Carsten Rudolph
Title
Cited by
Cited by
Year
On the security of fair non-repudiation protocols
S Gürgens, C Rudolph, H Vogt
International Conference on Information Security, 193-207, 2003
982003
Security analysis of (un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing, 97-114, 2003
762003
Security evaluation of scenarios based on the TCG’s TPM specification
S Gürgens, C Rudolph, D Scheuermann, M Atts, R Plaga
European Symposium on Research in Computer Security, 438-453, 2007
752007
Covert identity information in direct anonymous attestation (DAA)
C Rudolph
IFIP International Information Security Conference, 443-448, 2007
542007
Security of digital evidence
J Richter, N Kuntze, C Rudolph
Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth …, 2010
482010
Energieanwendungstechnik: wege und techniken zur effizienteren energienutzung
M Rudolph, U Wagner
Springer Science & Business Media, 2008
462008
On a formal framework for security properties
S Gürgens, P Ochsenschläger, C Rudolph
Computer Standards & Interfaces 27 (5), 457-466, 2005
452005
A user-centric privacy manager for future energy systems
HS Fhom, N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
2010 International Conference on Power System Technology, 1-7, 2010
352010
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
S Gurgens, P Ochsenschlager, C Rudolph
Proceedings. 13th International Workshop on Database and Expert Systems …, 2002
342002
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
322003
Authenticity and provability—a formal framework
S Gürgens, P Ochsenschläger, C Rudolph
International Conference on Infrastructure Security, 227-245, 2002
272002
Interoperable device identification in smart-grid environments
N Kuntze, C Rudolph, I Bente, J Vieweg, J von Helden
2011 IEEE Power and Energy Society General Meeting, 1-7, 2011
262011
Secure digital chains of evidence
N Kuntze, C Rudolph
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011
252011
Trust infrastructures for future energy networks
N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
IEEE PES General Meeting, 1-7, 2010
242010
Can I trust the data I see? A Physician's concern on medical data in IoT health architectures
FT Jaigirdar, C Rudolph, C Bain
Proceedings of the Australasian computer science week multiconference, 1-10, 2019
232019
Secure web service workflow execution
C Rudolph, N Kuntze, Z Velikova
Electronic Notes in Theoretical Computer Science 236, 33-46, 2009
232009
A formal notion of trust–enabling reasoning about security properties
A Fuchs, S Gürgens, C Rudolph
IFIP International Conference on Trust Management, 200-215, 2010
212010
Security engineering for ambient intelligence: A manifesto
A Maña, C Rudolph, G Spanoudakis, V Lotz, F Massacci, M Melideo, ...
Integrating security and software engineering: Advances and future visions …, 2007
202007
Abstractions preserving parameter confidentiality
S Gürgens, P Ochsenschläger, C Rudolph
European Symposium on Research in Computer Security, 418-437, 2005
202005
Security analysis of efficient (Un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing 17 (3), 260-276, 2005
182005
The system can't perform the operation now. Try again later.
Articles 1–20