Christoph Ruland

Affiliations:
  • University of Siegen, Germany


According to our database1, Christoph Ruland authored at least 62 papers between 1981 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards a Zero-Day Anomaly Detector in Cyber Physical Systems Using a Hybrid VAE-LSTM-OCSVM Model.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2022
A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform.
Future Internet, 2022

The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2022

2021
Security aspects of FPGA and virtualization case studies.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

2020
MAC-layer Security for Time-Sensitive Switched Ethernet Networks.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

2019
Distributed Ledger Technologies for M2M Communications.
Proceedings of the 33rd International Conference on Information Networking, 2019

2018
An Improved Authenticated Compressive Sensing Imaging.
Proceedings of the 12th IEEE International Conference on Semantic Computing, 2018

An Authenticated Encrypted Compressive Sensing based Imaging Mechanism.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Overview of Authentication and Access Controls for I&C systems.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

Cognition for enhanced biometrie authentication.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Smart grid security - an overview of standards and guidelines.
Elektrotech. Informationstechnik, 2017

Compression-Oriented quantization improvement of compressive sensing based imaging.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

A redundancy based compressive sensing recovery optimization.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Authenticated compressive sensing imaging.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Iterative algorithm for OFDM transmission over Rayleigh channels.
Proceedings of the 2017 International Conference on Information Networking, 2017

QoSs definition and session description protocol for secure communication using compressive sensing.
Proceedings of the Sixth International Conference on Future Generation Communication Technologies, 2017

Embedding cryptographically secure matrix transformation in structured Compressive Sensing.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Rejuvenation of the IEC 61850 protocol stack for MMS.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Compressive Sensing encryption modes and their security.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Content based image authentication with error correction.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure and Robust Two-Phase Image Authentication.
IEEE Trans. Multim., 2015

Non-repudiation Services for the MMS Protocol of IEC 61850.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
A Hybrid Approach for Content Based Image Authentication.
Proceedings of the SECRYPT 2014, 2014

Content based image authentication using HOG feature descriptor.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A bit-error based capture model for EPCglobal RFID systems.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
A survey of image hashing technique for data authentication in WMSNs.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Retransmission strategies for RFID systems using the EPC protocol.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

The analysis of an NMF-based perceptual image hashing scheme.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

2012
On the Security of the Non-Repudiation of Forwarding Service.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients.
Proceedings of the SECRYPT 2012, 2012

2011
Das Institut für digitale Kommunikationssysteme der Universität Siegen.
Prax. Inf.verarb. Kommun., 2011

Error Correcting and Weighted Noise Tolerant Message Authentication Codes.
Proceedings of the 5th International Conference on Signal Processing and Communication Systems, 2011

2010
Security Architecture of Smart Metering Systems.
Proceedings of the Software Services for e-World, 2010

2008
Realising time limitation for cryptographic keys in secure multimedia distribution.
Secur. Commun. Networks, 2008

Delivery Infrastructure for Secure Scalable Coded Multimedia.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
Security Aspects for Secure Download of Regulated Software.
Proceedings of the Trust, 2007

2006
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt.
Datenschutz und Datensicherheit, 2006

Secure transfer of measurement data in open systems.
Comput. Stand. Interfaces, 2006

Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Trans. Commun., 2005

Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.
Proceedings of the Trust, 2005

Qualifizierte Signatur im eletronischeen Messdatenaustausch.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions.
Proceedings of the Information Networking, 2005

Design Principles and Aspects for Cross-Border Municipal Services Deployment.
Proceedings of the Electronic Government, 2005

An Architecture for Secure Policy Enforcement in E-Government Services Deployment.
Proceedings of the Communications and Multimedia Security, 2005

Secure Software Smartcard Resilient to Capture.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Impacts of Security Protocols on Real-Time Multimedia Communications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Identity Based Protocols for Secure Electronic Content Distribution and Licensing.
Proceedings of the 4th International Conference on WEB Delivering of Music (WEDELMUSIC 2004), 2004

DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Scheduler based flow control under QoS aspects in GPRS/EDGE networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2003
Vertrauliche Video-Konferenzen im Internet.
Proceedings of the Security, 2003

2002
Design eines Profil- und Zertifikatsmanagementsystems für das Service by eContract-Konzept.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002

2001
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen.
Datenschutz und Datensicherheit, 2001

Suitability of cryptographic modes of operation for the encryption in high-speed networks.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1999
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1995
Guarded Authentic Local Area Network GALAN.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995

1993
Realizing Digital Signatures with One-Way Hash Functions.
Cryptologia, 1993

1989
Optimized software implementations of the modular exponentiation on general purpose microprocessors.
Comput. Secur., 1989

1981
Algorithmen zur adaptiven Berechnung der schnellsten Wege in virtuellen Netzen.
Angew. Inform., 1981

Routing in Virtuellen Netzen.
Elektron. Rechenanlagen, 1981

Was ist ein Virtuelles Netz?
Elektron. Rechenanlagen, 1981


  Loading...