| 2008 |
| 24 | EE | Markus Dunte,
Christoph Ruland:
Delivery Infrastructure for Secure Scalable Coded Multimedia.
ICDCS Workshops 2008: 42-47 |
| 23 | EE | Markus Dunte,
Christoph Ruland:
Realising time limitation for cryptographic keys in secure multimedia distribution.
Security and Communication Networks 1(6): 451-459 (2008) |
| 2007 |
| 22 | EE | Sibylle Hick,
Christoph Ruland:
Security Aspects for Secure Download of Regulated Software.
TrustBus 2007: 219-227 |
| 2006 |
| 21 | EE | Tobias Lohmann,
Matthias Schneider,
Christoph Ruland:
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags.
CARDIS 2006: 278-288 |
| 2005 |
| 20 | EE | Seung Wook Jung,
Christoph Ruland:
Secure Software Smartcard Resilient to Capture.
CIS (2) 2005: 86-95 |
| 19 | EE | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment.
Communications and Multimedia Security 2005: 284-285 |
| 18 | | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland,
Athanasios Karantjias,
Alexandros Kaliontzoglou:
Design Principles and Aspects for Cross-Border Municipal Services Deployment.
EGOV (Workshops and Posters) 2005: 321-327 |
| 17 | EE | Namhi Kang,
Christoph Ruland:
MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions.
ICOIN 2005: 824-834 |
| 16 | | Lars Dietze,
Bernd Holznagel,
Luigi Lo Iacono,
Christoph Ruland:
Qualifizierte Signatur im eletronischeen Messdatenaustausch.
Sicherheit 2005: 335-348 |
| 15 | EE | Nikolaos Oikonomidis,
Sergiu Tcaciuc,
Christoph Ruland:
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.
TrustBus 2005: 141-150 |
| 14 | EE | Namhi Kang,
Christoph Ruland:
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Transactions 88-B(3): 1264-1265 (2005) |
| 2004 |
| 13 | EE | Namhi Kang,
Christoph Ruland:
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows.
TrustBus 2004: 251-260 |
| 12 | EE | Nikolaos Oikonomidis,
Christoph Ruland:
Identity Based Protocols for Secure Electronic Content Distribution and Licensing.
WEDELMUSIC 2004: 92-100 |
| 11 | EE | Kihun Hong,
Souhwan Jung,
Luigi Lo Iacono,
Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications.
WISA 2004: 1-13 |
| 2003 |
| 10 | | Luigi Lo Iacono,
Christoph Ruland:
Vertrauliche Video-Konferenzen im Internet.
DFN-Arbeitstagung über Kommunikationsnetze 2003: 167-181 |
| 2002 |
| 9 | | Andreas Friesen,
Christoph Ruland:
Design eines Profil- und Zertifikatsmanagementsystems für das Service by eContract-Konzept.
GI Jahrestagung 2002: 441-444 |
| 2001 |
| 8 | EE | Oliver Jung,
Sven Kuhn,
Christoph Ruland,
Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
ACISP 2001: 344-359 |
| 7 | | Christoph Ruland,
Niko Schweitzer:
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen.
Datenschutz und Datensicherheit 25(11): (2001) |
| 1999 |
| 6 | EE | Oliver Jung,
Christoph Ruland:
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
CHES 1999: 340-352 |
| 1995 |
| 5 | | Dirk Fox,
T. Henn,
K. Reichel,
Christoph Ruland:
Guarded Authentic Local Area Network GALAN.
VIS 1995: 163- |
| 1989 |
| 4 | EE | Dieter Bong,
Christoph Ruland:
Optimized software implementations of the modular exponentiation on general purpose microprocessors.
Computers & Security 8(7): 621-630 (1989) |
| 1981 |
| 3 | | Christoph Ruland:
Algorithmen zur adaptiven Berechnung der schnellsten Wege in virtuellen Netzen.
Angewandte Informatik 23(11): 492-496 (1981) |
| 2 | | Christoph Ruland:
Was ist ein Virtuelles Netz?
Elektronische Rechenanlagen 23(3): 134-136 (1981) |
| 1 | | Christoph Ruland:
Routing in Virtuellen Netzen.
Elektronische Rechenanlagen 23(4): 164-167 (1981) |