2009 | ||
---|---|---|
71 | EE | Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy: Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407 |
70 | EE | Steffen Schulz, Ahmad-Reza Sadeghi: Secure VPNs for Trusted Computing Environments. TRUST 2009: 197-216 |
69 | EE | Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62 |
2008 | ||
68 | Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Springer 2008 | |
67 | Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings Springer 2008 | |
66 | EE | Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Provably secure browser-based user-aware mutual authentication over TLS. ASIACCS 2008: 300-311 |
65 | EE | Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi: Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. ASIACRYPT 2008: 489-505 |
64 | EE | Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls: Efficient Helper Data Key Extractor on FPGAs. CHES 2008: 181-197 |
63 | EE | Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti: Improved Security Notions and Protocols for Non-transferable Identification. ESORICS 2008: 364-378 |
62 | EE | Ahmad-Reza Sadeghi, Thomas Schneider: Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. ICISC 2008: 336-353 |
61 | EE | Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Property-Based TPM Virtualization. ISC 2008: 1-16 |
60 | EE | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi: A Demonstrative Ad Hoc Attestation System. ISC 2008: 17-30 |
59 | EE | Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 |
58 | EE | André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan: Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175 |
57 | EE | Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ISPEC 2008: 29-44 |
56 | EE | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann: User Privacy in Transport Systems Based on RFID E-Tickets. PiLBA 2008 |
55 | EE | Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk: Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 |
54 | EE | Ahmad-Reza Sadeghi: Trusted Computing - Special Aspects and Challenges. SOFSEM 2008: 98-117 |
53 | EE | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi: An efficient implementation of trusted channels based on openssl. STC 2008: 41-50 |
52 | EE | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble: Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80 |
2007 | ||
51 | Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 ACM 2007 | |
50 | EE | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127 |
49 | EE | Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble: Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 |
48 | EE | Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier: Establishing Chain of Trust in Reconfigurable Hardware. FCCM 2007: 289-290 |
47 | EE | Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 |
46 | Alberto N. Escalante, Hans Löhr, Ahmad-Reza Sadeghi: A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. GI Jahrestagung (2) 2007: 184-188 | |
45 | EE | Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg: Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70 |
44 | EE | Ahmad-Reza Sadeghi: The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. IWDW 2007: 2-18 |
43 | EE | Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi: Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 |
42 | EE | Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf: Reconfigurable trusted computing in hardware. STC 2007: 15-20 |
41 | EE | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan: Beyond secure channels. STC 2007: 30-40 |
40 | EE | André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. T. Data Hiding and Multimedia Security 2: 1-34 (2007) |
2006 | ||
39 | EE | André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ACISP 2006: 136-147 |
38 | EE | Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi: Physical Security Bounds Against Tampering. ACNS 2006: 253-267 |
37 | EE | Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Taming of Lying Mobile Nodes. AINA (2) 2006: 476-480 |
36 | EE | Ahmad-Reza Sadeghi: Challenges for Trusted Computing. CHES 2006: 414 |
35 | EE | Ulrich Huber, Ahmad-Reza Sadeghi: A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. ISC 2006: 270-285 |
34 | EE | Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Linkable Democratic Group Signatures. ISPEC 2006: 187-201 |
33 | EE | André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: A Computational Model for Watermark Robustness. Information Hiding 2006: 145-160 |
32 | EE | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy: TCG inside?: a note on TPM specification compliance. STC 2006: 47-56 |
31 | EE | Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16 |
30 | EE | Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi: E-Passport: The Global Traceability Or How to Feel Like a UPS Package. WISA 2006: 391-404 |
29 | EE | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. T. Data Hiding and Multimedia Security: 73-103 (2006) |
2005 | ||
28 | EE | Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338 |
27 | EE | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. Communications and Multimedia Security 2005: 129-139 |
26 | EE | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Towards multilateral secure digital rights distribution infrastructures. Digital Rights Management Workshop 2005: 45-54 |
25 | EE | Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508 |
24 | EE | Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 |
23 | EE | André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Property-Based Broadcast Encryption for Multi-level Security Policies. ICISC 2005: 15-31 |
22 | EE | Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble: An Open Approach for Designing Secure Electronic Immobilizers. ISPEC 2005: 230-242 |
21 | EE | André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Secure Software Delivery and Installation in Embedded Systems. ISPEC 2005: 255-267 |
20 | EE | Ahmad-Reza Sadeghi, Christian Stüble: Towards Multilateral-Secure DRM Platforms. ISPEC 2005: 326-337 |
19 | EE | Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64 |
18 | EE | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. Multimedia Syst. 11(2): 143-158 (2005) |
2004 | ||
17 | EE | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Overcoming the obstacles of zero-knowledge watermark detection. MM&Sec 2004: 46-55 |
16 | EE | Ahmad-Reza Sadeghi, Christian Stüble: Property-based attestation for computing platforms: caring about properties, not mechanisms. NSPW 2004: 67-77 |
2003 | ||
15 | EE | Ahmad-Reza Sadeghi, Markus Schneider: Electronic Payment Systems. Digital Rights Management 2003: 113-137 |
14 | EE | André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. IWDW 2003: 355-369 |
13 | EE | Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi: Secure object identification: or: solving the Chess Grandmaster Problem. NSPW 2003: 77-85 |
12 | EE | Ahmad-Reza Sadeghi, Christian Stüble: Taming "Trusted Platforms" by Operating System Design. WISA 2003: 286-302 |
11 | Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble: Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. Datenschutz und Datensicherheit 7(9): (2003) | |
10 | EE | André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: Watermark detection with zero-knowledge disclosure. Multimedia Syst. 9(3): 266-278 (2003) |
2002 | ||
9 | EE | Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher: Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427 |
2001 | ||
8 | EE | Ahmad-Reza Sadeghi, Michael Steiner: Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. EUROCRYPT 2001: 244-261 |
7 | EE | Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91 |
6 | EE | André Adelsbach, Ahmad-Reza Sadeghi: Zero-Knowledge Watermark Detection and Proof of Ownership. Information Hiding 2001: 273-288 |
5 | EE | Ahmad-Reza Sadeghi: How to Break a Semi-anonymous Fingerprinting Scheme. Information Hiding 2001: 384-394 |
2000 | ||
4 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414 |
3 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52 |
1999 | ||
2 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164 |
1 | André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content. Information Hiding 1999: 117-133 |