default search action
Carsten Rudolph
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Carsten Rudolph, Guido Brunnett, Maximilian Bretschneider, Bertolt Meyer, Frank Asbrock:
TechnoSapiens: merging humans with technology in augmented reality. Vis. Comput. 40(2): 1021-1036 (2024) - [c91]Blake Haydon, Shangqi Lai, Xingliang Yuan, Sharif Abuadbba, Carsten Rudolph:
Towards Private Multi-operator Network Slicing. ACISP (3) 2024: 359-379 - [c90]Misita Anwar, Manika Saha, Gillian C. Oliver, Mohamed Ibrahim, Carsten Rudolph:
Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia. iConference (3) 2024: 295-310 - [c89]Quan Hong Nguyen, Tingmin Wu, Van Nguyen, Xingliang Yuan, Jason Xue, Carsten Rudolph:
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails. SecTL@AsiaCCS 2024: 35-46 - [c88]Sepehr Minagar, Amin Sakzad, Guido Tack, Carsten Rudolph, Judithe Sheard:
ALAN: Assessment-as-Learning Authentic Tasks for Networking. SIGCSE (1) 2024: 853-859 - [i25]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. CoRR abs/2402.17092 (2024) - [i24]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph:
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone? CoRR abs/2404.05964 (2024) - [i23]Thusitha Dayaratne, Carsten Rudolph, Tom Shirley, Sol Levi, David Shirley:
Fostering Trust in Smart Inverters: A Framework for Firmware Update Management and Tracking in VPP Context. CoRR abs/2404.18453 (2024) - [i22]Thusitha Dayaratne, Xinxin Fan, Yuhong Liu, Carsten Rudolph:
SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity. CoRR abs/2405.02476 (2024) - [i21]Thusitha Dayaratne, Viet Vo, Shangqi Lai, Sharif Abuadbba, Blake Haydon, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph:
Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp. CoRR abs/2406.12299 (2024) - [i20]Viet Vo, Thusitha Dayaratne, Blake Haydon, Xingliang Yuan, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Carsten Rudolph:
Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing. CoRR abs/2406.12330 (2024) - [i19]Van Nguyen, Surya Nepal, Tingmin Wu, Xingliang Yuan, Carsten Rudolph:
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection. CoRR abs/2409.00882 (2024) - 2023
- [j18]Fariha Tasmin Jaigirdar, Boyu Tan, Carsten Rudolph, Chris Bain:
Security-Aware Provenance for Transparency in IoT Data Propagation. IEEE Access 11: 55677-55691 (2023) - [j17]Ahmad Salehi S., Runchao Han, Carsten Rudolph, Marthie Grobler:
DACP: Enforcing a dynamic access control policy in cross-domain environments. Comput. Networks 237: 110049 (2023) - [j16]Ahmad Salehi Shahraki, Hagen Lauer, Marthie Grobler, Amin Sakzad, Carsten Rudolph:
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks. Sensors 23(24): 9856 (2023) - [j15]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [c87]Enrico Calandro, Louise Axon, Carsten Rudolph, Wallace Chigona:
Introduction to the Minitrack on International Perspectives for Cybersecurity. HICSS 2023: 4838 - [c86]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-Enclave Time Series Processing System. ICICS 2023: 719-737 - [c85]Fariha Tasmin Jaigirdar, Ozhan Saglik, Carsten Rudolph, Joanne Evans:
Are We Missing the Cybersecurity Factors in Recordkeeping? iConference (1) 2023: 3-13 - [c84]Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:
FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention. ISGT EUROPE 2023: 1-6 - [c83]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. TPS-ISA 2023: 13-22 - [i18]Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:
SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market. CoRR abs/2304.06179 (2023) - [i17]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-enclave Time series Processing System. CoRR abs/2306.16652 (2023) - [i16]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. CoRR abs/2309.11691 (2023) - [i15]Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
