2009 |
71 | EE | Hans Löhr,
Ahmad-Reza Sadeghi,
Claire Vishik,
Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
ISPEC 2009: 396-407 |
70 | EE | Steffen Schulz,
Ahmad-Reza Sadeghi:
Secure VPNs for Trusted Computing Environments.
TRUST 2009: 197-216 |
69 | EE | Hans Löhr,
Ahmad-Reza Sadeghi,
Christian Stüble,
Marion Weber,
Marcel Winandy:
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
TRUST 2009: 45-62 |
2008 |
68 | | Stefan Lucks,
Ahmad-Reza Sadeghi,
Christopher Wolf:
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
Springer 2008 |
67 | | Peter Lipp,
Ahmad-Reza Sadeghi,
Klaus-Michael Koch:
Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings
Springer 2008 |
66 | EE | Sebastian Gajek,
Mark Manulis,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS.
ASIACCS 2008: 300-311 |
65 | EE | Andy Rupp,
Gregor Leander,
Endre Bangerter,
Alexander W. Dent,
Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
ASIACRYPT 2008: 489-505 |
64 | EE | Christoph Bösch,
Jorge Guajardo,
Ahmad-Reza Sadeghi,
Jamshid Shokrollahi,
Pim Tuyls:
Efficient Helper Data Key Extractor on FPGAs.
CHES 2008: 181-197 |
63 | EE | Carlo Blundo,
Giuseppe Persiano,
Ahmad-Reza Sadeghi,
Ivan Visconti:
Improved Security Notions and Protocols for Non-transferable Identification.
ESORICS 2008: 364-378 |
62 | EE | Ahmad-Reza Sadeghi,
Thomas Schneider:
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
ICISC 2008: 336-353 |
61 | EE | Ahmad-Reza Sadeghi,
Christian Stüble,
Marcel Winandy:
Property-Based TPM Virtualization.
ISC 2008: 1-16 |
60 | EE | Endre Bangerter,
Maksim Djackov,
Ahmad-Reza Sadeghi:
A Demonstrative Ad Hoc Attestation System.
ISC 2008: 17-30 |
59 | EE | Liqun Chen,
Hans Löhr,
Mark Manulis,
Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party.
ISC 2008: 31-46 |
58 | EE | André Osterhues,
Ahmad-Reza Sadeghi,
Marko Wolf,
Christian Stüble,
N. Asokan:
Securing Peer-to-Peer Distributions for Mobile Devices.
ISPEC 2008: 161-175 |
57 | EE | Frederik Armknecht,
Alberto N. Escalante,
Hans Löhr,
Mark Manulis,
Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
ISPEC 2008: 29-44 |
56 | EE | Ahmad-Reza Sadeghi,
Ivan Visconti,
Christian Wachsmann:
User Privacy in Transport Systems Based on RFID E-Tickets.
PiLBA 2008 |
55 | EE | Sebastian Gajek,
Mark Manulis,
Olivier Pereira,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Universally Composable Security Analysis of TLS.
ProvSec 2008: 313-327 |
54 | EE | Ahmad-Reza Sadeghi:
Trusted Computing - Special Aspects and Challenges.
SOFSEM 2008: 98-117 |
53 | EE | Frederik Armknecht,
Yacine Gasmi,
Ahmad-Reza Sadeghi,
Patrick Stewin,
Martin Unger,
Gianluca Ramunno,
Davide Vernizzi:
An efficient implementation of trusted channels based on openssl.
STC 2008: 41-50 |
52 | EE | Yacine Gasmi,
Ahmad-Reza Sadeghi,
Patrick Stewin,
Martin Unger,
Marcel Winandy,
Rani Husseiki,
Christian Stüble:
Flexible and secure enterprise rights management based on trusted virtual domains.
STC 2008: 71-80 |
2007 |
51 | | Moti Yung,
Aggelos Kiayias,
Ahmad-Reza Sadeghi:
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007
ACM 2007 |
50 | EE | Sebastian Gajek,
Ahmad-Reza Sadeghi,
Christian Stüble,
Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
ARES 2007: 120-127 |
49 | EE | Hans Löhr,
HariGovind V. Ramasamy,
Ahmad-Reza Sadeghi,
Stefan Schulz,
Matthias Schunter,
Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization.
ATC 2007: 372-384 |
48 | EE | Thomas Eisenbarth,
Tim Güneysu,
Christof Paar,
Ahmad-Reza Sadeghi,
Marko Wolf,
Russell Tessier:
Establishing Chain of Trust in Reconfigurable Hardware.
FCCM 2007: 289-290 |
47 | EE | Liqun Chen,
Alberto N. Escalante,
Hans Löhr,
Mark Manulis,
Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Financial Cryptography 2007: 29-44 |
46 | | Alberto N. Escalante,
Hans Löhr,
Ahmad-Reza Sadeghi:
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme.
GI Jahrestagung (2) 2007: 184-188 |
45 | EE | Ahmad-Reza Sadeghi,
Marko Wolf,
Christian Stüble,
N. Asokan,
Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing.
ISC 2007: 53-70 |
44 | EE | Ahmad-Reza Sadeghi:
The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.
IWDW 2007: 2-18 |
43 | EE | Stefan Katzenbeisser,
Boris Skoric,
Mehmet Utku Celik,
Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting.
Information Hiding 2007: 294-310 |
42 | EE | Thomas Eisenbarth,
Tim Güneysu,
Christof Paar,
Ahmad-Reza Sadeghi,
Dries Schellekens,
Marko Wolf:
Reconfigurable trusted computing in hardware.
STC 2007: 15-20 |
41 | EE | Yacine Gasmi,
Ahmad-Reza Sadeghi,
Patrick Stewin,
Martin Unger,
N. Asokan:
Beyond secure channels.
STC 2007: 30-40 |
40 | EE | André Adelsbach,
Ulrich Huber,
Ahmad-Reza Sadeghi:
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
T. Data Hiding and Multimedia Security 2: 1-34 (2007) |
2006 |
39 | EE | André Adelsbach,
Ulrich Huber,
Ahmad-Reza Sadeghi:
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
ACISP 2006: 136-147 |
38 | EE | Kerstin Lemke,
Christof Paar,
Ahmad-Reza Sadeghi:
Physical Security Bounds Against Tampering.
ACNS 2006: 253-267 |
37 | EE | Mark Manulis,
Ahmad-Reza Sadeghi:
Property-Based Taming of Lying Mobile Nodes.
AINA (2) 2006: 476-480 |
36 | EE | Ahmad-Reza Sadeghi:
Challenges for Trusted Computing.
CHES 2006: 414 |
35 | EE | Ulrich Huber,
Ahmad-Reza Sadeghi:
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
ISC 2006: 270-285 |
34 | EE | Mark Manulis,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Linkable Democratic Group Signatures.
ISPEC 2006: 187-201 |
33 | EE | André Adelsbach,
Stefan Katzenbeisser,
Ahmad-Reza Sadeghi:
A Computational Model for Watermark Robustness.
Information Hiding 2006: 145-160 |
32 | EE | Ahmad-Reza Sadeghi,
Marcel Selhorst,
Christian Stüble,
Christian Wachsmann,
Marcel Winandy:
TCG inside?: a note on TPM specification compliance.
STC 2006: 47-56 |
31 | EE | Liqun Chen,
Rainer Landfermann,
Hans Löhr,
Markus Rohe,
Ahmad-Reza Sadeghi,
Christian Stüble:
A protocol for property-based attestation.
STC 2006: 7-16 |
30 | EE | Dario Carluccio,
Kerstin Lemke-Rust,
Christof Paar,
Ahmad-Reza Sadeghi:
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
WISA 2006: 391-404 |
29 | EE | André Adelsbach,
Markus Rohe,
Ahmad-Reza Sadeghi:
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
T. Data Hiding and Multimedia Security: 73-103 (2006) |
2005 |
28 | EE | Ulrich Kühn,
Klaus Kursawe,
Stefan Lucks,
Ahmad-Reza Sadeghi,
Christian Stüble:
Secure Data Management in Trusted Computing.
CHES 2005: 324-338 |
27 | EE | André Adelsbach,
Markus Rohe,
Ahmad-Reza Sadeghi:
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Communications and Multimedia Security 2005: 129-139 |
26 | EE | André Adelsbach,
Markus Rohe,
Ahmad-Reza Sadeghi:
Towards multilateral secure digital rights distribution infrastructures.
Digital Rights Management Workshop 2005: 45-54 |
25 | EE | Thomas Groß,
Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols.
