Dieter Gollmann

Affiliations:
  • Hamburg University of Technology, Germany


According to our database1, Dieter Gollmann authored at least 114 papers between 1984 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
CIBA: Continuous Interruption-free Brain Authentication.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2019
Securing Industrial Control Systems.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptol. ePrint Arch., 2018

Overlapping Clustering for Textual Data.
Proceedings of the 7th International Conference on Software and Computer Applications, 2018

2017
Privacy policies verification in composite services using OWL.
Comput. Secur., 2017

Cyber-Physical System Discovery: Reverse Engineering Physical Processes.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Cyber-Physical Systems Security.
Proceedings of the New Codebreakers, 2016

2015
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Guest Editorial: Emerging Trends in Research for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
Int. J. Crit. Infrastructure Prot., 2014

Socio-Technical Security Metrics (Dagstuhl Seminar 14491).
Dagstuhl Reports, 2014

Why Bother Securing DNS? (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Why Bother Securing DNS?
Proceedings of the Security Protocols XXII, 2014

Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study.
Proceedings of the 5th Workshop on Medical Cyber-Physical Systems, 2014

Access Control in and Around the Browser.
Proceedings of the Information Security Practice and Experience, 2014

A Graph-Based Transformation Reduction to Reach UPPAAL States Faster.
Proceedings of the FM 2014: Formal Methods, 2014

2013
Industrial control systems security: What is happening?
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

2012
Managing Insider Security Threats (MIST 2012 Volume 1).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

From Insider Threats to Business Processes that are Secure-by-Design.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012

Veracity, Plausibility, and Reputation.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Security for Cyber-Physical Systems.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2012

2011
Rescuing Wireless Sensor Networks Security from Science Fiction.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

From Access Control to Trust Management, and Back - A Petition.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Computer Security (3. ed.).
Wiley, ISBN: 978-0-470-74115-3, 2011

2010
Aspects of Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

Caught in the Maze of Security Standards.
Proceedings of the Security Protocols XVIII, 2010

Caught in the Maze of Security Standards (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

A Formal P3P Semantics for Composite Services.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Secure Applications without Secure Infrastructures.
Proceedings of the Computer Network Security, 2010

10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

2009
A robust certification service for highly dynamic MANET in emergency tasks.
Int. J. Commun. Syst., 2009

2008
Securing Web applications.
Inf. Secur. Tech. Rep., 2008

Editorial.
Int. J. Inf. Sec., 2008

Efficient Fingercode Classification.
IEICE Trans. Inf. Syst., 2008

Problems with Same Origin Policy (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Problems with Same Origin Policy - Know Thyself.
Proceedings of the Security Protocols XVI, 2008

Software Security - The Dangers of Abstraction.
Proceedings of the Future of Identity in the Information Society, 2008

08302 Summary - Countering Insider Threats.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

08302 Abstracts Collection - Countering Insider Threats.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

Network security fundamentals.
Wiley pathways, Wiley, ISBN: 978-0-470-10192-6, 2008

2007
Security in Distributed Applications.
Proceedings of the Advances in Software Engineering, Lipari Summer School 2007, 2007

MASC - Monitoring and Security of Containers.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

Electing the Doge of Venice: Analysis of a 13th Century Protocol.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
A method for access authorisation through delegation networks.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
Why Trust is Bad for Security.
Proceedings of the First International Workshop on Security and Trust Management, 2005

On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Protocol Analysis for Concrete Environments.
Proceedings of the Computer Aided Systems Theory, 2005

Computer Security, Second Edition.
Wiley, ISBN: 978-0-470-86293-3, 2005

2004
Identity and Location (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Identity and Location.
Proceedings of the Security Protocols, 2004

2003
Authentication by correspondence.
IEEE J. Sel. Areas Commun., 2003

Facets of Security.
Proceedings of the Global Computing. Programming Environments, 2003

2002
Equally Spaced Polynomials, Dual Bases, and Multiplication in F<sub>2<sup>n</sup></sub>.
IEEE Trans. Computers, 2002

On Fairness in Exchange Protocols.
Proceedings of the Information Security and Cryptology, 2002

Analysing Security Protocols.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