Guarding the Grid: Enhancing Resilience in Automated Residential Demand Response Against False Data Injection Attacks. CoRR abs/2312.08646 (2023) - 2022
- [j14]May Alhajri, Carsten Rudolph, Ahmad Salehi Shahraki:
A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context. IEEE Access 10: 22960-22979 (2022) - [j13]Shuo Wang, Surya Nepal, Alsharif Abuadbba, Carsten Rudolph, Marthie Grobler:
Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022) - [j12]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022) - [j11]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022) - [j10]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022) - [c82]Ziqiang Xu, Ahmad Salehi Shahraki, Carsten Rudolph:
Blockchain Applications in Smart Grid. ACSW 2022: 37-45 - [c81]May Alhajri, Ahmad Salehi Shahraki, Carsten Rudolph:
Privacy of Fitness Applications and Consent Management in Blockchain. ACSW 2022: 65-73 - [c80]Amir Kashapov, Tingmin Wu, Sharif Abuadbba, Carsten Rudolph:
Email Summarization to Assist Users in Phishing Identification. AsiaCCS 2022: 1234-1236 - [c79]Fariha Tasmin Jaigirdar, Carsten Rudolph, Rayhan Rashed, Md. Nahiyan Uddin, Chris Bain, A. B. M. Alim Al Islam:
NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees. COMPASS 2022: 614-622 - [c78]Thusitha Dayaratne, Mahsa Salehi, Carsten Rudolph, Ariel Liebman:
False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids. DSN 2022: 367-380 - [c77]Anthony Adams, Gillian C. Oliver, Carsten Rudolph:
Cybersecurity Maturity in the Pacific Islands - Informing a Regional CERT Framework. HICSS 2022: 1-10 - [c76]Enrico Calandro, Carsten Rudolph, Wallace Chigona, Louise Axon:
Introduction to the Minitrack on International Perspectives for Cybersecurity. HICSS 2022: 1-2 - [c75]Adrian Kristanto, Shuo Wang, Carsten Rudolph:
Latent Space-Based Backdoor Attacks Against Deep Neural Networks. IJCNN 2022: 1-10 - [c74]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9 - [i14]May Alhajri, Carsten Rudolph, Ahmad Salehi Shahraki:
A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context. CoRR abs/2202.12582 (2022) - [i13]May Alhajri, Ahmad Salehi Shahraki, Carsten Rudolph:
Privacy of Fitness Applications and Consent Management in Blockchain. CoRR abs/2203.00791 (2022) - [i12]Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph:
Email Summarization to Assist Users in Phishing Identification. CoRR abs/2203.13380 (2022) - 2021
- [c73]Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids. CODASPY 2021: 41-52 - [c72]Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain:
Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach. ICDH 2021: 27-37 - [c71]Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph:
Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems. ISGT Asia 2021: 1-5 - [c70]M. Ridwanur Rahman, Ahmad Salehi S., Carsten Rudolph:
Decentralized Policy Information Points for Multi-Domain Environments. TrustCom 2021: 1286-1293 - [c69]Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph:
Authentication and Access Control in 5G Device-to-Device Communication. TrustCom 2021: 1575-1582 - [i11]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021) - [i10]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021) - [i9]M. Ridwanur Rahman, Ahmad Salehi Shahraki, Carsten Rudolph:
Decentralized Policy Information Points for Multi-Domain Environments. CoRR abs/2108.08471 (2021) - [i8]Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph:
Authentication and Access Control in 5G Device-to-Device Communication. CoRR abs/2108.10534 (2021) - 2020
- [j9]Carsten Rudolph, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. Commun. ACM 63(4): 53-54 (2020) - [c68]Fariha Tasmin Jaigirdar, Carsten Rudolph, Gillian C. Oliver, David Watts, Chris Bain:
