![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/sicherheit/sicherheit2005.bht:"
@inproceedings{DBLP:conf/sicherheit/AdelsbachG05, author = {Andr{\'{e}} Adelsbach and Ulrich Greveler}, editor = {Hannes Federrath}, title = {Satellite Communication without Privacy - Attacker's Paradise}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {257--268}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28380}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AdelsbachG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BelliB05, author = {Fevzi Belli and Christof J. Budnik}, editor = {Hannes Federrath}, title = {Test Cost Reduction for Interactive Systems}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {149--160}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28366}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BelliB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Hannes Federrath}, title = {Secure Multi-Party Computation with Security Modules}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {41--52}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28394}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Berthold05, author = {Oliver Berthold}, editor = {Hannes Federrath}, title = {Datenschutzgerechte RFID-Technologie}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {253--256}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28379}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Berthold05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Bohme05, author = {Rainer B{\"{o}}hme}, editor = {Hannes Federrath}, title = {IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {27--40}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28383}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Bohme05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrucknerV05, author = {Lars Br{\"{u}}ckner and Marco Voss}, editor = {Hannes Federrath}, title = {SIdentity - Sichere und private Attribut{\"{u}}bermittlung an Internet - Dienste per Mobiltelefon}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {269--272}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28381}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrucknerV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DaimerT05, author = {Gottfried Daimer and Till Teichmann}, editor = {Hannes Federrath}, title = {Elektronische Signatur - Eignung des biometrischen Merkmals "Fingerabdruck" als m{\"{o}}glicher PIN-Ersatz}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {385--396}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28395}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DaimerT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DietzeHIR05, author = {Lars Dietze and Bernd Holznagel and Luigi Lo Iacono and Christoph Ruland}, editor = {Hannes Federrath}, title = {Qualifizierte Signatur im eletronischeen Messdatenaustausch}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {335--348}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28390}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DietzeHIR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DittmannLSK05, author = {Jana Dittmann and Andreas Lang and Martin Steinebach and Stefan Katzenbeisser}, editor = {Hannes Federrath}, title = {{ECRYPT} - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {189--192}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28370}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DittmannLSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Fischer-DieskauKSV05, author = {Stefanie Fischer{-}Dieskau and Thomas Kunz and Andreas U. Schmidt and Ursula Viebeg}, editor = {Hannes Federrath}, title = {Grundkonzepte rechtssicherer Transformation signierter Dokumente}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {401--412}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28397}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Fischer-DieskauKSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Flegel05, author = {Ulrich Flegel}, editor = {Hannes Federrath}, title = {Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {221--232}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28375}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Flegel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FrankeP05, author = {Markus Franke and Oliver Pfaff}, editor = {Hannes Federrath}, title = {SAMLized Kerberos}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {297--308}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28385}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FrankeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FritschR05, author = {Lothar Fritsch and Heiko Rossnagel}, editor = {Hannes Federrath}, title = {Die Krise des Signaturmarktes: L{\"{o}}sungsans{\"{a}}tze aus betriebswirtschaftlicher Sicht}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {315--326}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28387}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FritschR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GolzeMW05, author = {Sebastian Golze and Gero M{\"{u}}hl and Torben Weis}, editor = {Hannes Federrath}, title = {How to Configure Proof-of-Work Functions to Stop Spam}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {165--174}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28368}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GolzeMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrossLS05, author = {Stephan Gro{\ss} and Sabine Lein and Sandra Steinbrecher}, editor = {Hannes Federrath}, title = {Ein mehrseitig sicheres Abrechnungsystem f{\"{u}}r Wireless {LAN} Hotspots}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {249--252}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28378}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrossLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrunertR05, author = {Ronald Grunert and Frank Rustemeyer}, editor = {Hannes Federrath}, title = {Aufbau von qualifizierten Zertifizierungsdiensten f{\"{u}}r die Deutsche Rentenverischerung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {331--334}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28389}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrunertR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HeckmannF05, author = {Reinhold Heckmann and Christian Ferdinand}, editor = {Hannes Federrath}, title = {Verifying Safety-Critical Properties of Embedded Software by Abstract Interpretation}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {125--128}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28363}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HeckmannF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hillen05, author = {Detlef Hillen}, editor = {Hannes Federrath}, title = {SigB{\"{u}}-API: Einheitliche kartenunabh{\"{a}}ngige {API} f{\"{u}}r die Zugriffe auf die Siganturkarten des Signaturb{\"{u}}ndnisses}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {375--383}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28393}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Hillen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Huhnlein05, author = {Detlef H{\"{u}}hnlein}, editor = {Hannes Federrath}, title = {Die CCES-Signature-API - Eine offene Programmierschnittstelle f{\"{u}}r langfristig beweiskr{\"{a}}ftige elektronische Signaturen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {361--374}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28392}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Huhnlein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JungSS05, author = {Martin Jung and Francesca Saglietti and Verena Sauerborn}, editor = {Hannes Federrath}, title = {Beherrschung von Schnittstelleninkonsistenzen in komponentenbasierten Softwaresystemen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {101--112}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28404}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JungSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KaratsiolisLW05, author = {Evangelos G. Karatsiolis and Marcus Lippert and Alexander Wiesmaier}, editor = {Hannes Federrath}, title = {Planning for Directory Services in Public Key Infrastructures}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {349--360}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28391}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KaratsiolisLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KatzenbeisserSV05, author = {Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, editor = {Hannes Federrath}, title = {Malware Engineering}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {139--148}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28365}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KatzenbeisserSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KesdoganR05, author = {Dogan Kesdogan and Oliver Rattay}, editor = {Hannes Federrath}, title = {Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {233--244}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28376}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KesdoganR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KochP05, author = {Manuel Koch and Karl Pauls}, editor = {Hannes Federrath}, title = {Model-driven development of access control aspects}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {273--284}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28382}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KochP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LaskovRSM05, author = {Pavel Laskov and Konrad Rieck and Christin Sch{\"{a}}fer and Klaus{-}Robert M{\"{u}}ller}, editor = {Hannes Federrath}, title = {Visualization of anomaly detection using prediction sensitivity}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {197--208}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28373}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LaskovRSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MeierS05, author = {Michael Meier and Sebastian Schmerl}, editor = {Hannes Federrath}, title = {Effiziente Analyseverfahren f{\"{u}}r Intrusion-Detection-Systeme}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {209--220}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28374}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MeierS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MrugallaM05, author = {Christian Mrugalla and S{\"{o}}nke Maseberg}, editor = {Hannes Federrath}, title = {IT-Grundschutz-basierendes Sicherheitskonzept f{\"{u}}r die Virtuelle Poststelle des Bundes}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {11--14}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28361}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MrugallaM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MurmannR05, author = {Tobias Murmann and Heiko Rossnagel}, editor = {Hannes Federrath}, title = {Sicherheitsanalyse von Betriebssystemen f{\"{u}}r Mobile Endger{\"{a}}te}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {129--138}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28364}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MurmannR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/NoweyFKP05, author = {Thomas Nowey and Hannes Federrath and Christian Klein and Klaus Pl{\"{o}}{\ss}l}, editor = {Hannes Federrath}, title = {Ans{\"{a}}tze zur Evaluierung von Sicherheitsinvestitionen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {15--26}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28372}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/NoweyFKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Pimenidis05, author = {Lexi Pimenidis}, editor = {Hannes Federrath}, title = {A Practical Approach to Tranparent und Usable Anonymity Networks}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {245--248}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28377}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Pimenidis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PlosslFN05, author = {Klaus Pl{\"{o}}{\ss}l and Hannes Federrath and Thomas Nowey}, editor = {Hannes Federrath}, title = {Schutzm{\"{o}}glichkeiten gegen Phishing}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {161--164}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28367}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PlosslFN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PriebeDMP05, author = {Torsten Priebe and Wolfgang Dobmeier and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, editor = {Hannes Federrath}, title = {{ABAC} - Ein Referenzmodell f{\"{u}}r attributbasierte Zugriffskontrolle}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {285--296}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28384}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PriebeDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ReicheltR05, author = {Dirk Reichelt and Franz Rothlauf}, editor = {Hannes Federrath}, title = {Verfahren zur Bestimmung der Zuverl{\"{a}}ssigkeit von Kommunikationsnetzwerken: Eine Studie zu exakten und approximativen Verfahren}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {89--100}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28403}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ReicheltR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RothmaierK05, author = {Gerrit Rothmaier and Heiko Krumm}, editor = {Hannes Federrath}, title = {Formale Modellierung und Analyse protokollbasierter Angriffe in {TCP/IP} Netzwerken am Beispiel von {ARP} und {RIP}}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {77--88}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28402}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RothmaierK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Santen05, author = {Thomas Santen}, editor = {Hannes Federrath}, title = {Probabilistic Confidentiality Properties based on Indistinguishability}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {113--124}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28362}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Santen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schreiber05, author = {Susanne Schreiber}, editor = {Hannes Federrath}, title = {{\"{A}}nderungen im Hinblick auf die Beantragung qualifizierter elektronischer Signaturen gem{\"{a}}{\ss} dem 1. Sig{\"{A}}ndG - Eine kritische W{\"{u}}rdigung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {327--330}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28388}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schreiber05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/VielhauerDHW05, author = {Claus Vielhauer and Jana Dittmann and Christian Helmholz and Marten Wenzel}, editor = {Hannes Federrath}, title = {Multifaktorielle Benutzerauthentifizierung durch {PAM} und Fingerabdruck f{\"{u}}r Linux Infrastrukturen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {309--312}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28386}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/VielhauerDHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld05, author = {Andreas Westfeld}, editor = {Hannes Federrath}, title = {Nutzung der Nachbarkorrelation f{\"{u}}r Steganalyse mit erh{\"{o}}hter Zuverl{\"{a}}ssigkeit}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {53--64}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28400}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Wohner05, author = {Thomas W{\"{o}}hner}, editor = {Hannes Federrath}, title = {Analyse und Bewertung von Kopierschutzverfahren f{\"{u}}r Audio-CDs}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {175--188}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28369}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Wohner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Hannes Federrath}, title = {Applications of Multivariate Quadratic Public Key Systems}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {413--424}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28398}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfWP05, author = {Marko Wolf and Andr{\'{e}} Weimerskirch and Christof Paar}, editor = {Hannes Federrath}, title = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology im Automobil}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {193--196}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28371}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WunderlichS05, author = {Torsten Wunderlich and Siegfried Staude}, editor = {Hannes Federrath}, title = {Online - Patenanmeldung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {397--400}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28396}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WunderlichS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZmudzinskiS05, author = {Sascha Zmudzinski and Martin Steinebach}, editor = {Hannes Federrath}, title = {Vertrauensw{\"{u}}rdigkeit von Audiodaten - Digitale Wasserzeichen und Verifikation der semantischen Integrit{\"{a}}t}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {65--76}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28401}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZmudzinskiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2005, editor = {Hannes Federrath}, title = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28360}, isbn = {3-88579-391-1}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.