Lecture Notes in Informatics
Sicherheit 2010 Sicherheit, Schutz und Zuverlässigkeit
Gesellschaft für Informatik, Bonn
2010
Editors
Felix C. Freiling (ed.)
Copyright © Gesellschaft für Informatik, Bonn
Contents
Articles
- Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien
Pages: 1-12... Full Text
- Christoph Busch, Daniel Hartung
Biometrische Nachrichten-Authentisierung
Pages: 13-24... Full Text
- Detlef Hühnlein, Heiko Roßnagel, Jan Zibuschka
Diffusion of federated identity management
Pages: 25-36... Full Text
- Matthias Güdemann, Frank Ortmeier
Quantitative model-based safety analysis: A case study
Pages: 37-48... Full Text
- Roman Messmer, Jörg Keller
Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware Video Networks
Pages: 49-60... Full Text
- Tobias Distler, Rüdiger Kapitza, Hans P. Reiser
State transfer for hypervisor-based proactive recovery of heterogeneous replicated services
Pages: 61-72... Full Text
- Wolfgang Kastl, Thomas Loimayr
A parallel computing system with specialized coprocessors for cryptanalytic algorithms
Pages: 73-84... Full Text
- Rüdiger Weis, Brian Schüler, Stefan A. Flemming
Towards secure and reliable firewall systems based on MINIX
Pages: 85-92... Full Text
- Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann
A transparent Bridge for forensic sound network traffic data acquisition
Pages: 93-104... Full Text
- Vincent Christlein, Christian Riess, Elli Angelopoulou
A study on features for the detection of copy-move forgeries
Pages: 105-116... Full Text
- Matthias Kirchner
Lineare Zeilen- und Spaltenprädiktoren zur Erkennung von Bildskalierungen
Pages: 117-128... Full Text
- Marcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser
Collusion-secure fingerprint watermarking for real world applications
Pages: 129-140... Full Text
- René Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König
Iterative präzisionsbewertende Signaturgenerierung
Pages: 141-152... Full Text
- Tobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann
Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung
Pages: 153-164... Full Text
- Michael Spreitzenbarth, Thorsten Holz
Towards secure deletion on smartphones
Pages: 165-176... Full Text
- Jan Göbel
Amun: automatic capturing of malicious software
Pages: 177-190... Full Text
- Jan Göbel, Philipp Trinius
Towards optimal sensor placement strategies for early warning systems
Pages: 191-204... Full Text
- Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck
A malware instruction set for behavior-based analysis
Pages: 205-216... Full Text
- Björn Stelte, Björn Saxe
State-of-the-art kryptoverfahren für drahtlose sensornetze - eine krypto-bibliothek für mantisos
Pages: 217-228... Full Text
- Ulrich Kühn
On security protocols for desktop sharing
Pages: 229-240... Full Text
- Michael Schneider, Johannes Buchmann
Extended lattice reduction experiments using the BKZ algorithm
Pages: 241-252... Full Text
- Fabian Schwab, Alexander Findeisen, Peter Sakal, Hartmut Pohl
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
Pages: 253-264... Full Text
- Henrich C. Pöhls
Why showing one TLS certificate is not enough - towards a browser feedback for multiple TLS certificate verifications
Pages: 265-276... Full Text
- Christian Ristig, René Fritzsche, Christian Siemers
WatchCop - Safer Software Execution through Hardware/Software Co-Design
Pages: 277-288... Full Text
- Guido Schryen
A fuzzy model for Itô security investments
Pages: 289-304... Full Text
- Thomas Heumann, Sven Türpe, Jörg Keller
Quantifying the attack surface of a web application
Pages: 305-316... Full Text
- Rainer Böhme, Stefanie Pötzsch
Social Lending aus der Perspektive des Datenschutzes
Pages: 317-328... Full Text
- Pavol Sovis, Florian Kohlar, Jörg Schwenk
Security analysis of openid
Pages: 329-340... Full Text
- Michael Schrank, Bastian Braun, Martin Johns, Joachim Posegga
Session fixation - the forgotten vulnerability?
Pages: 341-352... Full Text
- Paul Baecher, Marc Gordon Lior Fischlin, Robert Langenberg, Michael Lützow, Dominique Schröder
Captchas: the good, the bad, and the ugly
Pages: 353-365... Full Text
Gesellschaft für Informatik, Bonn
ISBN 978-3-88579-264-2
Last changed 04.10.2013 18:42:06