What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future Challenges. CIC 2020: 177-183 - [c67]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593 - [c66]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8 - [c65]Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
Robust Demand Response for Device Scheduling under False Data Injection Attacks in Smart Grids. ISGT-Europe 2020: 294-298 - [c64]Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids. NOMS 2020: 1-9 - [c63]Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain:
Prov-IoT: A Security-Aware IoT Provenance Model. TrustCom 2020: 1360-1367 - [c62]Ahmad Salehi S., Carsten Rudolph, Marthie Grobler:
Attribute-Based Data Access Control for Multi-Authority System. TrustCom 2020: 1834-1841 - [c61]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200 - [i7]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020) - [i6]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020) - [i5]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020) - [i4]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020) - [i3]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
2010 – 2019
- 2019
- [c60]Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain:
Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures. ACSW 2019: 27:1-27:10 - [c59]Tharuka Rupasinghe, Frada Burstein, Carsten Rudolph, Steven Strange:
Towards a Blockchain based Fall Prediction Model for Aged Care. ACSW 2019: 32:1-32:10 - [c58]Hagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal:
Bootstrapping Trust in a "Trusted" Virtualized Platform. CYSARM@CCS 2019: 11-22 - [c57]Jongkil Jay Jeong, Marthie Grobler, M. A. P. Chamikara, Carsten Rudolph:
Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity. CIC 2019: 330-337 - [c56]Jongkil Jeong, Joanne Mihelcic, Gillian C. Oliver, Carsten Rudolph:
Towards an Improved Understanding of Human Factors in Cybersecurity. CIC 2019: 338-345 - [c55]Tharuka Rupasinghe, Frada Burstein, Carsten Rudolph:
Blockchain based Dynamic Patient Consent: A Privacy-Preserving Data Acquisition Architecture for Clinical Data Analytics. ICIS 2019 - [c54]Shuo Wang, Surya Nepal, Richard O. Sinnott, Carsten Rudolph:
P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. ICWS 2019: 1-10 - [c53]Ahmad Salehi S., Carsten Rudolph, Marthie Grobler:
A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application. IM 2019: 643-648 - [c52]Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi, Shan He:
High Impact False Data Injection Attack against Real-time Pricing in Smart Grids. ISGT Europe 2019: 1-5 - [c51]Hagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal:
A Logic for Secure Stratified Systems and its Application to Containerized Systems. TrustCom/BigDataSE 2019: 562-569 - [c50]Ahmad Salehi Shahraki, Carsten Rudolph, Marthie Grobler:
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains. TrustCom/BigDataSE 2019: 618-625 - [i2]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019) - 2017
- [j8]José Fran. Ruiz, Marcos Arjona, Antonio Maña, Carsten Rudolph:
Security knowledge representation artifacts for creating secure IT systems. Comput. Secur. 64: 69-91 (2017) - [c49]Xiaoyang Wu, Ron Steinfeld, Joseph K. Liu, Carsten Rudolph:
An implementation of access-control protocol for IoT home scenario. ICIS 2017: 31-37 - [c48]Yevhen Zolotavkin, Julián García, Carsten Rudolph:
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools. GameSec 2017: 21-39 - 2016
- [c47]Carsten Rudolph:
Exploring the Space of Digital Evidence - Position Paper. ACISP (1) 2016: 249-262 - [c46]Carsten Rudolph:
Recent developments in example-based texture synthesis for graphics rendering. GI-Jahrestagung 2016: 2175-2185 - 2015
- [j7]José Fran. Ruiz, Antonio Maña, Carsten Rudolph:
An Integrated Security and Systems Engineering Process and Modelling Framework. Comput. J. 58(10): 2328-2350 (2015) - [c45]Nico Lincke, Nicolai Kuntze, Carsten Rudolph:
