|
Search the dblp DataBase
Ahmad-Reza Sadeghi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:136-147 [Conf]
- Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
Physical Security Bounds Against Tampering. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:253-267 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi
Property-Based Taming of Lying Mobile Nodes. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:476-480 [Conf]
- Birgit Pfitzmann, Ahmad-Reza Sadeghi
Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:401-414 [Conf]
- Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
Secure Data Management in Trusted Computing. [Citation Graph (0, 0)][DBLP] CHES, 2005, pp:324-338 [Conf]
- Ahmad-Reza Sadeghi
Challenges for Trusted Computing. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:414- [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:129-139 [Conf]
- Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
Private Auctions with Multiple Rounds and Multiple Items. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:423-427 [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Towards multilateral secure digital rights distribution infrastructures. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:45-54 [Conf]
- Ahmad-Reza Sadeghi, Markus Schneider 0002
Electronic Payment Systems. [Citation Graph (0, 0)][DBLP] Digital Rights Management, 2003, pp:113-137 [Conf]
- Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:489-508 [Conf]
- Birgit Pfitzmann, Ahmad-Reza Sadeghi
Coin-Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:150-164 [Conf]
- Ahmad-Reza Sadeghi, Michael Steiner
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:244-261 [Conf]
- Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:93-108 [Conf]
- Birgit Pfitzmann, Ahmad-Reza Sadeghi
Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2000, pp:42-52 [Conf]
- Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:78-91 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:15-31 [Conf]
- André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP] Information Hiding, 1999, pp:117-133 [Conf]
- André Adelsbach, Ahmad-Reza Sadeghi
Zero-Knowledge Watermark Detection and Proof of Ownership. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:273-288 [Conf]
- Ahmad-Reza Sadeghi
How to Break a Semi-anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:384-394 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:255-267 [Conf]
- Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
An Open Approach for Designing Secure Electronic Immobilizers. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:230-242 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:187-201 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Towards Multilateral-Secure DRM Platforms. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:326-337 [Conf]
- Ulrich Huber, Ahmad-Reza Sadeghi
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:270-285 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP] IWDW, 2003, pp:355-369 [Conf]
- Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
Secure object identification: or: solving the Chess Grandmaster Problem. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:77-85 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Property-based attestation for computing platforms: caring about properties, not mechanisms. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:67-77 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Taming "Trusted Platforms" by Operating System Design. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:286-302 [Conf]
- Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. [Citation Graph (0, 0)][DBLP] Datenschutz und Datensicherheit, 2003, v:7, n:9, pp:- [Journal]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2005, v:11, n:2, pp:143-158 [Journal]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:73-103 [Journal]
- Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:372-384 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:145-160 [Conf]
- Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
Enabling Fairer Digital Rights Management with Trusted Computing. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:53-70 [Conf]
- Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
E-Passport: The Global Traceability Or How to Feel Like a UPS Package. [Citation Graph (0, 0)][DBLP] WISA, 2006, pp:391-404 [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Overcoming the obstacles of zero-knowledge watermark detection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:46-55 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP] T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:1-34 [Journal]
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]
Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]
Practical Secure Evaluation of Semi-private Functions. [Citation Graph (, )][DBLP]
On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]
On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP]
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP]
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]
Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP]
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]
Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]
An efficient implementation of trusted channels based on openssl. [Citation Graph (, )][DBLP]
Flexible and secure enterprise rights management based on trusted virtual domains. [Citation Graph (, )][DBLP]
Beyond secure channels. [Citation Graph (, )][DBLP]
Reconfigurable trusted computing in hardware. [Citation Graph (, )][DBLP]
TCG inside?: a note on TPM specification compliance. [Citation Graph (, )][DBLP]
A protocol for property-based attestation. [Citation Graph (, )][DBLP]
A practical property-based bootstrap architecture. [Citation Graph (, )][DBLP]
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. [Citation Graph (, )][DBLP]
TruWallet: trustworthy and migratable wallet-based web authentication. [Citation Graph (, )][DBLP]
Efficient Helper Data Key Extractor on FPGAs. [Citation Graph (, )][DBLP]
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). [Citation Graph (, )][DBLP]
A Pattern for Secure Graphical User Interface Systems. [Citation Graph (, )][DBLP]
Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP]
Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]
User Privacy in Transport Systems Based on RFID E-Tickets. [Citation Graph (, )][DBLP]
Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]
Location Privacy in RFID Applications. [Citation Graph (, )][DBLP]
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. [Citation Graph (, )][DBLP]
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP]
Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]
Extending IPsec for Efficient Remote Attestation. [Citation Graph (, )][DBLP]
Establishing Chain of Trust in Reconfigurable Hardware. [Citation Graph (, )][DBLP]
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. [Citation Graph (, )][DBLP]
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. [Citation Graph (, )][DBLP]
Efficient Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]
Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]
Securing Peer-to-Peer Distributions for Mobile Devices. [Citation Graph (, )][DBLP]
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. [Citation Graph (, )][DBLP]
Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]
Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]
A Demonstrative Ad Hoc Attestation System. [Citation Graph (, )][DBLP]
The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. [Citation Graph (, )][DBLP]
Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]
Trusted Computing - Special Aspects and Challenges. [Citation Graph (, )][DBLP]
Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]
Proving a WS-federation passive requestor profile with a browser model. [Citation Graph (, )][DBLP]
Secure VPNs for Trusted Computing Environments. [Citation Graph (, )][DBLP]
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. [Citation Graph (, )][DBLP]
Key Attestation from Trusted Execution Environments. [Citation Graph (, )][DBLP]
Anonymous Authentication with TLS and DAA. [Citation Graph (, )][DBLP]
Token-Based Cloud Computing. [Citation Graph (, )][DBLP]
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]
Security Architecture for Device Encryption and VPN. [Citation Graph (, )][DBLP]
Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]
Search in 0.021secs, Finished in 0.027secs
|