönberger, H.; Rosenecker, J.
Journal Article
2006Uronic acids functionalized polyethyleneimine (PEI)-polyethyleneglycol (PEG)-graft-copolymers as novel synthetic gene carriers
Weiss, S.I.; Sieverling, N.; Niclasen, M.; Maucksch, C.; Thünemann, A.F.; Möhwald, H.; Reinhardt, D.; Rosenecker, J.; Rudolph, C.
Journal Article
2005Abstractions preserving parameter confidentiality
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Conference Paper
2005On a formal framework for security properties
Rudolph, C.; Ochsenschläger, P.; Gürgens, S.
Journal Article
2005On the security of fair non-repudiation protocols
Gürgens, S.; Rudolph, C.; Vogt, H.
Journal Article
2005Security analysis of efficient (Un-) fair non-repudiation protocols
Rudolph, C.; Gürgens, S.
Journal Article
2003A business process modelling approach to security requirements engineering
Mana, A.; Montenegro, J.A.; Rudolph, C.; Vivas, J.L.
Conference Paper
2003A business process-driven approach to security engineering
Mana, A.; Montenegro, J.A.; Rudolph, C.; Vivas, J.L.
Conference Paper
2003On the security of fair non-repudiation protocols
Gürgens, S.; Rudolph, C.; Vogt, H.
Conference Paper
2003Parameter-confidentiality
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Conference Paper
2003Security analysis of (un-)fair non-repudiation protocols
Gürgens, S.; Rudolph, C.
Conference Paper
2002Authenticity and provability - a formal framework
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Conference Paper
2002Role based specification and security analysis of cryptographic protocols using asynchronous product automata
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Conference Paper
2001Authenticity and provability - a formal framework
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Report
2001A model for secure protocols and its application to systematic design of cryptographic protocols
Rudolph, C.
Dissertation
2001Role based specification and security analysis of cryptographic protocols using asynchronous product automata
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Report
2000Considering non-malleability in formal models for cryptographic protocols
Rudolph, C.
Conference Paper
1998Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik
Rudolph, C.
Thesis
1998A formal model for systematic design of key establishment protocols
Rudolph, C.
Conference Paper
1996Analyse krypotgraphischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik
Rudolph, C.
Thesis