Carsten Rudolph
Cited by
Cited by
On the security of fair non-repudiation protocols
S Gürgens, C Rudolph, H Vogt
International Conference on Information Security, 193-207, 2003
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
Security evaluation of scenarios based on the TCG’s TPM specification
S Gürgens, C Rudolph, D Scheuermann, M Atts, R Plaga
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
Security analysis of (un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing, 97-114, 2003
Towards an improved understanding of human factors in cybersecurity
J Jeong, J Mihelcic, G Oliver, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
Security of digital evidence
J Richter, N Kuntze, C Rudolph
Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth …, 2010
Can I trust the data I see? A Physician's concern on medical data in IoT health architectures
FT Jaigirdar, C Rudolph, C Bain
Proceedings of the Australasian computer science week multiconference, 1-10, 2019
Covert identity information in direct anonymous attestation (DAA)
C Rudolph
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
On a formal framework for security properties
S Gürgens, P Ochsenschläger, C Rudolph
Computer Standards & Interfaces 27 (5), 457-466, 2005
A user-centric privacy manager for future energy systems
HS Fhom, N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
2010 International Conference on Power System Technology, 1-7, 2010
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
Towards a blockchain based fall prediction model for aged care
T Rupasinghe, F Burstein, C Rudolph, S Strange
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2019
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
S Gurgens, P Ochsenschlager, C Rudolph
Proceedings. 13th International Workshop on Database and Expert Systems …, 2002
Authenticity and provability—a formal framework
S Gürgens, P Ochsenschläger, C Rudolph
Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK …, 2002
Secure digital chains of evidence
N Kuntze, C Rudolph
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011
A formal notion of trust–enabling reasoning about security properties
A Fuchs, S Gürgens, C Rudolph
Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010 …, 2010
Interoperable device identification in smart-grid environments
N Kuntze, C Rudolph, I Bente, J Vieweg, J von Helden
2011 IEEE Power and Energy Society General Meeting, 1-7, 2011
Towards semantic resolution of security in ambient environments
A Maña, C Rudolph, M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, ...
Developing Ambient Intelligence: Proceedings of the International Conference …, 2008
Trust infrastructures for future energy networks
N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
IEEE PES General Meeting, 1-7, 2010
Secure web service workflow execution
C Rudolph, N Kuntze, Z Velikova
Electronic Notes in Theoretical Computer Science 236, 33-46, 2009
The system can't perform the operation now. Try again later.
Articles 1–20