dblp.uni-trier.dewww.uni-trier.de

Ahmad-Reza Sadeghi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
71EEHans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy: Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407
70EESteffen Schulz, Ahmad-Reza Sadeghi: Secure VPNs for Trusted Computing Environments. TRUST 2009: 197-216
69EEHans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62
2008
68 Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Springer 2008
67 Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings Springer 2008
66EESebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Provably secure browser-based user-aware mutual authentication over TLS. ASIACCS 2008: 300-311
65EEAndy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi: Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. ASIACRYPT 2008: 489-505
64EEChristoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls: Efficient Helper Data Key Extractor on FPGAs. CHES 2008: 181-197
63EECarlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti: Improved Security Notions and Protocols for Non-transferable Identification. ESORICS 2008: 364-378
62EEAhmad-Reza Sadeghi, Thomas Schneider: Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. ICISC 2008: 336-353
61EEAhmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Property-Based TPM Virtualization. ISC 2008: 1-16
60EEEndre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi: A Demonstrative Ad Hoc Attestation System. ISC 2008: 17-30
59EELiqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46
58EEAndré Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan: Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175
57EEFrederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ISPEC 2008: 29-44
56EEAhmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann: User Privacy in Transport Systems Based on RFID E-Tickets. PiLBA 2008
55EESebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk: Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327
54EEAhmad-Reza Sadeghi: Trusted Computing - Special Aspects and Challenges. SOFSEM 2008: 98-117
53EEFrederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi: An efficient implementation of trusted channels based on openssl. STC 2008: 41-50
52EEYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble: Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80
2007
51 Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 ACM 2007
50EESebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127
49EEHans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble: Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384
48EEThomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier: Establishing Chain of Trust in Reconfigurable Hardware. FCCM 2007: 289-290
47EELiqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44
46 Alberto N. Escalante, Hans Löhr, Ahmad-Reza Sadeghi: A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. GI Jahrestagung (2) 2007: 184-188
45EEAhmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg: Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70
44EEAhmad-Reza Sadeghi: The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. IWDW 2007: 2-18
43EEStefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi: Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310
42EEThomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf: Reconfigurable trusted computing in hardware. STC 2007: 15-20
41EEYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan: Beyond secure channels. STC 2007: 30-40
40EEAndré Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. T. Data Hiding and Multimedia Security 2: 1-34 (2007)
2006
39EEAndré Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ACISP 2006: 136-147
38EEKerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi: Physical Security Bounds Against Tampering. ACNS 2006: 253-267
37EEMark Manulis, Ahmad-Reza Sadeghi: Property-Based Taming of Lying Mobile Nodes. AINA (2) 2006: 476-480
36EEAhmad-Reza Sadeghi: Challenges for Trusted Computing. CHES 2006: 414
35EEUlrich Huber, Ahmad-Reza Sadeghi: A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. ISC 2006: 270-285
34EEMark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Linkable Democratic Group Signatures. ISPEC 2006: 187-201
33EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: A Computational Model for Watermark Robustness. Information Hiding 2006: 145-160
32EEAhmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy: TCG inside?: a note on TPM specification compliance. STC 2006: 47-56
31EELiqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16
30EEDario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi: E-Passport: The Global Traceability Or How to Feel Like a UPS Package. WISA 2006: 391-404
29EEAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. T. Data Hiding and Multimedia Security: 73-103 (2006)
2005
28EEUlrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338
27EEAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. Communications and Multimedia Security 2005: 129-139
26EEAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Towards multilateral secure digital rights distribution infrastructures. Digital Rights Management Workshop 2005: 45-54
25EEThomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508
24EELiqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108
23EEAndré Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Property-Based Broadcast Encryption for Multi-level Security Policies. ICISC 2005: 15-31
22EEKerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble: An Open Approach for Designing Secure Electronic Immobilizers. ISPEC 2005: 230-242
21EEAndré Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi: Secure Software Delivery and Installation in Embedded Systems. ISPEC 2005: 255-267
20EEAhmad-Reza Sadeghi, Christian Stüble: Towards Multilateral-Secure DRM Platforms. ISPEC 2005: 326-337
19EEThomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64
18EEAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. Multimedia Syst. 11(2): 143-158 (2005)
2004
17EEAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi: Overcoming the obstacles of zero-knowledge watermark detection. MM&Sec 2004: 46-55
16EEAhmad-Reza Sadeghi, Christian Stüble: Property-based attestation for computing platforms: caring about properties, not mechanisms. NSPW 2004: 67-77
2003
15EEAhmad-Reza Sadeghi, Markus Schneider: Electronic Payment Systems. Digital Rights Management 2003: 113-137
14EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. IWDW 2003: 355-369
13EEAmmar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi: Secure object identification: or: solving the Chess Grandmaster Problem. NSPW 2003: 77-85
12EEAhmad-Reza Sadeghi, Christian Stüble: Taming "Trusted Platforms" by Operating System Design. WISA 2003: 286-302
11 Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble: Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. Datenschutz und Datensicherheit 7(9): (2003)
10EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: Watermark detection with zero-knowledge disclosure. Multimedia Syst. 9(3): 266-278 (2003)
2002
9EEAhmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher: Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427
2001
8EEAhmad-Reza Sadeghi, Michael Steiner: Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. EUROCRYPT 2001: 244-261
7EEAmmar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91
6EEAndré Adelsbach, Ahmad-Reza Sadeghi: Zero-Knowledge Watermark Detection and Proof of Ownership. Information Hiding 2001: 273-288
5EEAhmad-Reza Sadeghi: How to Break a Semi-anonymous Fingerprinting Scheme. Information Hiding 2001: 384-394
2000
4EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414
3EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52
1999
2EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164
1 André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content. Information Hiding 1999: 117-133

Coauthor Index

1André Adelsbach [1] [6] [10] [14] [17] [18] [21] [23] [26] [27] [29] [33] [39] [40]
2Ammar Alkassar [7] [13]
3Frederik Armknecht [53] [57]
4N. Asokan [41] [45] [58]
5Endre Bangerter [60] [65]
6Carlo Blundo [63]
7Christoph Bösch [64]
8Dario Carluccio [30]
9Mehmet Utku Celik [43]
10Liqun Chen [24] [31] [47] [59]
11Alexander W. Dent [65]
12Maksim Djackov [60]
13Thomas Eisenbarth [42] [48]
14Jan-Erik Ekberg [45]
15Matthias Enzmann [24]
16Alberto N. Escalante [46] [47] [57]
17Sebastian Gajek [50] [55] [66]
18Yacine Gasmi [41] [52] [53]
19Alexander Geraldy [7]
20Thomas Groß [19] [25]
21Jorge Guajardo [64]
22Tim Güneysu [42] [48]
23Dirk Günnewig [11]
24Ulrich Huber [21] [23] [35] [39] [40]
25Rani Husseiki [52]
26Stefan Katzenbeisser [10] [14] [33] [43]
27Aggelos Kiayias [51]
28Klaus-Michael Koch [67]
29Ulrich Kühn [28]
30Klaus Kursawe [28]
31Rainer Landfermann [31]
32Gregor Leander [65]
33Kerstin Lemke-Rust (Kerstin Lemke) [22] [30] [38]
34Peter Lipp [67]
35Hans Löhr [31] [46] [47] [49] [57] [59] [69] [71]
36Stefan Lucks [28] [68]
37Mark Manulis [34] [37] [47] [55] [57] [59] [66]
38André Osterhues [58]
39Christof Paar [30] [38] [42] [48]
40Olivier Pereira [55]
41Giuseppe Persiano (Pino Persiano) [63]
42Birgit Pfitzmann [1] [2] [3] [4] [7] [19] [25]
43HariGovind V. Ramasamy [49]
44Gianluca Ramunno [53]
45Markus Rohe [17] [18] [26] [27] [29] [31]
46Andy Rupp [65]
47Dries Schellekens [42]
48Thomas Schneider [62]
49Markus Schneider (Markus Schneider II) [15] [24]
50Stefan Schulz [49]
51Steffen Schulz [70]
52Matthias Schunter [9] [49]
53Jörg Schwenk [34] [55] [66]
54Marcel Selhorst [32]
55Jamshid Shokrollahi [64]
56Boris Skoric [43]
57Sandra Steinbrecher [9]
58Michael Steiner [8] [24]
59Patrick Stewin [41] [52] [53]
60Christian Stüble [11] [12] [13] [16] [20] [22] [28] [31] [32] [45] [49] [50] [52] [58] [61] [69]
61Russell Tessier [48]
62Pim Tuyls [64]
63Martin Unger [41] [52] [53]
64Davide Vernizzi [53]
65Ivan Visconti [56] [63]
66Claire Vishik [71]
67Christian Wachsmann [32] [56]
68Marion Weber [69]
69Marcel Winandy [32] [50] [52] [61] [69] [71]
70Christopher Wolf [68]
71Marko Wolf [42] [45] [48] [58]
72Moti Yung (Mordechai M. Yung) [51]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)