2008 |
24 | EE | Markus Dunte,
Christoph Ruland:
Delivery Infrastructure for Secure Scalable Coded Multimedia.
ICDCS Workshops 2008: 42-47 |
23 | EE | Markus Dunte,
Christoph Ruland:
Realising time limitation for cryptographic keys in secure multimedia distribution.
Security and Communication Networks 1(6): 451-459 (2008) |
2007 |
22 | EE | Sibylle Hick,
Christoph Ruland:
Security Aspects for Secure Download of Regulated Software.
TrustBus 2007: 219-227 |
2006 |
21 | EE | Tobias Lohmann,
Matthias Schneider,
Christoph Ruland:
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags.
CARDIS 2006: 278-288 |
2005 |
20 | EE | Seung Wook Jung,
Christoph Ruland:
Secure Software Smartcard Resilient to Capture.
CIS (2) 2005: 86-95 |
19 | EE | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment.
Communications and Multimedia Security 2005: 284-285 |
18 | | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland,
Athanasios Karantjias,
Alexandros Kaliontzoglou:
Design Principles and Aspects for Cross-Border Municipal Services Deployment.
EGOV (Workshops and Posters) 2005: 321-327 |
17 | EE | Namhi Kang,
Christoph Ruland:
MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions.
ICOIN 2005: 824-834 |
16 | | Lars Dietze,
Bernd Holznagel,
Luigi Lo Iacono,
Christoph Ruland:
Qualifizierte Signatur im eletronischeen Messdatenaustausch.
Sicherheit 2005: 335-348 |
15 | EE | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland:
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.
TrustBus 2005: 141-150 |
14 | EE | Namhi Kang,
Christoph Ruland:
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Transactions 88-B(3): 1264-1265 (2005) |
2004 |
13 | EE | Namhi Kang,
Christoph Ruland:
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows.
TrustBus 2004: 251-260 |
12 | EE | Nikolaos Oikonomidis,
Christoph Ruland:
Identity Based Protocols for Secure Electronic Content Distribution and Licensing.
WEDELMUSIC 2004: 92-100 |
11 | EE | Kihun Hong,
Souhwan Jung,
Luigi Lo Iacono,
Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications.
WISA 2004: 1-13 |
2003 |
10 | | Luigi Lo Iacono,
Christoph Ruland:
Vertrauliche Video-Konferenzen im Internet.
DFN-Arbeitstagung über Kommunikationsnetze 2003: 167-181 |
2002 |
9 | | Andreas Friesen,
Christoph Ruland:
Design eines Profil- und Zertifikatsmanagementsystems für das Service by eContract-Konzept.
GI Jahrestagung 2002: 441-444 |
2001 |
8 | EE | Oliver Jung,
Sven Kuhn,
Christoph Ruland,
Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
ACISP 2001: 344-359 |
7 | | Christoph Ruland,
Niko Schweitzer:
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen.
Datenschutz und Datensicherheit 25(11): (2001) |
1999 |
6 | EE | Oliver Jung,
Christoph Ruland:
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
CHES 1999: 340-352 |
1995 |
5 | | Dirk Fox,
T. Henn,
K. Reichel,
Christoph Ruland:
Guarded Authentic Local Area Network GALAN.
VIS 1995: 163- |
1989 |
4 | EE | Dieter Bong,
Christoph Ruland:
Optimized software implementations of the modular exponentiation on general purpose microprocessors.
Computers & Security 8(7): 621-630 (1989) |
1981 |
3 | | Christoph Ruland:
Algorithmen zur adaptiven Berechnung der schnellsten Wege in virtuellen Netzen.
Angewandte Informatik 23(11): 492-496 (1981) |
2 | | Christoph Ruland:
Was ist ein Virtuelles Netz?
Elektronische Rechenanlagen 23(3): 134-136 (1981) |
1 | | Christoph Ruland:
Routing in Virtuellen Netzen.
Elektronische Rechenanlagen 23(4): 164-167 (1981) |