..
Suche
Hinweise zum Einsatz der Google Suche
Personensuchezur unisono Personensuche
Veranstaltungssuchezur unisono Veranstaltungssuche
Katalog plus

Papers

2019

  • N. Zivic, C. Ruland and O. Ur-Rehman, "Addressing Byzantine Fault Tolerance in Blockchain Technology," 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), Manama, Bahrain, 2019, pp. 1-5 [Link].
  • N. Zivic, C. Ruland, J. Sassmannshausen: Distributed Ledger Technologies for M2M Communications, The 33rd International Conference on  Information Networking (ICOIN 2019) January 9-11, 2019, Kuala Lumpur, Malaysia [Link].
  • O. Ur-Rehman, N. Zivic, C. Ruland: An Overview of Automotive Security Standards, Mipro 2019, 20-24 May 2019, Opatija, Croatia [Link].
  • C. Ruland: Protect and Conserve Robot's Transactions, Invited Talk on the 4th World Congress of Robotics 2019 (WCR-2019), Aug. 31-Sep. 1, Shenyang, China
  • C. Ruland, J. Sassmannshausen: System-wide Traceability of Commands and Data Exchange in Smart Grids, SEST'19 - 2nd International Conference on Smart Energy Systems and Technologies, September 9-11, Porto, Portugal (paper accepted).

2018

  • C. Ruland, J. Sassmannshausen, Jyoti Pragyan Satpathy "An Attribute Certificate Management System for Attribute-based Access Control" 5th Annual Conf. on Computational Science & Computational Intelligence (CSCI'18), Las Vegas, Dec 13-15, 2018 [Link].
  • C. Ruland, J. Sassmannshausen "Access Control in Safety Critical Environments" 12th International Conference on Reliability, Maintainability and Safety (ICRMS2018), Shanghai, China, Oct 15-17, 2018 [Link].
  • C. Ruland, J. Sassmannshausen, "Firewall for Attribute-Based Access Control in Smart Grids," 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 2018, pp. 336-341. [Link]
  • Asmaa Tellabi, Jochen Sassmannshausen, Edita Bajramovic, and Karl Christoph Ruland. Overview of authentication and access controls for i&c systems. In 16th IEEE International Conference on Industrial Informatics, INDIN 2018, Porto, Portugal, July 18-20, 2018, pages 882–889, 2018. [Link]
  • N. Zivic and C. Ruland, "Cognitive Channel Decoding", Future of Information and Communication Conference (FICC 2018), Singapore, Apr. 2018.
  • N. Zivic and C. Ruland, "Cognition for Enhanced Biometric Authentication," The 32nd International Conference on Information Networking (ICOIN 2018), Chang Mai, Thailand, Jan. 2018.

2017

  • R. A. Djeujo and C. Ruland, "QoSs definition and session description protocol for secure communication using compressive sensing," 6th International Conference on Future Generation Communication Technologies Conference (FGCT), Dublin, Ireland, Aug. 21-23, 2017, pp. 1-7.
  • R. A. Djeujo and C. Ruland, "Secret matrix lifecycle management for compressive sensing based cryptographic mechanisms," IEEE 3th Annual Conference in Computing, Communication, Control, And Automation Conference (ICC3A), Pune, India, Aug. 17-18, pp. 1-10.
  • O. Ur Rehman and N. Zivic, "Two-phase Method for Image Authentication and Enhanced Decoding", IEEE Access, vol. 5, issue 1, pp. 12158-12167, Dec. 2017.
  • R. Fay, C. Bender, N. Klein, D. Krönert, F. Kußmaul, S. Merz, T. Pieper, J. Saßmannshausen, T. Steinbring, and C. Wurmbach. Gefahrlos durch den Nebel - Ein Sicherheitskonzept für das Fog Computing. 15. Deutscher IT-Sicherheitskongress, BSI, Mai 16-18, 2017, Bonn, Germany.
  • C. Ruland, J. Sassmannshausen, K.Waedt and N. Zivic, "Smart grid security - an overview of standards and guidelines", e & i Elektrotechnik und Informationstechnik, vol 134, issues 1, pp. 19-25, Feb 2017, Springer Wien. [Link]
  • O. Ur Rehman and N. Živić, "Discrete Wavelet Transform based Watermarking for Image Content Authentication", 6th International Conference on Pattern Recognition Applications and Methods, Porto, Portugal, Feb. 24-26, 2017.
  • O. Ur Rehman, N. Živić and C. Ruland, "Approximate Image Authentication and Correction Using Spatial and Frequency Domain Features", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • R. Fay and C. Ruland, "Compressed Sampling and Authenticated-Encryption", 11th International ITG Conference on Systems, Communications and Coding (SCC 2017), Hamburg, Germany, Feb. 6 - 9, 2017.
  • N. Živić, O. Ur Rehman and C. Ruland, "Iterative Decoder for OFDM Transmission over Rayleigh Channel", 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, Jan. 11 - 13, 2017.
  • R. A. Djeujo and C. Ruland, “Embedding cryptographically secure matrix transformation in structured compressive sensing,” IEEE Annual Computing and Communication Workshop and Conference (CCWC 2017), pp. 529–535, Las Vegas, USA, Jan 9-11, 2017.

