Christoph Ruland
Affiliations:- University of Siegen, Germany
According to our database1,
Christoph Ruland
authored at least 62 papers
between 1981 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Towards a Zero-Day Anomaly Detector in Cyber Physical Systems Using a Hybrid VAE-LSTM-OCSVM Model.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2022
A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform.
Future Internet, 2022
The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2022
2021
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021
2020
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020
2019
Proceedings of the 33rd International Conference on Information Networking, 2019
2018
Proceedings of the 12th IEEE International Conference on Semantic Computing, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
2017
Elektrotech. Informationstechnik, 2017
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
QoSs definition and session description protocol for secure communication using compressive sensing.
Proceedings of the Sixth International Conference on Future Generation Communication Technologies, 2017
Embedding cryptographically secure matrix transformation in structured Compressive Sensing.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
2016
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013
2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients.
Proceedings of the SECRYPT 2012, 2012
2011
Prax. Inf.verarb. Kommun., 2011
Proceedings of the 5th International Conference on Signal Processing and Communication Systems, 2011
2010
Proceedings of the Software Services for e-World, 2010
2008
Secur. Commun. Networks, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
2007
Proceedings of the Trust, 2007
2006
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt.
Datenschutz und Datensicherheit, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Trans. Commun., 2005
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.
Proceedings of the Trust, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Information Networking, 2005
Design Principles and Aspects for Cross-Border Municipal Services Deployment.
Proceedings of the Electronic Government, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the 4th International Conference on WEB Delivering of Music (WEDELMUSIC 2004), 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
2003
2002
Design eines Profil- und Zertifikatsmanagementsystems für das Service by eContract-Konzept.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002
2001
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen.
Datenschutz und Datensicherheit, 2001
Suitability of cryptographic modes of operation for the encryption in high-speed networks.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1995
Guarded Authentic Local Area Network GALAN.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
1993
1989
Optimized software implementations of the modular exponentiation on general purpose microprocessors.
Comput. Secur., 1989
1981
Algorithmen zur adaptiven Berechnung der schnellsten Wege in virtuellen Netzen.
Angew. Inform., 1981