default search action
Markus Ullmann
Person information
- affiliation: Bundesamt für Sicherheit in der Informationstechnik, Bonn, Germany
- affiliation: Hochschule Bonn-Rhein-Sieg, Sankt Augustin, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c15]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. Open Identity Summit 2021: 59-70 - [i2]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. CoRR abs/2105.12477 (2021)
2010 – 2019
- 2019
- [c14]Ki Won Sung, Sachin Sharma, Giuseppe Destino, Yansha Deng, Toktam Mahmoodi, Markus Ullmann, Achim Nahler, Yeosun Kyung, Seunghwan Kim, Sejin Seo, Seong-Lyun Kim, Edward Mutafungwa, Riku Jäntti, Minseok Choi, Joohyung Jeon, Dohyun Kim, Joongheon Kim, José Costa-Requena, Anders Nordlöw:
PriMO-5G: making firefighting smarter with immersive videos through 5G. 5G World Forum 2019: 280-285 - 2017
- [j3]Michael Kiometzis, Markus Ullmann:
Fahrdaten für alle? Datenschutz und Datensicherheit 41(4): 227-232 (2017) - 2016
- [c13]Matthias Neu, Ulrike Korte, Markus Ullmann:
Improvement of Fuzzy Vault for Multiple Fingerprints with Angles. BIOSIG 2016: 233-240 - [c12]Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Poster: V2V communication - Keeping you under non-disputable surveillance. VNC 2016: 1-2 - 2015
- [i1]Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. IACR Cryptol. ePrint Arch. 2015: 354 (2015) - 2012
- [c11]Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann:
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE. Sicherheit 2012: 83-94 - [c10]Markus Ullmann, Ralph Breithaupt, Frank Gehring:
"On-Card" User Authentication for Contactless Smart Cards based on Gesture Recognition. Sicherheit 2012: 223-234 - 2011
- [c9]Isabelle Hang, Markus Ullmann, Christian Wieschebrink:
Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. WISEC 2011: 139-144 - 2010
- [p1]Markus Ullmann, Matthias Vögeler:
Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms. Towards Hardware-Intrinsic Security 2010: 259-279
2000 – 2009
- 2005
- [e3]Dieter Hutter, Markus Ullmann:
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Lecture Notes in Computer Science 3450, Springer 2005, ISBN 3-540-25521-4 [contents] - 2004
- [e2]Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9 [contents] - 2003
- [c8]Dieter Hutter, Werner Stephan, Markus Ullmann:
Security and Privacy in Pervasive Computing State of the Art and Future Directions. SPC 2003: 285-289 - 2001
- [j2]Markus Ullmann, Frank Koob, Harald Kelter:
Anonyme Online-Wahlen - Lösungsansätze für die Realisierung von Online-Wahlen. Datenschutz und Datensicherheit 25(11) (2001) - [j1]Markus Ullmann:
Zukunft der Softwaretechnik aus Sicht der IT-Sicherheit. Softwaretechnik-Trends 21(1) (2001) - 2000
- [c7]Bruno Langenstein, Roland Vogt, Markus Ullmann:
The Use of Formal Methods for Trusted Digital Signature Devices. FLAIRS 2000: 336-340 - [c6]Robin E. Bloomfield, Dan Craigen, Frank Koob, Markus Ullmann, Stefan Wittmann:
Formal Methods Diffusion: Past Lessons and Future Prospects. SAFECOMP 2000: 211-226
1990 – 1999
- 1999
- [e1]Dieter Hutter, Werner Stephan, Paolo Traverso, Markus Ullmann:
Applied Formal Methods - FM-Trends 98, International Workshop on Current Trends in Applied Formal Method, Boppard, Germany, October 7-9, 1998, Proceedings. Lecture Notes in Computer Science 1641, Springer 1999, ISBN 3-540-66462-9 [contents] - 1998
- [c5]Frank Koob, Markus Ullmann, Stefan Wittmann:
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process. FM-Trends 1998: 302-310 - 1996
- [c4]Frank A. Koch, Markus Ullmann, Stefan Wittmann:
Verification Support Environment. CAV 1996: 454-457 - [c3]Frank Koob, Markus Ullmann, Stefan Wittmann:
Application of Formal Methods in the Scope of IT-Security. SAFECOMP 1996: 389-394 - 1994
- [c2]Klaus J. Keus, Markus Ullmann:
Availability: theory and fundamentals for practical evaluation and use. ACSAC 1994: 258-264 - 1993
- [c1]Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver:
VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. VIS 1993: 175-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint