Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2020AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas
Conference Paper
2020Privacy and identity management. Data for better living: AI and privacy
: Friedewald, Michael (Editor); Önen, Melek (Editor); Lievens, Eva (Editor); Krenn, Stephan (Editor); Fricker, Samuel (Editor)
Conference Proceedings
2019Dynamic searchable symmetric encryption for storing geospatial data in the cloud
Hiemenz, Benedikt; Krämer, Michel
Journal Article
2016Authentication and searchable symmetric encryption for cloud-based storage of geospatial data
Hiemenz, Benedikt
: Kuijper, Arjan (1. Gutachten); Krämer, Michel (Betreuer)
Master Thesis
2016Post-Quantum-Kryptografie
Ruhlig, Klaus
Journal Article
2014Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions
Bittl, Sebastian
Conference Paper
2013Towards e-passport duplicate enrollment check in the European Union
Butt, Moazzam; Marti, Sandra; Nouak, Alexander; Köplin, Jörg; Raghavendra, R.; Li, Guoqiang
Conference Paper
2007The role of mathematics in information security education
Wolthusen, Stephen
Conference Paper
2007Template protection and its implementation in 3D face recognition systems
Zhou, Xuebing
Conference Paper
2005Funktionalitäten der elektronischen Gesundheitskarte
Struif, B.; Waldmann, U.
Book Article
2005Kundenbindung durch ein anonymes Rabattsystem
Eckert, C.; Enzmann, M.; Okunick, S.; Schneider, M.
Conference Paper
2005Security issues of mobile devices
Eckert, C.
Conference Paper
2004Design and implementation of a code generator for ASN.1 data structures
Lautenschläger, F.
: Ebinger, P. (Prüfer)
Term paper
2004Entwicklung eines kryptografisch gesicherten Kundenbindungsystems für den elektronischen Handel
Okunick, S.
Thesis
2004IT-Sicherheit. Probleme, Lösungen und einige neue Herausforderungen
Eckert, C.
Journal Article
2004A privacy-friendly loyalty system based on discrete logarithms over elliptic-curves
Enzmann, M.; Fischlin, M.; Schneider, M.
Conference Paper
2004A privacy-friendly loyalty system for electronic marketplaces
Enzmann, M.; Schneider, M.
Conference Paper
2004Protected transmission of biometric user authentication data for oncard-matching
Waldmann, U.; Scheuermann, D.; Eckert, C.
Conference Paper
2003Entwicklung eines Zugangskontrollsystems auf der Basis kryptographisch gesicherter Passwörter
Wagner, H.
Thesis
2003Schutz biometrischer Daten bei Authentisierung auf Smartcards
Waldmann, U.
Conference Paper
2002Combined fingerprinting attacks against digital audio watermarking: Methods, results and solutions
Steinebach, M.; Dittmann, J.; Saar, E.
Conference Paper
2002Detecting DoS attacks in mobile agent systems and using trust policies for their prevention
Cubaleska, B.; Schneider, M.
Conference Paper
2002Empowering mobile software agents
Roth, V.
Conference Paper
2002Improved key management for digital watermark monitoring
Roth, V.; Arnold, M.
Conference Paper
2002Role based specification and security analysis of cryptographic protocols using asynchronous product automata
Gürgens, S.; Ochsenschläger, P.; Rudolph, C.
Conference Paper
2002Sicherung biometrischer Daten durch kryptographische Verfahren
Waldmann, U.
Thesis
2001Transparent access to encrypted data using operating systems network stack extensions
Rademer, E.; Wolthusen, S.
Conference Paper
2000Considering non-malleability in formal models for cryptographic protocols
Rudolph, C.
Conference Paper
2000Validation of cryptographic protocols by efficient automated testing
Gürgens, S.; Peralta, R.
Conference Paper
1999Efficient detection of failure modes in electronic commerce protocols
Gürgens, S.; Lopez, J.; Peralta, R.
Conference Paper
1999Public-Key Kryptographie und ihre Darstellung am Beispiel eins browser-gesteuerten Diffie-Hellman-Tutorials
Schröder, O.
Thesis
1998Efficient automated testing of cryptographic protocols
Gürgens, S.; Peralta, R.
Report
1998Key Escrow and Message Recovery
Herfert, M.
Conference Paper
1998Secure Communication Channels
Schwiderski-Grosche, S.
Conference Paper
1998Sichere Telemedizin mittels Plasma
Krannig, A.; Daum, H.
Conference Paper
1996Effiziente Exponentiation und optimale Punktdarstellung für Signatursysteme auf Basis elliptischer Kurven
Huehnlein, D.
Book Article
1996A formal analysis technique for authentication protocols
Gürgens, S.
Conference Paper
1996A formal analysis technique for authentication protocols
Gürgens, S.
Report
1996PLASMA. Platform for secure multimedia applications
Krannig, A.
Conference Paper