Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2019A Location Privacy Analysis of Bluetooth Mesh
Caesar, Matthias; Steffan, Jan
Conference Paper
2015Security Analysis of TrueCrypt
Baluda, Mauro; Fuchs, Andreas; Holzinger, Philipp; Nguyen, L.; Othmane, Lotfi ben; Poller, Andreas; Repp, Jürgen; Späth, Johannes; Steffan, Jan; Triller, Stefan; Bodden, Eric
Study
2015Sicherheitsanalyse TrueCrypt
Baluda, Mauro; Fuchs, Andreas; Holzinger, Philipp; Nguyen, L.; Othmane, Lotfi Ben; Poller, Andreas; Repp, Jürgen; Späth, Johannes; Steffan, Jan; Triller, Stefan; Bodden, Eric
Study
2013Sicherheitsstudie Content Management Systeme (CMS)
Breitenstrom, C.; Micklisch, C.; Mochól, M.; Baum, Jürgen; Pflüger, Clemens; Steffan, Jan
Report
2012Guidelines for the use and interpretation of assays for monitoring autophagy
Klionsky, D.J.; Abdalla, F.C.; Abeliovich, H.; Abraham, R.T.; Acevedo-Arozena, A.; Adeli, K.; Agholme, L.; Agnello, M.; Agostinis, P.; Aguirre-Ghiso, J.A.; Ahn, H.J.; Ait-Mohamed, O.; Ait-Si-Ali, S.; Akematsu, T.; Akira, S.; Al-Younes, H.M.; Al-Zeer, M.A.; Albert, M.L.; Albin, R.L.; Alegre-Abarrategui, J.; Aleo, M.F.; Alirezaei, M.; Almasan, A.; Almonte-Becerril, M.; Amano, A.; Amaravadi, R.; Amarnath, S.; Amer, A.O.; Andrieu-Abadie, N.; Anantharam, V.; Ann, D.K.; Anoopkumar-Dukie, S.; Aoki, H.; Apostolova, N.; Arancia, G.; Aris, J.P.; Asanuma, K.; Asare, N.Y.O.; Ashida, H.; Askanas, V.; Askew, D.S.; Auberger, P.; Baba, M.; Backues, S.K.; Baehrecke, E.H.; Bahr, B.A.; Bai, X.-Y.; Bailly, Y.; Baiocchi, R.; Baldini, G.; Balduini, W.; Ballabio, A.; Bamber, B.A.; Bampton, E.T.W.; Bánhegyi, G.; Bartholomew, C.R.; Bassham, D.C.; Bast Jr., R.C.; Batoko, H.; Bay, B.-H.; Beau, I.; Béchet, D.M.; Begley, T.J.; Behl, C.; Behrends, C.; Bekri, S.; Bellaire, B.; Bendall, L.J.; Benetti, L.; Berliocchi, L.; Bernardi,
Journal Article
2009Attacking the BitLocker boot process
Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J.
Conference Paper
2009Chrome mit Kratzern: Google's Webbrowser und der Datenschutz
Steidle, R.; Pordesch, U.; Seitz, K.; Steffan, J.
Journal Article
2008Attacking the BitLocker boot process
Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J.
Presentation
2008BitLocker Drive Encryption im mobilen und stationären Unternehmenseinsatz
Steffan, J.; Poller, A.; Trukenmüller, J.; Stotz, J.-P.; Türpe, S.
Report
2005Scoping für Drahtlose Sensornetze
Steffan, J.; Fiege, L.; Cilia, M.; Buchmann, A.
Conference Paper
2005Security mechanisms for multi-purpose sensor networks
Steffan, J.; Voss, M.
Conference Paper
2005Towards multi-purpose wireless sensor networks
Steffan, J.; Fiege, L.; Cilia, M.; Buchmann, A.
Conference Paper
2004Scoping in wireless sensor networks. A position paper
Steffan, J.; Fiege, L.; Cilia, M.; Buchmann, A.P.
Conference Paper
2003Active data protection with data journals
Steffan, J.; Brückner, L.; Wilhelm, U.; Terpstra, W.
Conference Paper
2002Collaborative attack modeling
Schneider, M.; Steffan, J.
Conference Paper
2001Reload cost problems: Minimum diameter spanning tree
Wirth, H.-C.; Steffan, J.
Journal Article