Christian Gehrmann

Orcid: 0000-0001-8003-200X

According to our database1, Christian Gehrmann authored at least 59 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection.
CoRR, 2024

Regaining Dominance in CIDER and Lazarus.
IEEE Access, 2024

AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024

2023
Access Security Policy Generation for Containers as a Cloud Service.
SN Comput. Sci., November, 2023

Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Attacks Against Mobility Prediction in 5G Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Insight of Anomaly Detection with NWDAF in 5G.
Proceedings of the International Conference on Computer, 2022

RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022

2021
Lic-Sec: An enhanced AppArmor Docker security profile generator.
J. Inf. Secur. Appl., 2021

A decentralized dynamic PKI based on blockchain.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

X-Pro: Distributed XDP Proxies Against Botnets of Things.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Prototyping intrusion detection in an industrial cloud-native digital twin.
Proceedings of the 22nd IEEE International Conference on Industrial Technology, 2021

AppArmor Profile Generator as a Cloud Service.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020
A Digital Twin Based Industrial Automation and Control System Security Architecture.
IEEE Trans. Ind. Informatics, 2020

CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

Secure Ownership Transfer for Resource Constrained IoT Infrastructures.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Secure Ownership Transfer for the Internet of Things.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Metadata filtering for user-friendly centralized biometric authentication.
EURASIP J. Inf. Secur., 2019

SDN Access Control for the Masses.
Comput. Secur., 2019

An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Practical Attacks on Relational Databases Protected via Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Providing User Security Guarantees in Public Infrastructure Clouds.
IEEE Trans. Cloud Comput., 2017

Bootstrapping trust in software defined networks.
EAI Endorsed Trans. Security Safety, 2017

On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
Int. J. Inf. Sec., 2017

Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases.
IACR Cryptol. ePrint Arch., 2017

Searchable Encrypted Relational Databases: Risks and Countermeasures.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Robust and Scalable DTLS Session Establishment.
ERCIM News, 2016

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2016

Threats to 5G Group-based Authentication.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Secure Group-Based AKA Protocol for Machine-Type Communications.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

A high assurance virtualization platform for ARMv8.
Proceedings of the European Conference on Networks and Communications, 2016

IoT Protection through Device to Cloud Synchronization.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Executing Boolean Queries on an Encrypted Bitmap Index.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies.
J. Inf. Secur. Appl., 2015

Towards Secure Multi-tenant Virtualized Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

SMACK: Short message authentication check against battery exhaustion in the Internet of Things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

2014
Avoiding weak parameters in secret image sharing.
Proceedings of the 2014 IEEE Visual Communications and Image Processing Conference, 2014

Trusted Geolocation-Aware Data Placement in Infrastructure Clouds.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Security aspects of e-Health systems migration to the cloud.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

Domain based storage protection with secure access control for the cloud.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
Authorization framework for the Internet-of-Things.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

2012
Security and Trust Preserving VM Migrations in Public Clouds.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure mobile social networks using USIM in a closed environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Trusted Launch of Virtual Machine Instances in Public IaaS Environments.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Securing DMA through virtualization.
Proceedings of the Complexity in Engineering, 2012

Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Are there good reasons for protecting mobile phones with hypervisors?
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2000
Securing ad hoc services, a Jini view: extended abstract.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

1998
Multiround Unconditionally Secure Authentication.
Des. Codes Cryptogr., 1998

Unconditionally Secure Group Authentication.
Des. Codes Cryptogr., 1998

1997
Fast Message Authentication Using Efficient Polynomial Evaluation.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1995
Secure Multiround Authentication Protocols.
Proceedings of the Advances in Cryptology, 1995

1994
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol.
Proceedings of the Advances in Cryptology, 1994


  Loading...