03/2014 |
|
Sample or Random Security – A Security Model for Segment-Based Visual Encryption, Financial Cryptography and Data Security 2014, Barbados |
09/2013 |
|
Greeting and Introduction to the Workshop., 'Der Mensch im Fokus: Möglichkeiten der Selbstkontrolle von Datenschutz und Datensicherheit durch den Anwender", Informatik 2013, Koblenz |
09/2013 |
|
The Challenge of Authentication in Insecure Environments , Disputation, Kassel |
03/2013 |
|
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers , 24. Kolleg Sicherheit, Forschungsseminar, Dortmund |
03/2012 |
|
Reusing keys in visual cryptography, 22nd Kolleg Sicherheit, Forschungsseminar, Dortmund |
03/2012 |
|
Sample or Random Security, LS14 Workshop, internal Research Workshop, Essen |
10/2011 |
|
UMLsec: Secure Links Revisited, LS14 Workshop, internal Research Workshop, Essen |
03/2011 |
|
Human Decipherable Encryption, LS14 Workshop, internal Research Workshop, Essen |
03/2009 |
|
Some Observations on Reusing One-Time Pads within Dice Codings, PET-CON 2009.1, Dresden |
03/2009 |
|
Some Observations on Reusing One-Time Pads within Dice Codings, 10. Kryptotag, Berlin |
09/2008 |
|
A Survey on Untransferable Anonymous Credentials, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Brno |
07/2008 |
|
Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials, 2. Kryptowochenende, Tabarz |
02/2008 |
|
Embedding Biometric Information into Anonymous Credentials, PET-CON 2008.1, Aachen |
08/2007 |
|
Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Karlstad |
08/2005 |
|
Gitterbasierte Kryptosysteme: Ajtai-Dwork und Regev, HGI/RUB Bochum |
04/2004 |
|
Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops, Workshop "Gaming Applications in Pervasive Computing Environments", PERVASIVE 2004, the 2nd International Conference on Pervasive Computing, Wien |
05/2003 |
|
Security Aspects of the Ajtai-Dwork Cryptosystem, Oberseminar am Lehrstuhl J. Buchmann, TU Darmstadt |