The SCEAS System
Navigation Menu

Search the dblp DataBase


Ahmad-Reza Sadeghi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:136-147 [Conf]
  2. Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
    Physical Security Bounds Against Tampering. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:253-267 [Conf]
  3. Mark Manulis, Ahmad-Reza Sadeghi
    Property-Based Taming of Lying Mobile Nodes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:476-480 [Conf]
  4. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:401-414 [Conf]
  5. Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
    Secure Data Management in Trusted Computing. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:324-338 [Conf]
  6. Ahmad-Reza Sadeghi
    Challenges for Trusted Computing. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:414- [Conf]
  7. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:129-139 [Conf]
  8. Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
    Private Auctions with Multiple Rounds and Multiple Items. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:423-427 [Conf]
  9. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Towards multilateral secure digital rights distribution infrastructures. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:45-54 [Conf]
  10. Ahmad-Reza Sadeghi, Markus Schneider 0002
    Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management, 2003, pp:113-137 [Conf]
  11. Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:489-508 [Conf]
  12. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Coin-Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:150-164 [Conf]
  13. Ahmad-Reza Sadeghi, Michael Steiner
    Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:244-261 [Conf]
  14. Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
    A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:93-108 [Conf]
  15. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:42-52 [Conf]
  16. Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:78-91 [Conf]
  17. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:15-31 [Conf]
  18. André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:117-133 [Conf]
  19. André Adelsbach, Ahmad-Reza Sadeghi
    Zero-Knowledge Watermark Detection and Proof of Ownership. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:273-288 [Conf]
  20. Ahmad-Reza Sadeghi
    How to Break a Semi-anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:384-394 [Conf]
  21. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:255-267 [Conf]
  22. Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
    An Open Approach for Designing Secure Electronic Immobilizers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:230-242 [Conf]
  23. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
    Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:187-201 [Conf]
  24. Ahmad-Reza Sadeghi, Christian Stüble
    Towards Multilateral-Secure DRM Platforms. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:326-337 [Conf]
  25. Ulrich Huber, Ahmad-Reza Sadeghi
    A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:270-285 [Conf]
  26. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:355-369 [Conf]
  27. Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
    Secure object identification: or: solving the Chess Grandmaster Problem. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:77-85 [Conf]
  28. Ahmad-Reza Sadeghi, Christian Stüble
    Property-based attestation for computing platforms: caring about properties, not mechanisms. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:67-77 [Conf]
  29. Ahmad-Reza Sadeghi, Christian Stüble
    Taming "Trusted Platforms" by Operating System Design. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:286-302 [Conf]
  30. Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble
    Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:7, n:9, pp:- [Journal]
  31. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal]
  32. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:143-158 [Journal]
  33. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:73-103 [Journal]
  34. Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
    Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:372-384 [Conf]
  35. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:145-160 [Conf]
  36. Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
    Enabling Fairer Digital Rights Management with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:53-70 [Conf]
  37. Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
    E-Passport: The Global Traceability Or How to Feel Like a UPS Package. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:391-404 [Conf]
  38. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Overcoming the obstacles of zero-knowledge watermark detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:46-55 [Conf]
  39. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP]
    T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:1-34 [Journal]

  40. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]

  41. Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]

  42. Practical Secure Evaluation of Semi-private Functions. [Citation Graph (, )][DBLP]

  43. On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]

  44. On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP]

  45. Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP]

  46. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]

  47. Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP]

  48. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]

  49. Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]

  50. An efficient implementation of trusted channels based on openssl. [Citation Graph (, )][DBLP]

  51. Flexible and secure enterprise rights management based on trusted virtual domains. [Citation Graph (, )][DBLP]

  52. Beyond secure channels. [Citation Graph (, )][DBLP]

  53. Reconfigurable trusted computing in hardware. [Citation Graph (, )][DBLP]

  54. TCG inside?: a note on TPM specification compliance. [Citation Graph (, )][DBLP]

  55. A protocol for property-based attestation. [Citation Graph (, )][DBLP]

  56. A practical property-based bootstrap architecture. [Citation Graph (, )][DBLP]

  57. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. [Citation Graph (, )][DBLP]

  58. TruWallet: trustworthy and migratable wallet-based web authentication. [Citation Graph (, )][DBLP]

  59. Efficient Helper Data Key Extractor on FPGAs. [Citation Graph (, )][DBLP]

  60. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). [Citation Graph (, )][DBLP]

  61. A Pattern for Secure Graphical User Interface Systems. [Citation Graph (, )][DBLP]

  62. Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP]

  63. Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]

  64. User Privacy in Transport Systems Based on RFID E-Tickets. [Citation Graph (, )][DBLP]

  65. Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]

  66. Location Privacy in RFID Applications. [Citation Graph (, )][DBLP]

  67. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. [Citation Graph (, )][DBLP]

  68. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]

  69. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP]

  70. Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]

  71. Extending IPsec for Efficient Remote Attestation. [Citation Graph (, )][DBLP]

  72. Establishing Chain of Trust in Reconfigurable Hardware. [Citation Graph (, )][DBLP]

  73. A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. [Citation Graph (, )][DBLP]

  74. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. [Citation Graph (, )][DBLP]

  75. Efficient Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]

  76. Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]

  77. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]

  78. Securing Peer-to-Peer Distributions for Mobile Devices. [Citation Graph (, )][DBLP]

  79. Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. [Citation Graph (, )][DBLP]

  80. Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]

  81. Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]

  82. A Demonstrative Ad Hoc Attestation System. [Citation Graph (, )][DBLP]

  83. The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. [Citation Graph (, )][DBLP]

  84. Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]

  85. Trusted Computing - Special Aspects and Challenges. [Citation Graph (, )][DBLP]

  86. Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]

  87. Proving a WS-federation passive requestor profile with a browser model. [Citation Graph (, )][DBLP]

  88. Secure VPNs for Trusted Computing Environments. [Citation Graph (, )][DBLP]

  89. Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. [Citation Graph (, )][DBLP]

  90. Key Attestation from Trusted Execution Environments. [Citation Graph (, )][DBLP]

  91. Anonymous Authentication with TLS and DAA. [Citation Graph (, )][DBLP]

  92. Token-Based Cloud Computing. [Citation Graph (, )][DBLP]

  93. Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]

  94. Security Architecture for Device Encryption and VPN. [Citation Graph (, )][DBLP]

  95. Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]

Search in 0.044secs, Finished in 0.050secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002