2001
Communications security on the internet.
Softw. Focus, 2001

Editorial.
Int. J. Inf. Sec., 2001

PIM Security (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

PIM Security.
Proceedings of the Security Protocols, 2001

Cryptography and Middleware Security.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Verifiable Identifiers in Middleware Security.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
New paradigms - old paradigms?
Future Gener. Comput. Syst., 2000

Mergers and Principals.
Proceedings of the Security Protocols, 2000

Mergers and Principals (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Dual Bases and Bit-Serial Multiplication in F<sub>q<sup>n</sup></sub>.
Theor. Comput. Sci., 1999

On the Verification of Cryptographic Protocols - A Tale of Two Committees.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

What Is Authentication?
Proceedings of the Security Protocols, 1999

Software License Management with Smart Cards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Computer Security.
Worlwide series in computer cience, Wiley, ISBN: 978-0-471-97844-2, 1999

1998
Security in CORBA-based electronic commerce systems.
Inf. Secur. Tech. Rep., 1998

Insider Fraud (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

Insider Fraud (Position Paper).
Proceedings of the Security Protocols, 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Authentication Using Minimally Trusted Servers.
ACM SIGOPS Oper. Syst. Rev., 1997

A fast modular exponentiation for rsa on systolic arrays.
Int. J. Comput. Math., 1997

An Efficient Non-repudiation Protocol .
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Secret Sharing with Reusable Polynomials.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptogr., 1996

Key Escrow in Mutually Mistrusting Domains.
Proceedings of the Security Protocols, 1996

A Fair Non-repudiation Protocol.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

What do We Mean by Entity Authentication?
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Certified Electronic Mail.
Proceedings of the Computer Security, 1996

Observations on Non-repudiation.
Proceedings of the Advances in Cryptology, 1996

Correlation Attacks on Cascades of Clock Controlled Shift Registers.
Proceedings of the Advances in Cryptology, 1996

Tailoring authentication protocols to match underlying mechanisms.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Distributing Trust Amongst Multiple Authentication Servers.
J. Comput. Secur., 1995

Minimal Weight k-SR Representations.
Proceedings of the Cryptography and Coding, 1995

Key distribution without individual trusted authentification servers.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

Cryptographic APIs.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Public-key Cryptography on Smart Cards.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Error Detecting Circuits: Michael Gössel and Steffen Graf, McGraw-Hill, Maidenhead, UK (1993) ISBN 0 07 707438 6, £35.00, pp 224.
Microprocess. Microsystems, 1994

1993
Towards Operational Measures of Computer Security.
J. Comput. Secur., 1993

Self-Dual Bases in F<sub>q<sup>n</sup></sub>.
Des. Codes Cryptogr., 1993

Authentication services in distributed systems.
Comput. Secur., 1993

The MSc in Information Security at Royal Holloway.
Proceedings of the Computer Security, 1993

Cryptanalysis of Clock Controlled Shift Registers.
Proceedings of the Fast Software Encryption, 1993

1992
Freshness Assurance of Authentication Protocols.
Proceedings of the Computer Security, 1992

1990
Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
Proceedings of the Advances in Cryptology, 1990

VLSI Design for Exponentiation in GF (2<sup>n</sup>).
Proceedings of the Advances in Cryptology, 1990

1989
Clock-controlled shift registers: a review.
IEEE J. Sel. Areas Commun., 1989

Algorithm engineering for public key algorithms.
IEEE J. Sel. Areas Commun., 1989

A Cryptanalysis of Step<sub><i>k, m</i></sub>-Cascades.
Proceedings of the Advances in Cryptology, 1989

Computer Algebra and Computer Aided Systems Theory.
Proceedings of the Computer Aided Systems Theory - EUROCAST'89, A Selection of Papers from the International Workshop EUROCAST'89, Las Palmas, Spain, February 26, 1989

1988
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers.
Proceedings of the Advances in Cryptology, 1988

Symmetry and Duality in Normal Basis Multiplication.
Proceedings of the Applied Algebra, 1988

1987
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
Proceedings of the Advances in Cryptology, 1987

1986
Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallszahlengeneratoren.
PhD thesis, 1986

Linear Complexity of Sequences with Period p<sup>n</sup>.
EUROCRYPT, 1986

Architectures for Exponentiation in GF(2<sup>n</sup>).
Proceedings of the Advances in Cryptology, 1986

1984
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984


  Loading...