Carsten Rudolph
TitleCited byYear
On the security of fair non-repudiation protocols
S Gürgens, C Rudolph, H Vogt
International Conference on Information Security, 193-207, 2003
942003
Security analysis of (un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing, 97-114, 2003
742003
Security evaluation of scenarios based on the TCG’s TPM specification
S Gürgens, C Rudolph, D Scheuermann, M Atts, R Plaga
European Symposium on Research in Computer Security, 438-453, 2007
702007
Covert identity information in direct anonymous attestation (DAA)
C Rudolph
IFIP International Information Security Conference, 443-448, 2007
492007
On a formal framework for security properties
S Gürgens, P Ochsenschläger, C Rudolph
Computer Standards & Interfaces 27 (5), 457-466, 2005
432005
Security of digital evidence
J Richter, N Kuntze, C Rudolph
Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth …, 2010
402010
Energieanwendungstechnik: wege und techniken zur effizienteren energienutzung
M Rudolph, U Wagner
Springer Science & Business Media, 2008
39*2008
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
S Gurgens, P Ochsenschlager, C Rudolph
Proceedings. 13th International Workshop on Database and Expert Systems …, 2002
332002
A business process-driven approach to security engineering
A Maña, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
322003
A user-centric privacy manager for future energy systems
HS Fhom, N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
2010 International Conference on Power System Technology, 1-7, 2010
272010
Authenticity and provability—a formal framework
S Gürgens, P Ochsenschläger, C Rudolph
International Conference on Infrastructure Security, 227-245, 2002
262002
Secure digital chains of evidence
N Kuntze, C Rudolph
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011
252011
Secure web service workflow execution
C Rudolph, N Kuntze, Z Velikova
Electronic Notes in Theoretical Computer Science 236, 33-46, 2009
232009
Interoperable device identification in smart-grid environments
N Kuntze, C Rudolph, I Bente, J Vieweg, J von Helden
2011 IEEE Power and Energy Society General Meeting, 1-7, 2011
222011
Trust infrastructures for future energy networks
N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
IEEE PES General Meeting, 1-7, 2010
212010
Abstractions preserving parameter confidentiality
S Gürgens, P Ochsenschläger, C Rudolph
European Symposium on Research in Computer Security, 418-437, 2005
192005
A formal notion of trust–enabling reasoning about security properties
A Fuchs, S Gürgens, C Rudolph
IFIP International Conference on Trust Management, 200-215, 2010
182010
Security engineering for ambient intelligence: A manifesto
A Maña, C Rudolph, G Spanoudakis, V Lotz, F Massacci, M Melideo, ...
Integrating security and software engineering: Advances and future visions …, 2007
182007
Security analysis of efficient (Un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing 17 (3), 260-276, 2005
172005
Security engineering for embedded systems: the secfutur vision
S Gürgens, C Rudolph, A Maña, S Nadjm-Tehrani
Proceedings of the International Workshop on Security and Dependability for …, 2010
162010
The system can't perform the operation now. Try again later.
Articles 1–20