Rolf Oppliger

Orcid: 0000-0003-2632-0750

According to our database1, Rolf Oppliger authored at least 59 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Why Probabilities Cannot Be Used in Cyber Risk Management.
Computer, October, 2024

How to Measure Cybersecurity and Why Heuristics Matter.
Computer, February, 2024

2023
How to Manage Cyber Risks: Lessons Learned From Medical Science.
Computer, 2023

2017
Disillusioning Alice and Bob.
IEEE Secur. Priv., 2017

New Frontiers: Assessing and Managing Security Risks.
Computer, 2017

2015
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.
IEEE Secur. Priv., 2015

2014
Certification Authorities Under Attack: A Plea for Certificate Legitimation.
IEEE Internet Comput., 2014

2012
Common Misconceptions in Computer and Information Security.
Computer, 2012

2011
Security and Privacy in an Online World.
Computer, 2011

2009
Internet Banking: Client-Side Attacks and Protection Mechanisms.
Computer, 2009

2008
Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks.
Secur. Commun. Networks, 2008

SSL/TLS Session-Aware User Authentication.
Computer, 2008

SSL/TLS session-aware user authentication revisited.
Comput. Secur., 2008

Protecting Code Voting Against Vote Selling.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

CAPTCHA-based Code Voting.
Proceedings of the 3rd International Conference, 2008

2007
Providing Certified Mail Services on the Internet.
IEEE Secur. Priv., 2007

IT security: in search of the Holy Grail.
Commun. ACM, 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

2006
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
Comput. Commun., 2006

2005
Why have public key infrastructures failed so far?
Internet Res., 2005

Does Trusted Computing Remedy Computer Security Problems?
IEEE Secur. Priv., 2005

Privacy-enhancing technologies for the world wide web.
Comput. Commun., 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

Effective Protection Against Phishing and Web Spoofing.
Proceedings of the Communications and Multimedia Security, 2005

Contemporary cryptography.
Artech House computer security series, Artech House, ISBN: 978-1-58053-642-4, 2005

2004
Microsoft .NET Passport and identity management.
Inf. Secur. Tech. Rep., 2004

Authentication and authorization infrastructures (AAIs): a comparative survey.
Comput. Secur., 2004

A certified mail system (CMS) for the Internet.
Comput. Commun., 2004

Certified mail: the next challenge for secure messaging.
Commun. ACM, 2004

2003
Digital Evidence: Dream and Reality.
IEEE Secur. Priv., 2003

Sicherheit von Open Source Software. Mythos oder Wirklichkeit?
Datenschutz und Datensicherheit, 2003

Microsoft .NET Passport: A Security Analysis.
Computer, 2003

2000
Privacy protection and anonymity services for the World Wide Web (WWW).
Future Gener. Comput. Syst., 2000

Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla.
Comput. Commun., 2000

Advanced security techniques for network protection.
Comput. Commun., 2000

Managing certificates in a corporate environment.
Ann. des Télécommunications, 2000

Éditorial - Sécurité dans les réseaux.
Ann. des Télécommunications, 2000

1999
Security issues related to mobile code and agent-based systems.
Comput. Commun., 1999

D. B. Parker: Fighting computer crimes: a new framework for protecting information.
Comput. Commun., 1999

Authorization Methods for E-Commerce Applications.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Shaping the Research Agenda for Security in E-Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Security at the Internet Layer.
Computer, 1998

1997
Participant registration, validation, and key distribution for large-scale conferencing systems.
IEEE Commun. Mag., 1997

Internet Security: Firewalls and Beyond.
Commun. ACM, 1997

Online Casinos.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

IT-Sicherheit - Grundlagen und Umsetzung in der Praxis.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05566-0, 1997

1996
Distance education and on-line universities.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Distributed registration and key distribution (DiRK).
Proceedings of the Information Systems Security, 1996

A Security Architecture for Tenet Scheme 2.
Proceedings of the Interactive Distributed Multimedia Systems and Services, 1996

Distributed Registration and Key Distribution for Online Universities.
Proceedings of the Communications and Multimedia Security II, 1996

Authentication systems for secure networks.
Artech House, ISBN: 978-0-89006-510-5, 1996

1995
Internet Security Enters the Middle Ages.
Computer, 1995

Authentifikations- und Schlüsselverteilsysteme.
Proceedings of the GISI 95, 1995

1993
Entwurf von virtuell privaten Netzen.
Proceedings of the Kommunikation in Verteilten Systemen, 1993

1992
Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN).
Prax. Inf.verarb. Kommun., 1992

Computersicherheit - eine Einführung.
Vieweg, ISBN: 978-3-528-05296-6, 1992


  Loading...