default search action
Sicherheit 2010: Berlin, Germany
- Felix C. Freiling:
Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin. LNI P-170, GI 2010, ISBN 978-3-88579-264-2
Biometrics and Digital Signatures
- Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou:
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien. 1-12 - Christoph Busch, Daniel Hartung:
Biometrische Nachrichten-Authentisierung. 13-24 - Detlef Hühnlein, Heiko Roßnagel, Jan Zibuschka:
Diffusion of Federated Identity Management. 25-36
Dependability and Fault-Tolerance
- Matthias Güdemann, Frank Ortmeier:
Quantitative Model-Based Safety Analysis: A Case Study. 37-48 - Roman Messmer, Jörg Keller:
Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware Video Networks. 49-60 - Tobias Distler, Rüdiger Kapitza, Hans P. Reiser:
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services. 61-72
Security Systems
- Wolfgang Kastl, Thomas Loimayr:
A Parallel Computing System with Specialized Coprocessors for Cryptanalytic Algorithms. 73-84 - Rüdiger Weis, Brian Schüler, Stefan A. Flemming:
Towards Secure and Reliable Firewall Systems based on MINIX3. 85-92 - Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann:
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition. 93-104
Multimedia Security
- Vincent Christlein, Christian Riess, Elli Angelopoulou:
A Study on Features for the Detection of Copy-Move Forgeries. 105-116 - Matthias Kirchner:
Lineare Zeilen- und Spaltenprädiktoren zur Erkennung von Bildskalierungen. 117-128 - Marcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser:
Collusion-Secure Fingerprint Watermarking for Real World Applications. 129-140
Reactive Security
- René Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König:
Iterative präzisionsbewertende Signaturgenerierung. 141-152 - Tobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann:
Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung. 153-164 - Michael Spreitzenbarth, Thorsten Holz:
Towards Secure Deletion on Smartphones. 165-176 - Jan Göbel:
Amun: Automatic Capturing of Malicious Software. 177-190 - Jan Göbel, Philipp Trinius:
Towards Optimal Sensor Placement Strategies for Early Warning Systems. 191-204 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck:
A Malware Instruction Set for Behavior-Based Analysis. 205-216
Theory and Practice of Cryptography
- Björn Stelte, Björn Saxe:
State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOS. 217-228 - Ulrich Kühn:
On Security Protocols for Desktop Sharing. 229-240 - Michael Schneider, Johannes Buchmann:
Extended Lattice Reduction Experiments Using the BKZ Algorithm. 241-252
Development of Secure Systems
- Fabian Schwab, Alexander Findeisen, Peter Sakal, Hartmut Pohl:
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung. 253-264 - Henrich Christopher Pöhls:
Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate Verifications. 265-276 - Christian Ristig, René Fritzsche, Christian Siemers:
WatchCop - Safer Software Execution through Hardware/Software Co-Design. 277-288
Models and Metrics for Secure Systems
- Guido Schryen:
A Fuzzy Model for IT Security Investments. 289-304 - Thomas Heumann, Sven Türpe, Jörg Keller:
Quantifying the Attack Surface of a Web Application. 305-316 - Rainer Böhme, Stefanie Pötzsch:
Social Lending aus der Perspektive des Datenschutzes. 317-328
Network Security
- Pavol Sovis, Florian Kohlar, Jörg Schwenk:
Security Analysis of OpenID. 329-340 - Michael Schrank, Bastian Braun, Martin Johns, Joachim Posegga:
Session Fixation - The Forgotten Vulnerability? 341-352 - Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder:
CAPTCHAs: The Good, the Bad, and the Ugly. 353-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.