2016

  • N. Zivic and O. Ur Rehman, "Improved OFDM Decoder for LTE and Beyond", The 2016 International Conference on Computational Science and Computational Intelligence (CSCI'16), Las Vegas, USA, Dec. 15 - 17, 2016.
  • R. Fay and C. Ruland, "Compressive Sensing Encryption Modes and their Security", 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, Dec. 5-7, 2016.
  • G. Gala, T. Koller, D. G. Pérez, G. Fohler and C. Ruland, "Timing Analysis of Secure Communication between Resource Managers in DREAMS," Workshop on Security and Dependability of Critical Embedded Real-Time Systems, Porto, Portugal, Nov. 29, 2016. [Link]
  • N. Zivic and O. Ur Rehman, "Soft Authentication Techniques for Images", 24th Telecommunications Forum (TELFOR 2016), Belgrade, Serbia, Nov. 22-23, 2016. [Link]
  • C. Ruland, N. Kang and J. Sassmannshausen, "Rejuvenation of the IEC 61850 Protocol Stack for MMS", IEEE International Conference on Smart Grid Communications (SmartGridComm 2016), Sydney, Australia, Nov. 6-9, 2016. [Link]
  • S. Abbas, F. Ahmed, N. Zivic and O. Ur Rehman, "Perceptual Image Hashing using SVD based Noise Resistant Local Binary Pattern", The 8th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2016), Lisbon, Portugal, Oct. 18-20, 2016. [Link]
  • T. Koller, G. Gaula, D. G. Perez, C. Ruland, G. Fohler, "DREAMS: Secure Communication between Resource Management Components in Networked Multi-Core Systems", IEEE Conference on Open Systems 2016 (ICOS 2016), Langkawi, Malaysia, Oct. 10-12, 2016 (Best paper award).[Link]
  • R. A. Djeujo and C. Ruland, “Secure matrix generation for compressive sensing embedded cryptography,” IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON 2016), pp. 250–257, Vancouver, BC, Canada, Oct. 13-15, 2016. [Link]
  • N. Zivic, O. Ur Rehman and C. Ruland, "Smart Metering for Intelligent Buildings", Transactions on Machine Learning and Artificial Intelligence, vol. 4, no. 5, Oct. 2016. [Link]
  • T. Koller, D. Weber, "Security Services for Mixed-Criticality Systems Based on Networked Multi-core Chips", International Conference on Computer Safety, Reliability and Security (SafeComp 2016), Trondheim, Norway, Sep. 20-23, 2016. [Link]
  • M. Schneider and C. Ruland, "Verification of Time Signals", 30th European Frequency and Time Forum (EFTF), York, UK, Apr 4-7, 2016. [Link]
  • O. Ur Rehman, N. Zivic and C. Ruland, "Content based Image Authentication with Error Correction", IEEE International Conference on Communications (IEEE ICC'16), Communication and Information System Security Symposium, Kuala Lumpur, Malaysia, May 23-27, 2016. [Link]
  • R. Fay, "Introducing the Counter Mode of Operation to Compressed Sensing Based Encryption", Information Processing Letters, Elsevier, Volume 116, Issue 4, Apr 2016, pp. 279–283. [Link]

2015

  • J. Saßmannshausen and C. Ruland, "Nachweisbarkeit in Smart Grids auf Basis von XML-Signaturen", D.A.CH Security 2015, syssec  IT Security & IT Management, p. 98–109, Frechen, Germany, Sep 8-9, 2015.
  • J. Saßmannshausen and C. Ruland, "End-to-End-Authentication in Smart Grid Control", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19, 2015. [ Link]
  • M. Schneider and C. Ruland, “Verification of time telegrams in Long Wave Radio systems", IEEE 2015 Joint Conference of the IEEE International Frequency Control Symposium & the European Frequency and Time Forum (IFCS-EFTF), Denver, Colorado, USA, pp. 270-275, Apr 12-16 2015. [Link]
  • S. Tabatabaei, O. Ur Rehman, N. Zivic, and C. Ruland, "Secure and Robust Two-Phase Image Authentication", IEEE Transactions on Multimedia, vol. 17, no. 7, pp. 945-956, May 2015. [Link]
  • O. Ur Rehman, A. E. Tabatabaei, N. Zivic, and C. Ruland, "Spatial and Frequency Domain Complementary Watermarks for Image Authentication and Correction," in the 10th International ITG Conference on Systems, Communications and Coding (SCC 2015), Hamburg, Germany, pp.1-6, Feb 2-5, 2015. [Link]
  • O. Ur Rehman, N. Zivic, "Secure Design Patterns for Security in Smart Metering Systems", 9th IEEE European Modelling Symposium (EMS 2015), Madrid, Spain, Oct 6-8, 2015. [Link]
  • O. Ur Rehman, N. Zivic, and C. Ruland, "Security Issues in Smart Metering Systems", IEEE International Conference on Smart Energy Grid Engineering (SEGE 2015), Oshawa, Canada, Aug 17-19, 2015 (Overall best paper award). [Link]
  • N. Zivic, O. Ur Rehman and C. Ruland, "Evolution of Smart Metering Systems", 23rd IEEE Telecommunications Forum (TELFOR 2015), Belgrade, Serbia, Nov 24-26, 2015. [Link]
  • J. Sassmannshausen, C. Ruland, "Non-repudiation Services for the MMS Protocol of IEC 61850", Security Standardization Research Conference (SSR 2015), Tokyo, Japan, Dec 15-16, 2015. [Link]

2014

  • C. Ling, O. Ur-Rehman and W. Zhang, "Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature," KSII Transactions on Internet and Information Systems, vol. 8, no. 12, pp. 4568-4587, Dec. 2014. [Link]
  • A. Schantin and C. Ruland, “A Bit-Error Based Capture Model for EPCglobal RFID Systems,” in 52th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014, pp. 221–226. [Link]
  • S. Tabatabaei and N. Zivic, “Revisiting a Primitive: Analysis of Approximate Message Authentication Codes,” in IEEE International Conference on Communications (ICC'14): , Sydney, Australia, 10 - 14 Jun, 2014. [Link]
  • O. Ur Rehman, N. Zivic, "Soft decision iterative error and erasure decoder for Reed–Solomon codes," IET Communications, vol. 8, no. 16, pp. 2863-2870, Nov 2014. [Link]
  • J. Shin, and C. Ruland, "A Novel Design of Content based Multimedia Security," in 9th Future Security Conference, Berlin, Germany, 16 - 18 Sep. 2014.
  • J. Shin, and C. Ruland, "A Hybrid Approach for Content Based Image Authentication," in 11th International Conference on Security and Cryptography (SECRYPT'14), Vienna, Austria, 28 - 30 Aug. 2014, pp. 371-378. [Link]
  • O. Ur Rehman, N. Živić, C. Ruland: "Security in Smart Metering Systems under the Smart-Grid Perspective", Tutorium, IEEE BlackSeaCom 2014, May 2014, Chisinau, Moldova

2013

  • S. Rostami, Bamohabbat S, and S. Tabatabaei, “Related-key impossible differential cryptanalysis of full-round HIGHT,” in 10th International Conference on Security and Cryptography (SECRYPT’13), Reykjavik, Iceland, 29 - 31 Jul. 2013, pp. 537–542.
  • A. Schantin, “Iterative decoding of baseband and channel codes in a long-range RFID system,” in IEEE International Conference on Industrial Technology (ICIT), Cape Town, South Africa, 25 - 28 Feb. 2013, pp. 1671–1676.
  • A. Schantin and C. Ruland, “Retransmission Strategies for RFID Systems Using the EPC Protocol,” in IEEE International Conference on RFID Technologies and Applications (RFID-TA), Johor Bahru, Malaysia, Johor Bahru, Malaysia, 4 - 5 Sep. 2013, pp. 1–6.
  • M. Schneider and C. Ruland, “Sicherheit von Broadcast-Datendiensten im Smart Grid am Beispiel der Rundsteuertechnik,” in Informationssicherheit stärken - Vertrauen in die Zukunft schaffen: [Tagungsband zum 13. Deutschen IT-Sicherheitskongress], Gau-Algesheim: SecuMedia-Verl, pp. 483–496.
  • J. Shin and C. Ruland, “A Survey of Image Hashing Technique for Data Authentication in WMSNs,” in Workshop on Internet of Things Communications and Technologies (IOT 2013), Lyon, France, 7 - 9, Oct. 2013, pp. 253–258.
  • S. Tabatabaei and C. Ruland, “The Analysis of an NMF-based Perceptual Image Hashing Scheme,” in 13th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'13), Athens, Greece, 12 - 15 Dec, 2013.
  • S. Tabatabaei, O. Ur Rehman, and N. Zivic, “A DWT-based Image Authentication and Correction Mechanism,” in 55th International Symposium ELMAR-2013, Zadar, Croatia, 25 - 27 Sep. 2013, pp. 79–82.
  • S. Tabatabaei, O. Ur Rehman, and N. Zivic, “AACI: The Mechanism for Approximate Authentication and Correction of Images,” in IEEE International Conference on Communications 2013 (ICC'13), Workshop on Information Security over Noisy and Lossy Communication Systems, 9 - 13 Jun. 2013, pp. 717–722.
  • O. Ur Rehman, S. Tabatabaei, N. Zivic, and C. Ruland, “Soft Authentication and Correction of Images,” in Proceedings of 2013 9th International ITG Conference on Systems, Communication and Coding (SCC), Munich, Germany, 21 - 24 Jan. 2013, pp. 1–6.
  • O. Ur Rehman and N. Zivic, “Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images,” WSEAS Transactions on Systems, vol. 12, no. 7, pp. 371–383, http://wseas.org/cms.action?id=6952, 2013.

2012

  • H. Cankaya, C. Grepet, J. Holle, and J. Simó: "Enabling the Deployment of Open In-Vehicle ITS Stations", in 19th ITS World Congress Vienna 2012, 2012.
  • J. Holle and H. Cankaya, "Designing Open Computing Platforms with Security in Mind", Presentation only. Doha: ETSI, Feb. 2012.
  • J. Holle, A. Platschek, J. Sánchez, and J. Shin, "OVERSEE - A Secure and Open In-Vehicle ITS Station", in 19th ITS World Congress Vienna 2012 , 2012.
  • R. Schick and C. Ruland: "Non-Repudiation of Forwarding: Traceability of Confidential Data Via Multiple Recipients", in 9th International Conference of Security and Cryptography : SciTePress,2012, pp. 387–390.
  • R. Schick and C. Ruland, "On the Security of the Non-Repudiation of Forwarding Service", in Trust, Privacy and Security in Digital Business: 9th International Conference, TrustBus 2012,Vienna, Austria, September 3-7, 2012. Proceedings , Berlin, Heidelberg, s.l.: Imprint: Springer,2012, pp. 167–178.

2011

  • A.Groll, J. Holle, M. Wolf, and T. Wollinger: “Platforma de TI para veículos,” , RTI - Redes, Telecom e Instalações, vol. XII, no. 136, pp. 84–94,http://www.arandanet.com.br/midiaonline/rti/2011/setembro/index.html, 2011.,
  • J. Holle, “OVERSEE - Potentials and Challenges for the Automotive Industry,” , Nürnberg: embedded World Conference 2011, Mar. 2011.,
  • J. Holle, A.Groll,. Wolf, H. M Cankaya, and C. Grepet “TOWARDS A SHARED DIGITAL COMMUNICATION PLATFORM FOR VEHICLES,”, in 18th World Congress on IntelligentTransport Systems, Orlando, 2011.,
  • Mahmood, A., Zivic, N.: A New Scheme of Forward Error Correction Using Block Cliphers, IEEE International Conference on Digital Divergence, Hyderabad, India,2011
  • Mahmood, A., Zivic, N.: Bit Error Rate Improvement Using Soft Output of MAP Decoder and Avalanche Effect of Block Ciphers, IEEE International Conference on Computers, Communications, Control and Automation, Hong Kong, China, 2011
  • Rehman, O.-U., Zivic, N.: Impact of Bit-Flip Combinations on Successive Soft Input Decoding of Reed Solomon Codes, 4th Intern. Conference on Communication Theory, Reliability, and Quality of Service Budapest,Hungary,2011
  • Rehman, O.-U., Zivic, N.: Iterative Bit Flip Type-II Hybrid-ARQ Scheme for Wireless Networks, 17th European Wireless Conference, Vienna, Austria, 2011
  • Rehman, O.-U., Zivic, N.: Multi-Layer Data Protection using N-Channel Stop-and-Wait Hybrid-ARQ in WiMAX, 16th IEEE International Symposium on Computers and Communications, Corfu, Greece, 2011
  • Rehman, O.-U., Zivic, N.: Successive Iterative Decoding of Reed Solomon Codes using Cryptographic Hash Codes as Parity, 7th International Conference on Innovations in Information Technology, Abu Dhabi, UAE, 2011
  • A. Schantin, N. Zivic, and G. Bodean,: “Soft decision decoding of the matroid codes,”, in Microwave and Telecommunication Technology (CriMiCo), 2011 21th International Crimean Conference , 2011, pp. 469–470.
  • R. Schick; C. Ruland, "Data Leakage Tracking- Non Repudiation of Forwarding," in First Internation Conference on Informatics Engineering and Information Science, 2011, pp. 163-173.
  • R. Schick; C. Ruland, "Document Tracking- On the Way to a New Security Service," in Sixth Conference on Network Architectures and Information Systems Security, 2011, pp. 89-93.
  • R. Schick; C. Ruland, "Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data," in Second Intrnational Conference on Advances in Information and Communication Technologies, 2011.
  • J. Holle, A. Groll, C. Ruland, H. Cankaya and M. Wolf, "OPEN PLATFORMS ON THE WAY TO AUTOMOTIVE PRACTICE," in 8th ITS European Congress, Lyon, 2011.

2010

  • C. Bodenstedt, C. Ruland, D. Weber, and A. Kung : “Integration of Security and Dependability into Resource constrained Embedded Systems,” , in The 3rd International Conference on Telecommunications, Electronics and Inforatics , Chisinau, Moldova: Technical University of Moldova, 2010, pp. 93–98.
  • A. Groll, J. Holle, M. Wolf, and T. Wollinger: “Next Generation of Automotive Security: Secure Hardware and Secure Open Platforms,” in Seventinth ITS World Congress Busan 2010 , Busan, Korea, 2010.
  • A. Groll, J. Holle, and C. Ruland “Upcoming Trends in the Automotive IT and Associated Security Challenges,” , in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 2010, pp. 25–30.
  • A. Groll, M. Müter, and F. C. Freiling,“A Structured Approach to Anomaly Detection for In-Vehicle Networks,” , in Sixth International Conference on Information Assurance and Security (IAS), Atlanta, GA, 2010, pp. 92–98.
  • A. Mahmood and N. Zivic, “Bit Error Rate Improvement Using Soft Outputs of MAP Decoder and Avalanche Effect of Block Ciphers,” ,” in International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome , Italy, 2010
  • Zivic, N., O. ur Rehman: Soft Input Decoding of Reed Solomon Codes with Miscorrrection 4th Intern. Conference on Signal Processing and Communications Systems / IEEE, December 2010, Gold Coast/Australia
  • Zivic, N., Ruland, C.: Security Architecture of Smart Metering Systems, 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina , November 2010, Proceedings,ISBN: 3-642-16282-7 Verlag Springer, pp. 249-259
  • R. Schick, S. Tcaciuc, and C. Ruland, “Information Security of Multimodal Input Data -Traceability of Image Data,”, in The 3rd International Conference on Telecommunications, Electronics and Inforatics, Chisinau, Moldova: Technical University of Moldova, 2010, pp. 31–34.
  • M. Schneider and C. Ruland: “Steckdose als virtuelle Zapfsäule"in EMA 2010 , Elektromobilausstellung: Fachtagung, Wettbewerbe ; Vorträge der ETG-Fachtagung vom 8. bis 9. Oktober 2010 in Aschaffenburg , Berlin: VDE-Verl, 2010, pp. 161–169.
  • M. Schneider, S. Tcaciuc, and C. RulandZ: “Secure metering for electrical vehicles,” , in E-Mobility: Technologien - Infrastruktur - Märkte ; VDE-Kongress 2010 Leipzig, 8.-9. November 2010 Congress Center Leipzig ; Kongressbeiträge, Berlin: VDE-Verl, 2010, pp. FZT 1.4.13.
  • Zivic, N., Mahmood, A.,: Improvement of Channel Decoding using Block Cypher 4th Intern. Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010)/IEEE, October 2010, Florence/Italy
  • Zivic, N.: On using the message digest for error correction in wireless comunication networks Int. Werkshop on Wireless Distributed Networks (WDN2010), Istanbul, Turkey, September 2010
  • Zivic, N.: Simulation and Application of Soft Input Decryption, In: 2. Int. Conference on System Simulation (SIMUL 2010), Nice, France, August 2010
  • Zivic, N., O.ur Rehman, Ruland,C.: Iterative Bit-Flipped Decoding of Concatenated Reed Solomon/Convolutional Codes with HMAC Int. Simulat.-Multiconference, Ottawa, Canada, 12.-14. Juli 2010, ISSN 1-56555-344-6 (CD)
  • N. Zivic, O.-U. Rehman, and C. Ruland: “On the Probability and Impact of Collisions on Soft Input Decryption,” in International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome , Italy, 2010, pp. 1–5.

2009

  • A. Groll.: "Authentischer Nachrichtenaustausch über In-Fahrzeug-CAN-Netze unter Berücksichtigung automobiler Anforderungen,". In: in Wissenschaftliches Kommunikations-und Sicherheitskolloquium 2009 , C. Ruland, Ed.: Shaker Verlag, 2009, pp. 117–129.
  • N. Zivic, O. Ur Rehman: Cryptographic check functions for Forward Correction MASAUM Journal of Computing (MJC),Vol 1, No 4, November 2009.
  • N. Zivic, O. Ur Rehman: Analysis of Serial and Parallel Soft Input Decryption Schemes over a Wireless Channel IEEE SPECTS 2009, Istanbul, Türkei, 13.-16. Juli 2009, IEEE Press, Piscataway, NJ/USA, ISBN 978-1-4244-4165-5.
  • N. Zivic, O. Ur Rehman: Using HMAC for Error correction over Wireless Channel IEEE WiMo 2009, Brisbane, Australien, 7.-10. Juli 2009 , IEEE Computer Society, ISBN 978-7695-3737-5, pp. 252-256.
  • N. Zivic, O. Ur Rehman: Error Correction over Wireless Channel Using Symmetric Cryptography IEEE Wireless ViTAE, Aalborg, Denmark, 17.-20. Mai 2009, ISBN 978-1-4244-4067-2, pp. 752-756.
  • A. Groll: Secure and Authentic Communication on Existing Vehicle Networks Proceedings of the IEEE Intelligent Vehicles Symposium (IV) Xi'an, China, 2009, ISBN: 978-1-4244-3504-3 IEEE Explore pp 1093-1097.
  • A. Groll: Gefahren der In-Fahrzeug-Kommunikation moderner Automobile Sichere Wege in der vernetzten Welt: Tagungsband zum 11. Deutschen IT-Sicherheitskongress, SecuMedia-Verlag,Gau-Algesheim, 2009, ISBN: 978-3922746973

2008

  • A. Groll, J. Holle: Simulative Bestimmung der CAN-Bus-Lastgrenzen Automotive-Safety & Security 2008 - Sicherheit und Zuverlässsigkeit für automotive Informationstecnik: 19. u. 20.11.2008, Stuttgart, Shakerverlag, 2008, ISBN: 978-3832276812
  • Groll, A. Trusted Communication Groups for Authentic In-Car Communication Proceedings of the 6th escar - Embedded Security in Cars Conference, 18.-19.11.2008, Hamburg
  • Dunte, M., Ruland, C.: Realising Time-Iimitation for Cryptographic Keys in Secure Multimedia Distribution Security and Communication Networks, Vol. 1 (2008), No. 6, pp 451-459. ISSN: 1939-0114.
  • Zivic, N., Ruland, C.: Parallel Joint Channel Coding and Cryptography International Journal of Computer Science and Engineering, WASET World Academy of Science, Engineering and Technology, Volume 4, Number 2, Spring 2008, pp. 140-144, ISSN: 2070-3945.
  • Zivic, N., Ruland, C.: Parallel Joint Channel Coding and Cryptography Proceedings of World Academy of Science, Engineering and Technology, Volume 31, July 2008, pp. 539-539, ISSN: 1307-6884.
  • Dunte, M., Ruland, C.: Construction and Usage of Time-limited Keys in Secure Multimedia Distribution Multimedia Security in Communication (MUSIC'08). CHINACOM '08. 2008 International Conference on, International Conference on Multimedia Security in Communication (MUSIC'08), Hangzhou, China, 25 - 28 August 2008. ISBN: 978-1-4244-2374-3.
  • Zivic, N., Ruland, C.: Optimization of Soft Input Decryption Mendel 2008, 14th Intern. Conference on Soft Computing, Brno University of Technology, Brno, Czech Republic, 18.-20.6.2008, pp 241-246, ISBN: 978-80-214-3675-6.
  • Zivic, N., Ruland, C.: Feedback in Soft Input Decryption WSEAS Transactions on Communications Issue 5, Volume 7, pp 428-437, May 2008, ISSN: 1109-2742.
  • Dunte, M., Ruland, C.: Delivery Infrastructure for Secure Scalable Coded Multimedia Distributed Computing Systems Workshops, 2008. ICDCS Workshops 2008. 28th IEEE International Conference on, pp. 42-47, 28th IEEE International Conference on Distributed Computing Systems, Beijing, China, 17 - 20 June 2008. ISBN: 978-0-7695-3173-1.
  • Zivic, N., Tcaciuc, S.: Feedback using dummy bits Proccedings of the Applied Computing Conference (ACC '08),Istanbul, Turkey, 27.-30.5.2008, pp 104-107, ISBN: 978-960-6766-67-1.
  • Tcaciuc, S., Ruland, C.: Optimizations of Flow Control under QOS Aspects between Core Network and Access Network Domains Proceeding of the 2nd International Conference "Telecommunications, Electronics and Informatics" (ICTEI 2008),Chisinau, Moldova, 15.-18.5.2008, Volume 1, 2008, pp 37-42, ISBN: 978-9975-45-083-6.
  • Zivic, N., Ruland, C.: Probability of Collisions in Soft Input Decryption International Journal of Applied Mathematics and Informatics, Issue 1, Volume 1, 2007, pp 21-27.
  • Zivic, N., Ruland, C.: Probability of Collisions in Soft Input Decryption Proceedings of the American Conference on Applied Mathematics (MATH '08), Cambridge, Massachusetts, USA, March 2008,pp 362-366, ISBN: 978-960-6766-47-3.
  • Zivic, N., Ruland, C.: Channel Coding as a Cryptography Enhancer Transaction on Communications, Issue 3, Volume 7, pp. 83-91, March 2008, ISSN: 1109-2742
  • Zivic, N., Ruland, C.: Soft Input Decryption using feedback Advances on Software Engineering, Parallel and Distributed Systems, Proceedings of the 2nd WSEAS international conference on Computer Engineering and Applications (CEA '08), pp. 174-177, University of Cambridge, UK, 20.-22.2.2008, ISBN: 978-960-6766-42-8

2007

  • Zivic, N., Ruland, C.: Improvement of Digital Signature Error Rates Information, Communication and Automation Technologies ICAT 2007, Sarajewo, 29.-31.10.2007, ISBN: 978-9958-629-21-1
  • Zivic, N., Ruland, C.: Channel coding as a cryptography enhancer Proceedings in the 11 th WSEAS international conference on Communications, pp. 273-278, Crete Island, Greece, 26.-28.7.2007, ISSN: 1790-5117
  • Dunte, M., Ruland, C.: On the Way to Secure Delivery of Scalable Coded Media Mikulášská kryptobesídka, pp. 51-59, Prag, Tschechische Republik, 2007. ISBN: 80-903083-8-4.
  • Dunte, M., Ruland, C.: Secure Voice-over-IP IJCNS International Journal of Computer Science and Network Security, Vol. 7 No. 6, 30. Juni 2007, pp. 63-68. ISSN 1738-7906.
  • Ruland, C., Zivic, N.: Joint Coding and Decryption Ictis' 07, Fes, Marokko, 3.-5.4.2007.
  • Hick, S., Ruland, C.: Security Aspects for Secure Download of Regulated Software Lambrinoudakis, C., Pernul, G., Tjoa, A M.: TrustBus 2007, LNCS 4657, pp. 219-227, 2007. Springer-Verlag Berlin Heidelberg 2007. ISBN 978-3-540-74408-5.
  • Lohmann, T., Ruland, C.: Digital Signatures Based on Elliptic Curves in RFIDs IJCNS International Journal of Computer Science and Network Security, Vol. 7 No 1, 30. Januar 2007, pp. 275-281. ISSN 1738-7906.

2006

  • Lo Iacono, L., Müller, S., Ruland, C., Zisky, N.: Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt Datenschutz und Datensicherheit (DuD) 06/2006, pp. 347-352. Vieweg & Sohn Verlag, Wiesbaden: 2006. ISSN: 1614-0702.
  • Oikonomidis, N., Ruland, C., Tcaciuc, S.: Deployment of E-Government Municipal Services: Enforcement of Security Polices Secure eGovernment Web Services, Idea Group Publication, Hershey, PA, USA, Juli 2006, pp. 111-123. ISBN: 1-59904-138-3.
  • Ruland, C.: Secure Online Metering for a Liberalized Energy Market Secure eGovernment Web Services, Idea Group Publication, Hershey, PA, USA, Juli 2006, pp. 97-110. ISBN: 1-59904-138-3.
  • Lo Iacono, L., Ruland, C., Zisky, N.: Secure transfer of measurement data in open systems Computer Standards & Interfaces, Vol. 28, 2006. ISSN: 0920-5489.
  • Lohmann, T., Ruland, C.: Security Levels of Bluetooth Workshop on Intelligent Transportation (WIT), Hamburg, 14.-15.3.06. 
  • Lohmann, T., Ruland, C., Schneider, M.: Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags, CARDIS '06, Tarragona, Spanien, 19.-21. April 2006 Smart Card Research and Advanced Applications-CARDIS 2006, LNCS 3928, pp. 278-288, Springer-Verlag, 2006. ISBN 978-3-540-33311-1.
  • Ruland, C., Zivic, N.: Soft Input Decryption, Turbo Coding 2006, 4. Intern. Symposium on Turbo Codes & Related Topics, München, 3.-7. April 2006 Turbo Coding 2006, ITG Fachbericht Band 191. ISBN: 978-3-8007-2947-0.
  • Oikonomidis, N., Ruland, C., Tcaciuc, S.: Enforcement of Security Policies for e-Government Services on Municipal and Cross-Border Level Proceedings of the Int. Conference on e-Government, Ottoawa, Canada, 27.- 28.10.2005, pp. 311-320.
  • Oikonomidis, N., Ruland, C., Tcaciuc, S.: An Architecture for Secure Policy Enforcement in E-Government Services Deployment Lecture Notes in Computer Scence, Springer Verlag, ISSN: 0302-9743, Vol. 3677/2005, Communications and Multmedia Security, 9th IFIP TC-6 TC-11 Intern. Conference, CMS 2005, Salzburg, Austria, 19.-21.9.2005. ISBN: 3-540-28791-4.
  • Kang, N., Kunz, A., Lo Iacono, L., Ruland, C.: Analysis of the QoS Requirements under Radio Access Network Planning Aspects for GPRS/EDGE and UMTS IEEE WirelessCom 2005 Conference, First International Symposium on Wireless Quality-of-Service (WiQoS'05), 13-16 Juni 2005, Maui, Hawaii, USA.
  • Kang, N., Lo Iacono, L., Ruland, C., Kim, Y.: Efficient Application of IPsec VPNs in Wireless Networks ISWPC 2006 Conference Proceedings, pp. 337-341, IEEE conference International Symposium on Wireless Pervasive Computing 2006, 16-18 Jan. 2006, Phuket, Thailand.

2005

  • Jung, S., Kang, N., Kim, Y., Ruland, C.: Efficient Way to Employ Stream Authentication Schemes in Multicast Using Short-lived Keys Preproceedings of WISA 2005 vol.6, The 6th International Workshop on Information Security Applications, 22-24 Aug., 2005, Jeju in Korea.
  • Kahmann, M., Lo Iacono, L., Ruland, C., Schütze, T.: Sicherheitskonzept Das SELMA-Projekt, Konzepte, Modelle, Verfahren. Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Herausgeber: Norbert Zisky, 2005, pp. 165-246, PTB-IT-12, ISBN: 3-86509-257-8.
  • Wahl (geb. Angele), M., Ruland, C., Schütze, T.: Sicherheitsanalyse Das SELMA-Projekt, Konzepte, Modelle, Verfahren. Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Herausgeber: Norbert Zisky, 2005, pp. 117-164, PTB-IT-12, ISBN: 3-86509-257-8.
  • Kaliotzoglou, A., Karantjias, A., Oikonomidis, N., Ruland, C., Tcaciuc, S.: Design Principles and Aspects for Cross-Border Municipal Service Deployment Workshop and Poster Proceedings of the 4th International EGOV Conference, EGOV'05 4th International Conference on Electronic Government, 22-26 August 2005, Denmark, TRAUNER VERLAG, ISBN 3-85487-830-3. 
  • Oikonomidis, N., Ruland, C., Tcaciuc, S.: Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations Second International Conference, TrustBus 2005, Copenhagen, Denmark, 22.-26. August 2005, Proceedigs, pp. 141-150, Springer-Verlag Berlin Heidelberg, LNSC 3592, ISBN 3-540-28224-6.
  • Dietze, L., Holznagel, B., Lo Iacono, L., Ruland, C.: Qualifizierte Signatur im elektronischen Messdatenaustausch Qualifizierte elektronische Signaturen in Theorie und Praxis (QSIG 2005), Workshop im Rahmen der GI Tagung, Sicherheit 2005, 5.-8.4.2005, Regensburg, ISBN: 3-88579-391-1.
  • Hong, K., Jung, S., Lo Iacono, L., Ruland, C.: Impacts of Security Protocols on Real-time Multimedia Communications Lecture Notes, Computer Science, Volume 3325, pp. 1-13, 2/2005.
  • Kang, N., Ruland, C.: Security analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining IEICE Transaction on Communications, Vol. E88-B, No. 3, Mar. 2005, ISSN: 0916-8516.
  • Kang, N., Ruland, C.: MDS: Multiplexed Digital Signature for Real-time Streaming over Multisessions The International Conference on Information Networking (ICOIN) 2005 31.1.-2.2.2005, Jeju, Korea, LNCS V.3391, pp. 824-834, 2005.

2003

  • Ruland, C., Tcaciuc, S.: Scheduler Based Flow Control under QoS Aspects in GPRS/EDGE Networks IEEE International Conference on Networks 2004/ICON 2004, 16.11.-18.11.04, Singapur.
  • Ruland, C., Tcaciuc, S.: A Table Based Scheduler for the QoS enabled Flow Control in GPRS/EDGE Networks IASTED International Conference on Communication Systems and Networks CSN 2004, 1.-3.9.2004, Marbella, Spain.
  • Oikonomidis, N., Ruland, C.: Identity Based Protocols for Secure Electronic Content Distribution and Licensing 4th International Conference on Web Delivering of Music Proceedings of IEEE Computer Society, pp. 92-99, Wedelmusic 2004, 13-14. Sept. 2004, Universität Pompeu Fabra, Barcelona, Spain.
  • Ruland, C., Wahl, M.: Usage of Mobile Agents for Wireless Multimedia Communication Proceedings of IASTED conference on Communication Systems and Applications (CSA 2004), pp. 161-166, Acta-Press, IASTED conference on Communication Systems and Applications (CSA 2004), 8.-10.7.2004, Banff, AB, Canada.
  • Kang, N., Ruland, C.: DiffSig: Differentiated Digital Signature for Real-time Multicast Packet Flows Lecture Notes in Computer Science, pp. 251-260, Springer Verlag, 1st International Conference on Trust and Privacy in Digital Business (TrustBus '04) in conjunction with the 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Zaragoza, Spain, 30.8.-1.9.2004, ISBN 3-540-22919-1.
  • Lo Iacono, L., Ruland, C., Wahl, M.: Einsatz der elektronischen Signatur für den Messdatenaustausch im liberalisierten Energiemarkt (Secure Electronic Exchange of Metering Data) VDI Berichte Nr. 1785, Telematik Tagung, 17.+18.6.2003, Siegen.

2002

  • Ruland, C., Schlake, F.: A Security Protocol Providing QOS in ATM Networks 8th IEEE International Conference on Communication Systems, Singapore, 2002.
  • Friesen, A., Ruland, C.: Das eContract-Konzept Ein Sicherheitsmodell für Multi-Service-Multi-Provider-Architekturen Enterprise Security Tagungsband Enterprise Security, pp. 37-42, IT Verlag, ISBN 3-936052-03-4.
  • Lo Iacono, L., Ruland, C.: Confidential Multimedia Communication in IP Networks 8th IEEE International Conference on Communication Systems, Singapore, 2002.
  • Friesen, A., Ruland, C.: Design eines Profil- und Zertifikatsmanagementsystem für das Service by eContract-Konzept Lecture Notes in Informatics, GI Jahrestagung, GI-Edition, Bonn, 2002. 
  • Lo Iacono, L., Ruland, C.: Eine Sicherheitsarchitektur für den Austausch elektronischer Messdaten im liberalisierten Energiemarkt SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin 2002.
  • Ruland, C., Wahl, M.: Sicherheitsanalyse der Übertragung von Energiedaten über offene Netze SELMA-Workshop, Physikalisch-Technische Bundesanstalt, Berlin 2002.
  • Lo Iacono, L., Ruland, C., Schweitzer, N.: Signing Digital Streams Proceedings of 4th International ITG Conference on Source and Channel Coding, pp. 324-334, 4th International ITG Conference on Source and Channel Coding, 28.-30.1.2002, VDE-Verlag, Berlin, ISBN: 3-8007-2670-X.

2001

  • Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.: Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS V. Varadharajan u. Y. Mu (Eds), LNCS 2119, pp. 344-359, Springer-Verlag, Berlin Heidelberg, ACISP, 2001.
  • Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.: Properties of Modes of Operation with Statistical Self-Synchronization Mechanisms ICICS Shaping The New Information ERA, 3rd International Conference on Information, Communications and Signal Processing, 15-18 October 2001, Singapore, ISBN: 981-04-5149-0.
  • Jung, O., Kuhn, S., Ruland, C., Wollenweber, K.: Suitability of Cryptographic Modes of Operation for the Encryption in High- Speed Networks IEEE Proceedings, pp. 134-139, ICON 2001, Bangkok, Thailand, Oktober 2001.
  • Friesen, A., Ruland, C.: Service by e-contract - a security model for authentication, access control and online subscription management multi-service-multi-provider architectures Proceedings, Volume II Information Systems, pp. 581-585, World Multiconference on Systemics, Cybernetics and Informatics, Orlando, v. 22.- 25.7.2001, ISBN: 980-07-7542-0.
  • Geuer-Pollmann, C., Ruland, C.: XML-Sicherheit - Stand heute Sicherheit im Internet, pp. 197-209, Bd. 7, Ingelheim, SecuMedia Verlag, 2001, 7. Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg, 14.5.2001, ISBN 3-922746-36-5.
  • Ruland, C., Schweitzer, N.: Digitale Signatur von Bitströmen, 7. Deutscher IT-Sicherheitskongress BSI 2001, Bonn Bad Godesberg, Mai 2001, Secumedia-Verlag, Ingelheim 2001. 

2000

  • Ruland, C., Weissmann, O.: Advanced Encryption Standard Funkschau, 2000 
  • Ruland, C., Weissmann, O.: Secure Subscription Management on Agent based Platforms Globalcom 2000, San Francisco, 27.11.-1.12.2000. 
  • Geuer-Pollmann, C., Moula, M., Ruland, C., Sklavos, P.: Digital Signatures for Web Content E-business: Key Issues, Applications and Technologies, pp. 218-224, IOS Press, Amsterdam, Oktober 2000.

1999

  • Friesen, A., Oikonomidis, N. , Ruland, C., Weissmann, O.: A Distributed Certificate Management System for Use in Agent System Workshop Proceedings, M1-M9, 2nd ACTS Workshop, Singapore, 12/1999.
  • Jung, O., Ruland, C.: Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks Tagungsband Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Springer Verlag, CHES Workshop, 12-13 August 1999, Worcester, USA.
  • Ruland, C.: Security vor dem Wachstumsschub Comparex Journal, Nr. 28/1999, pp. 10-11, Comparex Inform. Systeme, Mannheim 
  • Kuhn, S., Ruland, C., Wollenweber, K.: ATM-Encryption with 155 Mbit/s. IEEE ATM-Workshop '99 , 24.-27.5.1999, Kochi-Japan.
  • Geuer-Pollmann, C., Ruland, C.: Das Simple Signature Protocol für WWW-Sicherheit Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, pp. 461-465, Secumedia-Verlag, Ingelheim 1999.
  • Ruland, C., Weissmann, O.: Zugangskontrolle für universelle Dienstenutzung in Agentensystemen Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, pp. 455-460, Secumedia-Verlag, Ingelheim 1999.
  • Kuhn, S., Ruland, C., Wollenweber, K.: ATM-Verschlüsselung mit 155 Mbit/s Tagungsband 6. Deutscher IT-Sicherheitskongreß des BSI 1999, pp. 287-295, SecuMedia-Verlag, Ingelheim 1999.

1998

  • Ruland, C.: Electronic Commerce 25 Jahre Telemation, Jubiläumsausgabe 10/1998, S.1-9.

1997

  • Ruland, C.: Regierung umgeht Datenschutz: Orwell durch die Hintertür? Computerwoche 15/1997, S.20. 
  • Ruland, C.: Breitbandverschlüsselung (155 Mbit/s) mit Selbstsynchronisation 5. Deutscher IT-Sicherheitskongreß des BSI 1997, „Mit Sicherheit in die Informationsgesellschaft“, Tagungsband erschienen im SecuMedia Verlag, Ingelheim,1997,Seite 289-301.

1995

  • Fox, D., Henn, T., Reichel, K., Ruland, C.: Guardeded Authentic Local Area Network - GALAN -. In: Brüggemann, H.-H.; Proceedings der Fachtagung Verläßliche Systeme – VIS'95,DuD-Fachberichte, Vieweg-Verlag, Braunschweig, Seite 163-180.
  • Ruland, C.: Datenkompression. In: Das Telekommunikationswerk (Hrsg. D. Schulte), Interest Verlag GmbH, Augsburg, 1995, Teil 4, Kap. 11, S. 1-48.
  • Ruland, C.: Sicherheit in Verteilten Systemen. In: Tutoriumsband, KiVS'95, Chemnitz, 1995, S. 1-45.
  • Ruland, C.: Sichere Kommunikation zwischen ISDN-Endgeräten. Datacom, Januar 1995, S. 108-116.  

1994

  • Fox, D., Ruland, C.: Secure Common ISDN ApplciatioProgramming Interface (S-CAPI). In: Sicherheitsschnittstellen – Konzepte, Anwendungen und Einsatzbeispiel, DUV Deutscher Universitätsverlag, Gabler Vieweg Westdeutscher Verlag, 1994.  
  • Dienst, D., Fox, D., Ruland, C.; Transparente Sicherheitsmechanismen für ISDN-Anwendungen. Nutzung u. Technik von Kommunikationsendgeräten, G. Kleinke, VDE-Verlag, Offenbach 1994, S.81-95 ISBN 3-8007-2037-X.  
  • Ruland, C.: Kontrollierter Zugang.Business Computing Januar 1994 (1), Vogel-Verlag, München, S. 28-31  

1993

  • Ruland, C.: Realizing Digital Signatures with One-Way Hash Functions. In:Cryptologia. July 1993, Vol. XVII, Number 3, p. 285-300.  

1991

  • Kallerhoff, H., Ruland, C.: Statistische Untersuchungen von Pseudozufallszahlenfolgen. In: KES Kommunikations- und EDV-Sicherheit, Heft 3 (1991), S. 156-163.  
  • Longerich, M., Ruland, C.:
  • Datenkompression, Implementation und Vergleichstests>. In: datacom Heft 8, (1991), S. 97-103.  
  • Longerich, M., Ruland, C.: Datenkompression, Grundlagen und Übersicht (Fortsetzung). In: datacom Heft 5, (1991), S. 113-120.  
  • Longerich, M., Ruland, C.: Datenkompression, Grundlagen und Übersicht. In: datacom Heft 4, (1991), S. 88-96.  

1990

  • Ruland, C.: Sichere Übertragung und Archivierung elektronischer Dokumente. In: datacom Heft 3, (1990), S. 120-130.  
  • Ruland, C.: Sicherheit und Sicherheitsmanagement in Offenen Kommunikationssystemen. In: Sonderheft Netzwerkmanagement Spezial, Datacom Verlag, 1990, S. 202-213.  
  • Ruland, C.: Vertrauenswürdigkeit und Vertraulichkeit elektronischer Dokumente. In: Recht der Datenverarbeitung (RDV), Heft 4, (1990), S. 168-174.  
  • Ruland, C.: Datensicherheit in Lokalen Netzen, Teil 2. In: datacom Heft 1, (1990), S. 100-107.  

1989

  • Ruland, C.: Datensicherheit in Lokalen Netzen, Teil 1. In: datacom Heft 12, (1989), S. 94-99.  
  • Bong, D., Ruland, C.:Optimized Software Implementation of the Modular Exponentiation on General Purpose Microprocessors. In: Computers & Security, 8 (1989), p. 621-630.  
  • Ruland, C.: Zur Datensicherheit in Lokalen Netzen. In: Recht der Datenverarbeitung (RDV), Heft 5/6, 1989 (5. Jahrgang), S. 210-218.  
  • Pohlmann, N., Ruland, C.:Datensicherheit bei Kommunikation über Datex-P. In: datacom Heft 1, (1989), S. 64-70.  

1988

  • Ruland, C.: Datenschutz in Kommunikationssystemen Teil 5: Realisierung einer Datenschutzeinrichtung. In: datacom Heft 3, (1988), S. 114-120.  
  • Ruland, C.: Datenschutz in Kommunikationssystemen Teil 4: Sicherheitsmechanismen und ISO-Referenzmodell. In: datacom Heft 1, (1988), S. 92-97.  

1987

  • Ruland, C.: Datenschutz in Kommunikationssystemen Teil 3: Authentizitätsprüfungs-verfahren und Schlüsselverteilung. In: datacom Heft 9, (1987), S. 172-177.  
  • Ruland, C.: Datenschutz in Kommunikationssystemen Teil 2: Verschlüsselungsverfahren. In: datacom Heft 4, (1987), S. 98-104.  
  • Ruland, C.: Datenschutz in Kommunikationssystemen Teil 1: Einführung und Begriffe. In: datacom Heft 1, (1987), S. 78-84.  
  • Ruland, C.: Sicherheitsarchitektur in Offenen Kommunikationssystemen. In: Elektrotechnik und Maschinenbau (E und M), Heft 12, 1987 (104. Jahrgang), S. 533-537.  

1981

  • Ruland, C.: Algorithmen zur adaptiven Berechnung der schnellsten Wege in Virtuellen Netzen. In: Angewandte Informatik, 1981, Heft 11, (November), S. 492-496.  
  • Ruland, C.: Routing in Virtuellen Netzen. In: Elektronische Rechenanlagen, 1981 (Jahrgang 23), Heft 4, