Rolf Oppliger

According to our database1, Rolf Oppliger authored at least 53 papers between 1992 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Disillusioning Alice and Bob.
IEEE Security & Privacy, 2017

New Frontiers: Assessing and Managing Security Risks.
IEEE Computer, 2017

Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.
IEEE Security & Privacy, 2015

Certification Authorities Under Attack: A Plea for Certificate Legitimation.
IEEE Internet Computing, 2014

Common Misconceptions in Computer and Information Security.
IEEE Computer, 2012

Security and Privacy in an Online World.
IEEE Computer, 2011

Internet Banking: Client-Side Attacks and Protection Mechanisms.
IEEE Computer, 2009

Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks.
Security and Communication Networks, 2008

SSL/TLS Session-Aware User Authentication.
IEEE Computer, 2008

SSL/TLS session-aware user authentication revisited.
Computers & Security, 2008

Protecting Code Voting Against Vote Selling.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

CAPTCHA-based Code Voting.
Proceedings of the 3rd International Conference, 2008

Providing Certified Mail Services on the Internet.
IEEE Security & Privacy, 2007

IT security: in search of the Holy Grail.
Commun. ACM, 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
Computer Communications, 2006

Why have public key infrastructures failed so far?
Internet Research, 2005

Does Trusted Computing Remedy Computer Security Problems?
IEEE Security & Privacy, 2005

Privacy-enhancing technologies for the world wide web.
Computer Communications, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

Effective Protection Against Phishing and Web Spoofing.
Proceedings of the Communications and Multimedia Security, 2005

Microsoft .NET Passport and identity management.
Inf. Sec. Techn. Report, 2004

Authentication and authorization infrastructures (AAIs): a comparative survey.
Computers & Security, 2004

A certified mail system (CMS) for the Internet.
Computer Communications, 2004

Certified mail: the next challenge for secure messaging.
Commun. ACM, 2004

Digital Evidence: Dream and Reality.
IEEE Security & Privacy, 2003

Microsoft .NET Passport: A Security Analysis.
IEEE Computer, 2003

Privacy protection and anonymity services for the World Wide Web (WWW).
Future Generation Comp. Syst., 2000

Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla.
Computer Communications, 2000

Advanced security techniques for network protection.
Computer Communications, 2000

Managing certificates in a corporate environment.
Annales des Télécommunications, 2000

Éditorial - Sécurité dans les réseaux.
Annales des Télécommunications, 2000

Security issues related to mobile code and agent-based systems.
Computer Communications, 1999

D. B. Parker: Fighting computer crimes: a new framework for protecting information.
Computer Communications, 1999

Authorization Methods for E-Commerce Applications.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Shaping the Research Agenda for Security in E-Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

Security at the Internet Layer.
IEEE Computer, 1998

Internet Security: Firewalls and Beyond.
Commun. ACM, 1997

Online Casinos.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

IT-Sicherheit - Grundlagen und Umsetzung in der Praxis.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05566-0, 1997

Distance education and on-line universities.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Distributed registration and key distribution (DiRK).
Proceedings of the Information Systems Security, 1996

A Security Architecture for Tenet Scheme 2.
Proceedings of the Interactive Distributed Multimedia Systems and Services, 1996

Distributed Registration and Key Distribution for Online Universities.
Proceedings of the Communications and Multimedia Security II, 1996

Authentication systems for secure networks.
Artech House, ISBN: 978-0-89006-510-5, 1996

Internet Security Enters the Middle Ages.
IEEE Computer, 1995

Authentifikations- und Schlüsselverteilsysteme.
Proceedings of the GISI 95, 1995

Entwurf von virtuell privaten Netzen.
Proceedings of the Kommunikation in Verteilten Systemen, 1993

Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN).
Praxis der Informationsverarbeitung und Kommunikation, 1992

Computersicherheit - eine Einführung.
Vieweg, ISBN: 978-3-528-05296-6, 1992