ESORICS 2005: 489-508 |
24 | EE | Liqun Chen,
Matthias Enzmann,
Ahmad-Reza Sadeghi,
Markus Schneider,
Michael Steiner:
A Privacy-Protecting Coupon System.
Financial Cryptography 2005: 93-108 |
23 | EE | André Adelsbach,
Ulrich Huber,
Ahmad-Reza Sadeghi:
Property-Based Broadcast Encryption for Multi-level Security Policies.
ICISC 2005: 15-31 |
22 | EE | Kerstin Lemke,
Ahmad-Reza Sadeghi,
Christian Stüble:
An Open Approach for Designing Secure Electronic Immobilizers.
ISPEC 2005: 230-242 |
21 | EE | André Adelsbach,
Ulrich Huber,
Ahmad-Reza Sadeghi:
Secure Software Delivery and Installation in Embedded Systems.
ISPEC 2005: 255-267 |
20 | EE | Ahmad-Reza Sadeghi,
Christian Stüble:
Towards Multilateral-Secure DRM Platforms.
ISPEC 2005: 326-337 |
19 | EE | Thomas Groß,
Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Proving a WS-federation passive requestor profile with a browser model.
SWS 2005: 54-64 |
18 | EE | André Adelsbach,
Markus Rohe,
Ahmad-Reza Sadeghi:
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it.
Multimedia Syst. 11(2): 143-158 (2005) |
2004 |
17 | EE | André Adelsbach,
Markus Rohe,
Ahmad-Reza Sadeghi:
Overcoming the obstacles of zero-knowledge watermark detection.
MM&Sec 2004: 46-55 |
16 | EE | Ahmad-Reza Sadeghi,
Christian Stüble:
Property-based attestation for computing platforms: caring about properties, not mechanisms.
NSPW 2004: 67-77 |
2003 |
15 | EE | Ahmad-Reza Sadeghi,
Markus Schneider:
Electronic Payment Systems.
Digital Rights Management 2003: 113-137 |
14 | EE | André Adelsbach,
Stefan Katzenbeisser,
Ahmad-Reza Sadeghi:
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.
IWDW 2003: 355-369 |
13 | EE | Ammar Alkassar,
Christian Stüble,
Ahmad-Reza Sadeghi:
Secure object identification: or: solving the Chess Grandmaster Problem.
NSPW 2003: 77-85 |
12 | EE | Ahmad-Reza Sadeghi,
Christian Stüble:
Taming "Trusted Platforms" by Operating System Design.
WISA 2003: 286-302 |
11 | | Dirk Günnewig,
Ahmad-Reza Sadeghi,
Christian Stüble:
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Datenschutz und Datensicherheit 7(9): (2003) |
10 | EE | André Adelsbach,
Stefan Katzenbeisser,
Ahmad-Reza Sadeghi:
Watermark detection with zero-knowledge disclosure.
Multimedia Syst. 9(3): 266-278 (2003) |
2002 |
9 | EE | Ahmad-Reza Sadeghi,
Matthias Schunter,
Sandra Steinbrecher:
Private Auctions with Multiple Rounds and Multiple Items.
DEXA Workshops 2002: 423-427 |
2001 |
8 | EE | Ahmad-Reza Sadeghi,
Michael Steiner:
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
EUROCRYPT 2001: 244-261 |
7 | EE | Ammar Alkassar,
Alexander Geraldy,
Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Optimized Self-Synchronizing Mode of Operation.
FSE 2001: 78-91 |
6 | EE | André Adelsbach,
Ahmad-Reza Sadeghi:
Zero-Knowledge Watermark Detection and Proof of Ownership.
Information Hiding 2001: 273-288 |
5 | EE | Ahmad-Reza Sadeghi:
How to Break a Semi-anonymous Fingerprinting Scheme.
Information Hiding 2001: 384-394 |
2000 |
4 | EE | Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Anonymous Fingerprinting with Direct Non-repudiation.
ASIACRYPT 2000: 401-414 |
3 | EE | Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Self-Escrowed Cash against User Blackmailing.
Financial Cryptography 2000: 42-52 |
1999 |
2 | EE | Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Coin-Based Anonymous Fingerprinting.
EUROCRYPT 1999: 150-164 |
1 | | André Adelsbach,
Birgit Pfitzmann,
Ahmad-Reza Sadeghi:
Proving Ownership of Digital Content.
Information Hiding 1999: 117-133 |