


Остановите войну!
for scientists:


default search action
Dieter Gollmann
Person information

- affiliation: Hamburg University of Technology, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [c76]Florian Gondesen
, Dieter Gollmann:
CIBA: Continuous Interruption-free Brain Authentication. BIOSIGNALS 2021: 314-319 - 2020
- [e27]Weizhi Meng
, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou
:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7 [contents]
2010 – 2019
- 2019
- [p2]Marina Krotofil, Klaus Kursawe, Dieter Gollmann:
Securing Industrial Control Systems. Security and Privacy Trends in the Industrial Internet of Thing 2019: 3-27 - [e26]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - 2018
- [c75]Atefeh Khazaei, Mohammad Ghasemzadeh
, Dieter Gollmann:
Overlapping Clustering for Textual Data. ICSCA 2018: 115-118 - [e25]Dieter Gollmann, Jianying Zhou:
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [i8]Xun Yi, Kwok-Yan Lam, Dieter Gollmann:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. IACR Cryptol. ePrint Arch. 2018: 660 (2018) - 2017
- [j26]Assadarat Khurat, Boontawee Suntisrivaraporn, Dieter Gollmann:
Privacy policies verification in composite services using OWL. Comput. Secur. 67: 122-141 (2017) - [c74]Alexander Winnicki, Marina Krotofil, Dieter Gollmann:
Cyber-Physical System Discovery: Reverse Engineering Physical Processes. CPSS@AsiaCCS 2017: 3-14 - [e24]Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4 [contents] - [e23]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10492, Springer 2017, ISBN 978-3-319-66401-9 [contents] - [e22]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10493, Springer 2017, ISBN 978-3-319-66398-2 [contents] - 2016
- [c73]Dieter Gollmann, Marina Krotofil:
Cyber-Physical Systems Security. The New Codebreakers 2016: 195-204 - 2015
- [c72]Dieter Gollmann, Pavel Gurikov
, Alexander Isakov, Marina Krotofil, Jason Larsen, Alexander Winnicki:
Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant. CPSS@ASIACSS 2015: 1-12 - [c71]Marina Krotofil, Jason Larsen, Dieter Gollmann:
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. AsiaCCS 2015: 133-144 - [e21]Hannes Federrath, Dieter Gollmann:
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1 [contents] - 2014
- [j25]Marina Krotofil, Alvaro A. Cárdenas, Jason Larsen, Dieter Gollmann:
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks. Int. J. Crit. Infrastructure Prot. 7(4): 213-232 (2014) - [j24]William R. Claycomb, Philip A. Legg, Dieter Gollmann:
Guest Editorial: Emerging Trends in Research for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 1-6 (2014) - [c70]Jonas Rinast, Sibylle Schupp, Dieter Gollmann:
A Graph-Based Transformation Reduction to Reach UPPAAL States Faster. FM 2014: 547-562 - [c69]Dieter Gollmann:
Access Control in and Around the Browser. ISPEC 2014: 1-7 - [c68]Xintao Ma, Jonas Rinast, Sibylle Schupp, Dieter Gollmann:
Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study. MCPS 2014: 100-112 - [c67]Dieter Gollmann:
Why Bother Securing DNS? Security Protocols Workshop 2014: 1-8 - [c66]Dieter Gollmann:
Why Bother Securing DNS? (Transcript of Discussion). Security Protocols Workshop 2014: 9-17 - [i7]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [c65]Marina Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 664-669 - [c64]Maryna Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 670-675 - [e20]Hanne Riis Nielson
, Dieter Gollmann:
Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Lecture Notes in Computer Science 8208, Springer 2013, ISBN 978-3-642-41487-9 [contents] - [e19]Lorenzo Cavallaro
, Dieter Gollmann:
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Lecture Notes in Computer Science 7886, Springer 2013, ISBN 978-3-642-38529-2 [contents] - 2012
- [j23]Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 4-12 (2012) - [j22]Kouichi Sakurai, Dieter Gollmann:
Managing Insider Security Threats (MIST 2012 Volume 1). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 1-3 (2012) - [c63]Dieter Gollmann:
Security for Cyber-Physical Systems. MEMICS 2012: 12-14 - [c62]Dieter Gollmann:
Veracity, Plausibility, and Reputation. WISTP 2012: 20-28 - [e18]Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8 [contents] - [i6]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert
, Christian W. Probst:
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012) - 2011
- [b5]Dieter Gollmann:
Computer Security (3. ed.). Wiley 2011, ISBN 978-0-470-74115-3, pp. I-XIX, 1-436 - [c61]Dieter Gollmann:
From Access Control to Trust Management, and Back - A Petition. IFIPTM 2011: 1-8 - [c60]Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. INCoS 2011: 627 - [c59]Dieter Gollmann, Maryna Krotofil, Harald Sauff:
Rescuing Wireless Sensor Networks Security from Science Fiction. Networking Workshops 2011: 192-206 - [e17]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8 [contents] - 2010
- [c58]Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. ESORICS 2010: 441-454 - [c57]Dieter Gollmann:
Secure Applications without Secure Infrastructures. MMM-ACNS 2010: 21-31 - [c56]Assadarat Khurat, Dieter Gollmann, Joerg Abendroth:
A Formal P3P Semantics for Composite Services. Secure Data Management 2010: 113-131 - [c55]Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. Security Protocols Workshop 2010: 3 - [c54]Dieter Gollmann:
Caught in the Maze of Security Standards (Transcript of Discussion). Security Protocols Workshop 2010: 4-11 - [p1]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15 - [e16]Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny:
Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Lecture Notes in Computer Science 6035, Springer 2010, ISBN 978-3-642-12509-6 [contents] - [e15]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [e14]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - [i5]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [j21]Meng Ge, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, C. C. Chang, Jian-Bin Li:
A robust certification service for highly dynamic MANET in emergency tasks. Int. J. Commun. Syst. 22(9): 1177-1197 (2009) - 2008
- [b4]Eric R. Cole, Ronald L. Krutz, James W. Conley, Brian Reisman, Mitch Ruebush, Dieter Gollmann:
Network security fundamentals. Wiley pathways, Wiley 2008, ISBN 978-0-470-10192-6, pp. I-XXVIII, 1-524 - [j20]Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun:
Efficient Fingercode Classification. IEICE Trans. Inf. Syst. 91-D(5): 1252-1260 (2008) - [j19]Dieter Gollmann:
Editorial. Int. J. Inf. Sec. 7(2): 101 (2008) - [j18]Dieter Gollmann:
Securing Web applications. Inf. Secur. Tech. Rep. 13(1): 1-9 (2008) - [c53]Dieter Gollmann:
Software Security - The Dangers of Abstraction. FIDIS 2008: 1-12 - [c52]Dieter Gollmann:
Problems with Same Origin Policy - Know Thyself. Security Protocols Workshop 2008: 84-85 - [c51]Dieter Gollmann:
Problems with Same Origin Policy (Transcript of Discussion). Security Protocols Workshop 2008: 86-92 - [e13]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Countering Insider Threats, 20.07. - 25.07.2008. Dagstuhl Seminar Proceedings 08302, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [e12]Jose Antonio Onieva
, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings. Lecture Notes in Computer Science 5019, Springer 2008, ISBN 978-3-540-79965-8 [contents] - [i3]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
08302 Abstracts Collection - Countering Insider Threats. Countering Insider Threats 2008 - [i2]Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann:
08302 Summary - Countering Insider Threats. Countering Insider Threats 2008 - 2007
- [c50]Miranda Mowbray, Dieter Gollmann:
Electing the Doge of Venice: Analysis of a 13th Century Protocol. CSF 2007: 295-310 - [c49]Jens Ove Lauf, Dieter Gollmann, Volker Turau:
MASC - Monitoring and Security of Containers. GI Jahrestagung (1) 2007: 5-10 - [c48]Dieter Gollmann:
Security in Distributed Applications. Lipari Summer School 2007: 254-276 - 2006
- [c47]Audun Jøsang, Dieter Gollmann, Richard Au:
A method for access authorisation through delegation networks. ACSW 2006: 165-174 - [e11]Dieter Gollmann, Jan Meier, Andrei Sabelfeld:
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings. Lecture Notes in Computer Science 4189, Springer 2006, ISBN 3-540-44601-X [contents] - [e10]Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
:
Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4 [contents] - 2005
- [b3]Dieter Gollmann:
Computer Security, Second Edition. Wiley 2005, ISBN 978-0-470-86293-3, pp. I-XI, 1-374 - [c46]Dieter Gollmann:
Protocol Analysis for Concrete Environments. EUROCAST 2005: 365-372 - [c45]Susan Pancho-Festin, Dieter Gollmann:
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Formal Aspects in Security and Trust 2005: 5-15 - [c44]Dieter Gollmann:
Why Trust is Bad for Security. STM 2005: 3-9 - [e9]Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings. Lecture Notes in Computer Science 3679, Springer 2005, ISBN 3-540-28963-1 [contents] - 2004
- [c43]Dieter Gollmann:
Identity and Location. Security Protocols Workshop 2004: 246-250 - [c42]Dieter Gollmann:
Identity and Location (Transcript of Discussion). Security Protocols Workshop 2004: 251-255 - [e8]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 [contents] - 2003
- [j17]Dieter Gollmann:
Authentication by correspondence. IEEE J. Sel. Areas Commun. 21(1): 88-95 (2003) - [c41]Dieter Gollmann:
Facets of Security. Global Computing 2003: 192-202 - [e7]Einar Snekkenes, Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings. Lecture Notes in Computer Science 2808, Springer 2003, ISBN 3-540-20300-1 [contents] - [e6]Sihan Qing, Dieter Gollmann, Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5 [contents] - 2002
- [j16]Dieter Gollmann:
Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. IEEE Trans. Computers 51(5): 588-591 (2002) - [c40]Dieter Gollmann:
Analysing Security Protocols. FASec 2002: 71-80 - [c39]Olivier Markowitch, Dieter Gollmann, Steve Kremer:
On Fairness in Exchange Protocols. ICISC 2002: 451-464 - [e5]Dieter Gollmann, Günter Karjoth, Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 [contents] - 2001
- [j15]Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. Int. J. Inf. Sec. 1(1): 1-2 (2001) - [j14]Tuomas Aura, Dieter Gollmann:
Communications security on the internet. Softw. Focus 2(3): 104-111 (2001) - [c38]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-459 - [c37]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Cryptography and Middleware Security. ICICS 2001: 408-418 - [c36]Dieter Gollmann:
PIM Security. Security Protocols Workshop 2001: 80-81 - [c35]Dieter Gollmann:
PIM Security (Transcript of Discussion). Security Protocols Workshop 2001: 82-86 - 2000
- [j13]Dieter Gollmann:
New paradigms - old paradigms? Future Gener. Comput. Syst. 16(4): 343-349 (2000) - [c34]Dieter Gollmann:
Mergers and Principals. Security Protocols Workshop 2000: 5-13 - [c33]Dieter Gollmann:
Mergers and Principals (Transcript of Discussion). Security Protocols Workshop 2000: 14-19 - [e4]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7 [contents]
1990 – 1999
- 1999
- [b2]Dieter Gollmann:
Computer Security. Worlwide series in computer cience, Wiley 1999, ISBN 978-0-471-97844-2, pp. I-XV, 1-320 - [j12]Dieter Gollmann:
Dual Bases and Bit-Serial Multiplication in Fqn. Theor. Comput. Sci. 226(1-2): 45-59 (1999) - [c32]Tuomas Aura, Dieter Gollmann:
Software License Management with Smart Cards. Smartcard 1999 - [c31]Dieter Gollmann:
What Is Authentication? Security Protocols Workshop 1999: 65-72 - [c30]Dieter Gollmann:
On the Verification of Cryptographic Protocols - A Tale of Two Committees. Workshop on Secure Architectures and Information Flow 1999: 42-58 - 1998
- [j11]Dieter Gollmann, Ulrich Lang:
Security in CORBA-based electronic commerce systems. Inf. Secur. Tech. Rep. 3(2): 62-70 (1998) - [c29]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c28]Peter Y. A. Ryan
, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - [c27]Dieter Gollmann:
Insider Fraud (Position Paper). Security Protocols Workshop 1998: 213-219 - [c26]Dieter Gollmann:
Insider Fraud (Transcript of Discussion). Security Protocols Workshop 1998: 220-226 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [j10]Yongfei Han, Chris J. Mitchell
, Dieter Gollmann:
A fast modular exponentiation for rsa on systolic arrays. Int. J. Comput. Math. 63(3-4): 215-226 (1997) - [j9]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
:
Authentication Using Minimally Trusted Servers. ACM SIGOPS Oper. Syst. Rev. 31(3): 16-28 (1997) - [c25]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
, Peter R. Wild:
Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 - [c24]Jianying Zhou, Dieter Gollmann:
An Efficient Non-repudiation Protocol . CSFW 1997: 126-132 - 1996
- [j8]Dieter Gollmann, Yongfei Han, Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptogr. 7(1-2): 135-151 (1996) - [c23]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
:
Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 - [c22]Jianying Zhou, Dieter Gollmann:
Observations on Non-repudiation. ASIACRYPT 1996: 133-144 - [c21]Willi Geiselmann, Dieter Gollmann:
Correlation Attacks on Cascades of Clock Controlled Shift Registers. ASIACRYPT 1996: 346-359 - [c20]Jianying Zhou, Dieter Gollmann:
Certified Electronic Mail. ESORICS 1996: 160-171 - [c19]Dieter Gollmann:
What do We Mean by Entity Authentication? S&P 1996: 46-54 - [c18]Jianying Zhou, Dieter Gollmann:
A Fair Non-repudiation Protocol. S&P 1996: 55-61 - [c17]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 - [e2]Dieter Gollmann:
Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings. Lecture Notes in Computer Science 1039, Springer 1996, ISBN 3-540-60865-6 [contents] - 1995
- [j7]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers. J. Comput. Secur. 3(4): 255-268 (1995) - [c16]