Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Hans Löhr"'
Autor:
Michael Lang, Hans Löhr
Publikováno v:
IT-Sicherheit. :285-289
Autor:
Jonas Tzschoppe, Hans Löhr
Publikováno v:
Proceedings of the 16th European Workshop on System Security.
Autor:
Michael Lang, Hans Löhr
- Kompakte Orientierungshilfe für CISOs, Sicherheitsverantwortliche in Unternehmen, Projektleitende, IT-Berater:innen - Best Practices für die Umsetzung im Unternehmen- Mit Erfahrungsberichten mehrerer Chief Information Security Officer (CISO)- Ihr
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 19:3400-3405
Changing pseudonym certificates are the agreed-upon approach for privacy-friendly message authentication in upcoming vehicular ad hoc networks and are included in recent standards. This paper examines the performance of four different pseudonym chang
Autor:
Michael Lang, Hans Löhr
- Kompakte Orientierungshilfe für CISOs, Sicherheitsverantwortliche in Unternehmen, Projektleiter, IT-Berater - Best Practices für die Umsetzung im Unternehmen- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesFür Unternehmen i
Publikováno v:
Ad hoc networks, 37(Part 1), 122-132. Elsevier
Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend
Publikováno v:
Journal of Network and Computer Applications. 38:65-75
Versioning file systems are useful in applications like post-intrusion file system analysis, or reliable file retention and retrievability as required by legal regulations for sensitive data management. Secure versioning file systems provide essentia
Autor:
Christian Stüble, Hans Löhr, Luigi Catuogno, Mark Manulis, Marcel Winandy, Ahmad-Reza Sadeghi
Publikováno v:
Datenschutz und Datensicherheit - DuD. 34:289-294
Trusted Virtual Domains (TVDs) provide a secure IT infrastructure offering a homogeneous and transparent enforcement of access control policies on data and network resources. In this article, we give an overview of the fundamental ideas and basic con
Publikováno v:
WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
WiSec '15
WISEC
WiSec '15
WISEC
The standard approach to privacy-friendly authentication in vehicular ad-hoc networks is the use of pseudonym certificates. The level of location privacy users can enjoy under the threat of an attacker depends on the attacker's coverage and strategy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7e6bd2624eb7a6ab7612706715042460
https://research.utwente.nl/en/publications/463133dc-0e0f-4eb7-9826-8985bd0a62ac
https://research.utwente.nl/en/publications/463133dc-0e0f-4eb7-9826-8985bd0a62ac