dblp.uni-trier.dewww.uni-trier.de

Rolf Oppliger

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
37 Rolf Oppliger, Jörg Schwenk, Christoph Löhr: CAPTCHA-based Code Voting. Electronic Voting 2008: 223-222
36 Rolf Oppliger, Jörg Schwenk, Jörg Helbach: Protecting Code Voting Against Vote Selling. Sicherheit 2008: 193-204
35EERolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS session-aware user authentication revisited. Computers & Security 27(3-4): 64-70 (2008)
34EERolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS Session-Aware User Authentication. IEEE Computer 41(3): 59-65 (2008)
33EERolf Oppliger, Ralf Hauser: Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. Security and Communication Networks 1(2): 125-134 (2008)
2007
32EERolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser: A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). KiVS 2007: 225-236
31EEGünther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2
30EERolf Oppliger: IT security: in search of the Holy Grail. Commun. ACM 50(2): 96-98 (2007)
2006
29EERolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Computer Communications 29(12): 2238-2246 (2006)
2005
28EERolf Oppliger, Sebastian Gajek: Effective Protection Against Phishing and Web Spoofing. Communications and Multimedia Security 2005: 32-41
27EEJavier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143
26EERolf Oppliger: Privacy-enhancing technologies for the world wide web. Computer Communications 28(16): 1791-1797 (2005)
25EERolf Oppliger, Ruedi Rytz: Does Trusted Computing Remedy Computer Security Problems? IEEE Security & Privacy 3(2): 16-19 (2005)
2004
24EERolf Oppliger: Certified mail: the next challenge for secure messaging. Commun. ACM 47(8): 75-79 (2004)
23EERolf Oppliger, Peter Stadlin: A certified mail system (CMS) for the Internet. Computer Communications 27(13): 1229-123 (2004)
22EEJavier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004)
2003
21EERolf Oppliger: Microsoft .NET Passport: A Security Analysis. IEEE Computer 36(7): 29-35 (2003)
20EERolf Oppliger, Ruedi Rytz: Digital Evidence: Dream and Reality. IEEE Security & Privacy 1(5): 44-48 (2003)
2000
19EEMadjid Merabti, Qi Shi, Rolf Oppliger: Advanced security techniques for network protection. Computer Communications 23(17): 1581-1583 (2000)
18EERolf Oppliger: Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla. Computer Communications 23(4): 429- (2000)
17EERolf Oppliger: Privacy protection and anonymity services for the World Wide Web (WWW). Future Generation Comp. Syst. 16(4): 379-391 (2000)
1999
16EERolf Oppliger, Andreas Greulich, Peter Trachsel: A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. ACSAC 1999: 241-248
15 Rolf Oppliger: Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. Communications and Multimedia Security 1999: 163-175
14EERolf Oppliger: Shaping the Research Agenda for Security in E-Commerce. DEXA Workshop 1999: 810-814
13EERolf Oppliger: Authorization Methods for E-Commerce Applications. SRDS 1999: 366-371
12EERolf Oppliger: Security issues related to mobile code and agent-based systems. Computer Communications 22(12): 1165-1170 (1999)
11EERolf Oppliger: D. B. Parker: Fighting computer crimes: a new framework for protecting information. Computer Communications 22(5): 491-492 (1999)
1998
10 Rolf Oppliger: Security at the Internet Layer. IEEE Computer 31(9): 43-47 (1998)
1997
9 Rolf Oppliger, Jean-Luc Nottaris: Online Casinos. Kommunikation in Verteilten Systemen 1997: 2-16
8 Rolf Oppliger: Internet Security: Firewalls and Beyond. Commun. ACM 40(5): 92-102 (1997)
1996
7 Rolf Oppliger, Martin Bracher: Distributed Registration and Key Distribution for Online Universities. Communications and Multimedia Security 1996: 166-175
6 Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati: A Security Architecture for Tenet Scheme 2. IDMS 1996: 163-174
5 Rolf Oppliger, Andres Albanese: Distributed registration and key distribution (DiRK). SEC 1996: 199-208
4EERolf Oppliger, Andres Albanese: Distance education and on-line universities. WETICE 1996: 10-15
1995
3 Rolf Oppliger: Authentifikations- und Schlüsselverteilsysteme. GI Jahrestagung 1995: 266-273
2 Rolf Oppliger: Internet Security Enters the Middle Ages. IEEE Computer 28(10): 100-101 (1995)
1993
1 Rolf Oppliger, Stephan Weber, Dieter Hogrefe: Entwurf von virtuell privaten Netzen. Kommunikation in Verteilten Systemen 1993: 428-441

Coauthor Index

1Andres Albanese [4] [5]
2David A. Basin [29] [32] [34] [35]
3Riccardo Bettati [6]
4Martin Bracher [7]
5Eduardo B. Fernández [31]
6Sebastian Gajek [28]
7Andreas Greulich [16]
8Amit Gupta [6]
9Ralf Hauser [29] [32] [33] [34] [35]
10Jörg Helbach [36]
11Dieter Hogrefe [1]
12Bruno Kaiser [32]
13Sokratis K. Katsikas [31]
14Alfred Kobsa [31]
15Christoph Löhr [37]
16Javier Lopez [22] [27]
17Madjid Merabti [19]
18Marco Casassa Mont [31]
19Mark Moran [6]
20Jean-Luc Nottaris [9]
21Günther Pernul [22] [27] [31]
22Aldo Rodenhaeuser [32]
23Ruedi Rytz [20] [25]
24Jörg Schwenk [36] [37]
25Qi Shi [19]
26Peter Stadlin [23]
27Peter Trachsel [16]
28Stephan Weber [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)