Distributed security management for the IoT. IM 2015: 1373-1376 - [c44]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. SEC 2015: 630-644 - 2014
- [c43]Alexander Oberle, Pedro Larbig, Nicolai Kuntze, Carsten Rudolph:
Integrity based relationships and trustworthy communication between network participants. ICC 2014: 610-615 - [c42]Nicolai Kuntze, Carsten Rudolph, Oliver Hanka:
Security foundation for a distributed cabin core architecture. ISSA 2014: 1-6 - [c41]Michaela Huhn, Stefan Gerken, Carsten Rudolph:
CeMoSS - Certification and Model-Driven Development of Safe and Secure Software. Software Engineering 2014: 207-208 - [c40]Norman Göttert, Nicolai Kuntze, Carsten Rudolph, Khan Ferdous Wahid:
Trusted neighborhood discovery in critical infrastructures. SmartGridComm 2014: 976-981 - [c39]José Fran. Ruiz, Carsten Rudolph, Antonio Maña, Marcos Arjona:
A security engineering process for systems of systems using security patterns. SysCon 2014: 8-11 - [i1]Glenn S. Dardick, Barbara Endicott-Popovsky, Pavel Gladyshev, Thomas Kemmerich, Carsten Rudolph:
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092). Dagstuhl Reports 4(2): 150-190 (2014) - 2013
- [c38]Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph:
Enhancing Security Testing via Automated Replication of IT-Asset Topologies. ARES 2013: 341-349 - [c37]Khan Ferdous Wahid, Nicolai Kuntze, Carsten Rudolph:
Trusted Virtual Machine Management for Virtualization in Critical Environments. ICS-CSR 2013 - [c36]Nicolai Kuntze, Carsten Rudolph:
On the automatic establishment of security relations for devices. IM 2013: 832-835 - [c35]Nicolai Kuntze, Pedro Larbig, Carsten Rudolph:
Demo: Zero touch configuration. IM 2013: 1076-1077 - [c34]Nicolai Kuntze, Carsten Rudolph, Hellen Schilling, Aaron Alva, Brooke Brisbois, Barbara Endicott-Popovsky:
Seizure of digital data and "selective suppression" of digital evidence. SADFE 2013: 1-6 - [c33]Michaela Huhn, Stefan Gerken, Carsten Rudolph:
ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software. Software Engineering 2013: 367 - [c32]Andre Rein, Carsten Rudolph, José Fran. Ruiz:
Building Secure Systems Using a Security Engineering Process and Security Building Blocks. Software Engineering (Workshops) 2013: 529-544 - [c31]Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:
LMM - A Common Component for Software License Management on Cloud. SECRYPT 2013: 284-295 - [c30]Alexander Oberle, Andre Rein, Nicolai Kuntze, Carsten Rudolph, Janne Paatero, Andrew Lunn, Péter Rácz:
Integrating trust establishment into routing protocols of today's MANETs. WCNC 2013: 2369-2374 - 2012
- [c29]Ronald Marx, Nicolai Kuntze, Carsten Rudolph, Ingo Bente, Jörg Vieweg:
Trusted service access with dynamic security infrastructure configuration. APCC 2012: 730-735 - [c28]Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich:
On the Creation of Reliable Digital Evidence. IFIP Int. Conf. Digital Forensics 2012: 3-17 - [c27]Nicolai Kuntze, Carsten Rudolph, Janne Paatero:
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. INTRUST 2012: 48-62 - [c26]Carsten Rudolph, Andreas Fuchs:
Redefining Security Engineering. NTMS 2012: 1-6 - [c25]Michaela Huhn, Stefan Gerken, Carsten Rudolph:
Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012). Software Engineering 2012: 198-200 - 2011
- [j6]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. Inf. Media Technol. 6(3): 759-776 (2011) - [j5]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. J. Inf. Process. 19: 274-291 (2011) - [c24]Timo Winkelvos, Carsten Rudolph, Jürgen Repp:
A Property Based Security Risk Analysis Through Weighted Simulation. ISSA 2011 - [c23]Nicolai Kuntze, Carsten Rudolph:
Secure Digital Chains of Evidence. SADFE 2011: 1-8 - [c22]Carsten Rudolph:
Trust Areas: A Security Paradigm for the Future Internet. STM 2011: 22-27 - 2010
- [j4]Stefan M. Goetz, Chiheb Dahmani, Carsten Rudolph, Thomas Weyh:
First Theoretic Analysis of Magnetic Drug Targeting in the Lung. IEEE Trans. Biomed. Eng. 57(9): 2115-2121 (2010) - [c21]Nicolai Kuntze, Carsten Rudolph:
Privacy in Distributed Commercial Applications. HCC 2010: 214-224 - [c20]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
A Formal Notion of Trust - Enabling Reasoning about Security Properties. IFIPTM 2010: 200-215 - [c19]Jennifer Richter, Nicolai Kuntze, Carsten Rudolph:
Security Digital Evidence. SADFE 2010: 119-130 - [c18]Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs:
Trust in Peer-to-Peer Content Distribution Protocols. WISTP 2010: 76-89
2000 – 2009
- 2009
- [c17]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. CSE (2) 2009: 781-786 - [c16]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Towards a Generic Process for Security Pattern Integration. DEXA Workshops 2009: 171-175 - [c15]Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
On the Security Validation of Integrated Security Solutions. SEC 2009: 190-201 - [p1]Carsten Rudolph, Luca Compagna, Roberto Carbone, Antonio Muñoz, Jürgen Repp:
Verification of S&D Solutions for Network Communications and Devices. Security and Dependability for Ambient Intelligence 2009: 143-163 - 2008
- [c14]Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph:
Trust in Business Processes. ICYCS 2008: 1992-1997 - [c13]Carsten Rudolph, Nicolai Kuntze, Zaharina Velikova:
Secure Web Service Workflow Execution. VODCA@FOSAD 2008: 33-46 - 2007
- [c12]Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz:
Facilitating the Use of TPM Technologies through S&D Patterns. DEXA Workshops 2007: 765-769 - [c11]Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga:
Security Evaluation of Scenarios Based on the TCG's TPM Specification. ESORICS 2007: 438-453 - [c10]Carsten Rudolph:
Covert Identity Information in Direct Anonymous Attestation (DAA). SEC 2007: 443-448 - 2005
- [j3]Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
On a formal framework for security properties. Comput. Stand. Interfaces 27(5): 457-466 (2005) - [j2]Sigrid Gürgens, Carsten Rudolph:
Security analysis of efficient (Un-)fair non-repudiation protocols. Formal Aspects Comput. 17(3): 260-276 (2005) - [j1]Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the security of fair non-repudiation protocols. Int. J. Inf. Sec. 4(4): 253-262 (2005) - [c9]Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Abstractions Preserving Parameter Confidentiality. ESORICS 2005: 418-437 - [c8]Carsten Rudolph, Antonio Mana:
Specification and automated processing of security requirements (SAPS'05). ASE 2005: 460 - 2003
- [c7]Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas:
A business process-driven approach to security engineering. DEXA Workshops 2003: 477-481 - [c6]Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Parameter-Confidentiality. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 383-394 - [c5]Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the Security of Fair Non-repudiation Protocols. ISC 2003: 193-207 - 2002
- [c4]Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. DEXA Workshops 2002: 473-482 - [c3]Sigrid Gürgens, Carsten Rudolph:
Security Analysis of (Un-) Fair Non-repudiation Protocols. FASec 2002: 97-114 - [c2]Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Authenticity and Provability - A Formal Framework. InfraSec 2002: 227-245
1990 – 1999
- 1998
- [b2]Carsten Rudolph:
Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik. GMD research series 13/1998, GMD 1998, ISBN 978-3-88457-333-4, pp. 1-49 - [c1]Carsten Rudolph:
A Formal Model for Systematic Design of Key Establishment Protocols. ACISP 1998: 332-343 - 1991
- [b1]Carsten Rudolph:
Ein wissensbasierter Ansatz zur Konfigurierung rechnergestützter Messsysteme. Technical University of Berlin, Germany, 1991, pp. 1-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint