default search action
Christoph Ruland
Person information
- affiliation: University of Siegen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Romarick Yatagha, Betelhem Nebebe, Karl Waedt, Christoph Ruland:
Towards a Zero-Day Anomaly Detector in Cyber Physical Systems Using a Hybrid VAE-LSTM-OCSVM Model. CIKM 2024: 5038-5045 - 2022
- [j14]Esad Kadusic, Natasa Zivic, Christoph Ruland, Narcisa Hadzajlic:
A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform. Future Internet 14(8): 219 (2022) - [c47]Esad Kadusic, Natasa Zivic, Narcisa Hadzajlic, Christoph Ruland:
The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security. SmartIoT 2022: 80-85 - 2021
- [c46]Asmaa Tellabi, Abdelbast Sabri, Christoph Ruland, Karl Waedt:
Security aspects of FPGA and virtualization case studies. GI-Jahrestagung 2021: 1771-1780 - 2020
- [c45]Venesa Watson, Christoph Ruland, Karl Waedt:
MAC-layer Security for Time-Sensitive Switched Ethernet Networks. GI-Jahrestagung 2020: 339-350
2010 – 2019
- 2019
- [c44]Natasa Zivic, Christoph Ruland, Jochen Sassmannshausen:
Distributed Ledger Technologies for M2M Communications. ICOIN 2019: 301-306 - 2018
- [c43]Natasa Zivic, Christoph Ruland:
Cognition for enhanced biometrie authentication. ICOIN 2018: 241-244 - [c42]Asmaa Tellabi, Jochen Sassmannshausen, Edita Bajramovic, Karl Christoph Ruland:
Overview of Authentication and Access Controls for I&C systems. INDIN 2018: 882-889 - [c41]Tao Wu, Christoph Ruland:
An Authenticated Encrypted Compressive Sensing based Imaging Mechanism. NTMS 2018: 1-4 - [c40]Tao Wu, Christoph Ruland:
An Improved Authenticated Compressive Sensing Imaging. ICSC 2018: 164-171 - 2017
- [j13]Karl Christoph Ruland, Jochen Sassmannshausen, Karl Waedt, Natasa Zivic:
Smart grid security - an overview of standards and guidelines. Elektrotech. Informationstechnik 134(1): 19-25 (2017) - [c39]Romeo Ayemele Djeujo, Christoph Ruland:
Embedding cryptographically secure matrix transformation in structured Compressive Sensing. CCWC 2017: 1-7 - [c38]Romeo Ayemele Djeujo, Christoph Ruland:
QoSs definition and session description protocol for secure communication using compressive sensing. FGCT 2017: 1-7 - [c37]Natasa S. Zivic, Obaid Ur Rehman, Christoph Ruland:
Iterative algorithm for OFDM transmission over Rayleigh channels. ICOIN 2017: 222-224 - [c36]Wu Tao, Christoph Ruland:
Authenticated compressive sensing imaging. ISNCC 2017: 1-6 - [c35]Tao Wu, Christoph Ruland:
A redundancy based compressive sensing recovery optimization. TSP 2017: 502-505 - [c34]Tao Wu, Christoph Ruland:
Compression-Oriented quantization improvement of compressive sensing based imaging. TSP 2017: 604-609 - 2016
- [c33]Obaid Ur Rehman, Natasa Zivic, Christoph Ruland:
Content based image authentication with error correction. ICC 2016: 1-5 - [c32]Robin Fay, Christoph Ruland:
Compressive Sensing encryption modes and their security. ICITST 2016: 119-126 - [c31]Christoph Ruland, Namhi Kang, Jochen Sassmannshausen:
Rejuvenation of the IEC 61850 protocol stack for MMS. SmartGridComm 2016: 625-630 - 2015
- [j12]Seyed Amir Hossein Tabatabaei, Obaid Ur Rehman, Natasa Zivic, Christoph Ruland:
Secure and Robust Two-Phase Image Authentication. IEEE Trans. Multim. 17(7): 945-956 (2015) - [c30]Karl Christoph Ruland, Jochen Sassmannshausen:
Non-repudiation Services for the MMS Protocol of IEC 61850. SSR 2015: 70-85 - 2014
- [c29]Andreas Schantin, Christoph Ruland:
A bit-error based capture model for EPCglobal RFID systems. Allerton 2014: 221-226 - [c28]Jinse Shin, Dongsung Kim, Christoph Ruland:
Content based image authentication using HOG feature descriptor. ICIP 2014: 5292-5296 - [c27]Jinse Shin, Christoph Ruland:
A Hybrid Approach for Content Based Image Authentication. SECRYPT 2014: 371-378 - 2013
- [c26]S. Amir Hossein A. E. Tabatabaei, Christoph Ruland:
The analysis of an NMF-based perceptual image hashing scheme. ISSPIT 2013: 108-112 - [c25]Andreas Schantin, Christoph Ruland:
Retransmission strategies for RFID systems using the EPC protocol. RFID-TA 2013: 1-6 - [c24]Jinse Shin, Christoph Ruland:
A survey of image hashing technique for data authentication in WMSNs. WiMob 2013: 253-258 - 2012
- [c23]Rainer Schick, Christoph Ruland:
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. SECRYPT 2012: 387-390 - [c22]Rainer Schick, Christoph Ruland:
On the Security of the Non-Repudiation of Forwarding Service. TrustBus 2012: 167-178 - 2011
- [j11]Christoph Ruland:
Das Institut für digitale Kommunikationssysteme der Universität Siegen. Prax. Inf.verarb. Kommun. 34(1): 57 (2011) - [c21]Obaid Ur Rehman, Natasa Zivic, S. Amir Hossein A. E. Tabatabaei, Christoph Ruland:
Error Correcting and Weighted Noise Tolerant Message Authentication Codes. ICSPCS 2011: 1-8 - 2010
- [c20]Natasa Zivic, Christoph Ruland:
Security Architecture of Smart Metering Systems. I3E 2010: 249-259
2000 – 2009
- 2008
- [j10]Markus Dunte, Christoph Ruland:
Realising time limitation for cryptographic keys in secure multimedia distribution. Secur. Commun. Networks 1(6): 451-459 (2008) - [c19]Markus Dunte, Christoph Ruland:
Delivery Infrastructure for Secure Scalable Coded Multimedia. ICDCS Workshops 2008: 42-47 - 2007
- [c18]Sibylle Hick, Christoph Ruland:
Security Aspects for Secure Download of Regulated Software. TrustBus 2007: 219-227 - 2006
- [j9]Luigi Lo Iacono, Christoph Ruland, Norbert Zisky:
Secure transfer of measurement data in open systems. Comput. Stand. Interfaces 28(3): 311-326 (2006) - [j8]Luigi Lo Iacono, Sibylle Müller, Christoph Ruland, Norbert Zisky:
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt. Datenschutz und Datensicherheit 30(6): 347-352 (2006) - [c17]Tobias Lohmann, Matthias Schneider, Christoph Ruland:
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags. CARDIS 2006: 278-288 - 2005
- [j7]Namhi Kang, Christoph Ruland:
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining. IEICE Trans. Commun. 88-B(3): 1264-1265 (2005) - [c16]Seung Wook Jung, Christoph Ruland:
Secure Software Smartcard Resilient to Capture. CIS (2) 2005: 86-95 - [c15]Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment. Communications and Multimedia Security 2005: 284-285 - [c14]Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland, Athanasios Karantjias, Alexandros Kaliontzoglou:
Design Principles and Aspects for Cross-Border Municipal Services Deployment. EGOV (Workshops and Posters) 2005: 321-327 - [c13]Namhi Kang, Christoph Ruland:
MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions. ICOIN 2005: 824-834 - [c12]Lars Dietze, Bernd Holznagel, Luigi Lo Iacono, Christoph Ruland:
Qualifizierte Signatur im eletronischeen Messdatenaustausch. Sicherheit 2005: 335-348 - [c11]Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. TrustBus 2005: 141-150 - 2004
- [c10]Sergiu Tcaciuc, Andreas Kunz, Christoph Ruland, Volker Rapp:
Scheduler based flow control under QoS aspects in GPRS/EDGE networks. ICON 2004: 785-789 - [c9]Namhi Kang, Christoph Ruland:
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows. TrustBus 2004: 251-260 - [c8]Nikolaos Oikonomidis, Christoph Ruland:
Identity Based Protocols for Secure Electronic Content Distribution and Licensing. WEDELMUSIC 2004: 92-100 - [c7]Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications. WISA 2004: 1-13 - 2003
- [c6]Luigi Lo Iacono, Christoph Ruland:
Vertrauliche Video-Konferenzen im Internet. DFN-Arbeitstagung über Kommunikationsnetze 2003: 167-181 - 2002
- [c5]Andreas Friesen, Christoph Ruland:
Design eines Profil- und Zertifikatsmanagementsystems für das Service by eContract-Konzept. GI Jahrestagung 2002: 441-444 - 2001
- [j6]Christoph Ruland, Niko Schweitzer:
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. Datenschutz und Datensicherheit 25(11) (2001) - [c4]Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. ACISP 2001: 344-359 - [c3]Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Suitability of cryptographic modes of operation for the encryption in high-speed networks. ICON 2001: 134-139
1990 – 1999
- 1999
- [c2]Oliver Jung, Christoph Ruland:
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. CHES 1999: 340-352 - 1995
- [c1]Dirk Fox, Torsten Henn, Klaus Reichel, Christoph Ruland:
Guarded Authentic Local Area Network GALAN. VIS 1995: 163- - 1993
- [j5]Christoph Ruland:
Realizing Digital Signatures with One-Way Hash Functions. Cryptologia 17(3): 285-300 (1993)
1980 – 1989
- 1989
- [j4]Dieter Bong, Christoph Ruland:
Optimized software implementations of the modular exponentiation on general purpose microprocessors. Comput. Secur. 8(7): 621-630 (1989) - 1981
- [j3]Christoph Ruland:
Was ist ein Virtuelles Netz? Elektron. Rechenanlagen 23(3): 134-136 (1981) - [j2]Christoph Ruland:
Routing in Virtuellen Netzen. Elektron. Rechenanlagen 23(4): 164-167 (1981) - [j1]Christoph Ruland:
Algorithmen zur adaptiven Berechnung der schnellsten Wege in virtuellen Netzen. Angew. Inform. 23(11): 492-496 (1981)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint