Category Archives: IT security

Embedded UICC – Konzept und Zertifzierbarkeit

Embedded UICC (eUICC) zielen auf den Einsatz in Machine-2-Machine Lösungen ab, bei denen die Auswahl des Mobilfunkbetreibers erst nach der Produktion erfolgt, aber zu diesem Zeitpunkt kein Zugang zum Produkt mehr möglich ist. Der Vortrag stellt den aktuellen Stand der … Continue reading

Posted in IT security, Assurance | Comments Off on Embedded UICC – Konzept und Zertifzierbarkeit

Secure delivery of certified products

Secure delivery is the process of transferring certified products to the user. Manipulation during this phase might be undetectable, e.g. implanting Advanced Persistent Threats. Even security domains that Common Criteria approaches rely on may be exploited. The paper assesses the … Continue reading

Posted in IT security, Assurance | Comments Off on Secure delivery of certified products

Network security seminar, winter 2006/2007

Mario Achenbach, Sabine Gattermann, Rolf Karp, Thomas Krügl, Martin Kuchler, Andreas Lohrum, Johannes Ortanderl, Stefan Peters, Patrick Schönberger, Alex Tigaeru, Andreas Wölfl, Reinhold Zieringer University of Passau, Computer Networks & Communcations Network security has a tremendous impact on today’s operation … Continue reading

Posted in IT security, Assurance, Teaching | Comments Off on Network security seminar, winter 2006/2007

Security Considerations for Next Generation Internet

Jens Oberender, Markus Fiedler Deliverable No: D.WP.JRA.6.3.7, Design and Engineering of the Next Generation Internet, towards convergent multi-service networks (Euro-NGI), 2007 A major trend for security solutions can be described by a couple of added values such as scalability, self-configuration … Continue reading

Posted in IT security, Anonymity Networks, The Peer-to-Peer Paradigm, Publications | Comments Off on Security Considerations for Next Generation Internet

Denial-of-Service Flooding Detection in Anonymity Networks

Jens O. Oberender, Melanie Volkamer und Hermann De Meer IEEE Workshop on Monitoring, Attack Detection and Mitigation (MonAM) 2007 Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node diversity. Anonymity networks provide this by hiding the communication relationship and therefore hinder attack detection. After … Continue reading

Posted in IT security, Anonymity Networks, The Peer-to-Peer Paradigm, Common Goods, Publications | Comments Off on Denial-of-Service Flooding Detection in Anonymity Networks

IT-Security seminar, summer 2006

Thomas Bernreiter, Andreas Busler, Andreas Fischer, Alberto Fuentes Pérez, Sebastian Huber, Pham Hai Dang Le, Wolfgang Pfnür, Kerstin Renner, Mario Scheu, Alexander Stenzer University of Passau, Computer Networks & Communcations IT-Security is a complex, many-faced topic. Its importance requires considerations … Continue reading

Posted in IT security, Assurance, Teaching | Comments Off on IT-Security seminar, summer 2006

Network Security, summer 2006

Kim Lim Fong, Tanja Kellhammer, Guido Höke, Toni Michel, Christian Rodiek, Hendrik Speidel University of Passau, Computer Networks & Communcations Network security has a tremendous impact on today’s operation of networked IT systems. Consequently the awareness of future decision makers must … Continue reading

Posted in IT security, Teaching | Comments Off on Network Security, summer 2006