| | |
---|
2020 | Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0 Wagner, Paul Georg; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2020 | SEPAD - Security Evaluation Platform for Autonomous Driving Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey | Conference Paper |
2020 | TrustEV: Trustworthy Electric Vehicle Charging and Billing Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2019 | Challenges of Using Trusted Computing for Collaborative Data Processing Wagner, Paul G.; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2018 | Identity management and protection motivated by the general data protection regulation of the European Union - a conceptual framework based on state-of-the-art software technologies Birnstill, Pascal; Krempel, Erik; Wagner, P.G.; Beyerer, Jürgen | Journal Article |
2016 | Working and living in interactive environments - requirements for security and privacy Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2015 | Using extensible metadata definitions to create a vendor-independent SIEM system Detken, Kai-Oliver; Scheuermann, Dirk; Hellmann, Bastian | Conference Paper |
2014 | Towards trust assurance and certification in cyber-physical systems Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin | Conference Paper |
2012 | Attestation of mobile baseband stacks Wagner, S.; Wessel, S.; Stumpf, F. | Conference Paper |
2012 | Automatisches Erkennen mobiler Angriffe auf die IT-Infrastruktur Detken, Kai-Oliver; Scheuermann, Dirk; Bente, Ingo; Westerkamp, Jürgen | Conference Paper |
2012 | Trust and privacy management support for context-aware service platforms Neisse, Ricardo | Dissertation |
2011 | Approaching runtime trust assurance in open adaptive systems Schneider, Daniel; Becker, Martin; Trapp, Mario | Conference Paper |
2011 | Approaching runtime trust assurance in open adaptive systems Schneider, Daniel; Becker, Martin; Trapp, Mario | Report |
2011 | Implementing trust in cloud infrastructures Neisse, Ricardo; Holling, Dominik; Pretschner, Alexander | Conference Paper |
2009 | Attacking the BitLocker boot process Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J. | Conference Paper |
2009 | Information security Euting, T.; Weimert, B. | Book Article |
2008 | Attacking the BitLocker boot process Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J. | Presentation |
2008 | BitLocker Drive Encryption im mobilen und stationären Unternehmenseinsatz Steffan, J.; Poller, A.; Trukenmüller, J.; Stotz, J.-P.; Türpe, S. | Report |
2007 | Facilitating the use of TPM technologies through S&D pattern Gürgens, S.; Rudolph, C.; Mana, A.; Munoz, A. | Conference Paper |
2007 | Informationssicherheit Euting, T.; Weimert, B. | Book Article |
2007 | Protection of DVB systems by trusted computing Kuntze, N.; Schmidt, A.U. | Presentation |
2006 | A Mobile service architecture utilising trusted computing Kuntze, Nicolai; Schmidt, Andreas U. | Presentation |
2006 | Trusted Computing in Mobile Action Kuntze, Nicolai; Schmidt, Andreas U. | Conference Paper |