Rolf Oppliger

According to our database1, Rolf Oppliger
  • authored at least 53 papers between 1992 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Disillusioning Alice and Bob.
IEEE Security & Privacy, 2017

New Frontiers: Assessing and Managing Security Risks.
IEEE Computer, 2017

2015
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.
IEEE Security & Privacy, 2015

2014
Certification Authorities Under Attack: A Plea for Certificate Legitimation.
IEEE Internet Computing, 2014

2012
Common Misconceptions in Computer and Information Security.
IEEE Computer, 2012

2011
Security and Privacy in an Online World.
IEEE Computer, 2011

2009
Internet Banking: Client-Side Attacks and Protection Mechanisms.
IEEE Computer, 2009

2008
Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks.
Security and Communication Networks, 2008

SSL/TLS Session-Aware User Authentication.
IEEE Computer, 2008

SSL/TLS session-aware user authentication revisited.
Computers & Security, 2008

Protecting Code Voting Against Vote Selling.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

CAPTCHA-based Code Voting.
Proceedings of the 3rd International Conference, 2008

2007
Providing Certified Mail Services on the Internet.
IEEE Security & Privacy, 2007

IT security: in search of the Holy Grail.
Commun. ACM, 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

2006
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
Computer Communications, 2006

2005
Why have public key infrastructures failed so far?
Internet Research, 2005

Does Trusted Computing Remedy Computer Security Problems?
IEEE Security & Privacy, 2005

Privacy-enhancing technologies for the world wide web.
Computer Communications, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

Effective Protection Against Phishing and Web Spoofing.
Proceedings of the Communications and Multimedia Security, 2005

2004
Microsoft .NET Passport and identity management.
Inf. Sec. Techn. Report, 2004

Authentication and authorization infrastructures (AAIs): a comparative survey.
Computers & Security, 2004

A certified mail system (CMS) for the Internet.
Computer Communications, 2004

Certified mail: the next challenge for secure messaging.
Commun. ACM, 2004

2003
Digital Evidence: Dream and Reality.
IEEE Security & Privacy, 2003

Microsoft .NET Passport: A Security Analysis.
IEEE Computer, 2003

2000
Privacy protection and anonymity services for the World Wide Web (WWW).
Future Generation Comp. Syst., 2000

Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla.
Computer Communications, 2000

Advanced security techniques for network protection.
Computer Communications, 2000

Managing certificates in a corporate environment.
Annales des Télécommunications, 2000

Éditorial - Sécurité dans les réseaux.
Annales des Télécommunications, 2000

1999
Security issues related to mobile code and agent-based systems.
Computer Communications, 1999

D. B. Parker: Fighting computer crimes: a new framework for protecting information.
Computer Communications, 1999

Authorization Methods for E-Commerce Applications.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Shaping the Research Agenda for Security in E-Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Security at the Internet Layer.
IEEE Computer, 1998

1997
Internet Security: Firewalls and Beyond.
Commun. ACM, 1997

Online Casinos.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

IT-Sicherheit - Grundlagen und Umsetzung in der Praxis.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05566-0, 1997

1996
Distance education and on-line universities.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Distributed registration and key distribution (DiRK).
Proceedings of the Information Systems Security, 1996

A Security Architecture for Tenet Scheme 2.
Proceedings of the Interactive Distributed Multimedia Systems and Services, 1996

Distributed Registration and Key Distribution for Online Universities.
Proceedings of the Communications and Multimedia Security II, 1996

Authentication systems for secure networks.
Artech House, ISBN: 978-0-89006-510-5, 1996

1995
Internet Security Enters the Middle Ages.
IEEE Computer, 1995

Authentifikations- und Schlüsselverteilsysteme.
Proceedings of the GISI 95, 1995

1993
Entwurf von virtuell privaten Netzen.
Proceedings of the Kommunikation in Verteilten Systemen, 1993

1992
Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN).
Praxis der Informationsverarbeitung und Kommunikation, 1992

Computersicherheit - eine Einführung.
Vieweg, ISBN: 978-3-528-05296-6, 1992


  Loading...