


default search action
Sicherheit 2010: Berlin, Germany
- Felix C. Freiling:

Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin. LNI P-170, GI 2010, ISBN 978-3-88579-264-2
Biometrics and Digital Signatures
- Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou:

Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien. 1-12 - Christoph Busch, Daniel Hartung:

Biometrische Nachrichten-Authentisierung. 13-24 - Detlef Hühnlein, Heiko Roßnagel, Jan Zibuschka:

Diffusion of Federated Identity Management. 25-36
Dependability and Fault-Tolerance
- Matthias Güdemann, Frank Ortmeier:

Quantitative Model-Based Safety Analysis: A Case Study. 37-48 - Roman Messmer, Jörg Keller:

Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware Video Networks. 49-60 - Tobias Distler, Rüdiger Kapitza, Hans P. Reiser:

State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services. 61-72
Security Systems
- Wolfgang Kastl, Thomas Loimayr:

A Parallel Computing System with Specialized Coprocessors for Cryptanalytic Algorithms. 73-84 - Rüdiger Weis, Brian Schüler, Stefan A. Flemming:

Towards Secure and Reliable Firewall Systems based on MINIX3. 85-92 - Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann:

A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition. 93-104
Multimedia Security
- Vincent Christlein, Christian Riess, Elli Angelopoulou:

A Study on Features for the Detection of Copy-Move Forgeries. 105-116 - Matthias Kirchner:

Lineare Zeilen- und Spaltenprädiktoren zur Erkennung von Bildskalierungen. 117-128 - Marcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser:

Collusion-Secure Fingerprint Watermarking for Real World Applications. 129-140
Reactive Security
- René Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König:

Iterative präzisionsbewertende Signaturgenerierung. 141-152 - Tobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann:

Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung. 153-164 - Michael Spreitzenbarth, Thorsten Holz:

Towards Secure Deletion on Smartphones. 165-176 - Jan Göbel:

Amun: Automatic Capturing of Malicious Software. 177-190 - Jan Göbel, Philipp Trinius:

Towards Optimal Sensor Placement Strategies for Early Warning Systems. 191-204 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck:

A Malware Instruction Set for Behavior-Based Analysis. 205-216
Theory and Practice of Cryptography
- Björn Stelte, Björn Saxe:

State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOS. 217-228 - Ulrich Kühn:

On Security Protocols for Desktop Sharing. 229-240 - Michael Schneider, Johannes Buchmann:

Extended Lattice Reduction Experiments Using the BKZ Algorithm. 241-252
Development of Secure Systems
- Fabian Schwab, Alexander Findeisen, Peter Sakal, Hartmut Pohl:

Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung. 253-264 - Henrich Christopher Pöhls:

Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate Verifications. 265-276 - Christian Ristig, René Fritzsche, Christian Siemers:

WatchCop - Safer Software Execution through Hardware/Software Co-Design. 277-288
Models and Metrics for Secure Systems
- Guido Schryen:

A Fuzzy Model for IT Security Investments. 289-304 - Thomas Heumann, Sven Türpe, Jörg Keller:

Quantifying the Attack Surface of a Web Application. 305-316 - Rainer Böhme, Stefanie Pötzsch:

Social Lending aus der Perspektive des Datenschutzes. 317-328
Network Security
- Pavol Sovis, Florian Kohlar, Jörg Schwenk:

Security Analysis of OpenID. 329-340 - Michael Schrank, Bastian Braun, Martin Johns, Joachim Posegga:

Session Fixation - The Forgotten Vulnerability? 341-352 - Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder:

CAPTCHAs: The Good, the Bad, and the Ugly. 353-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














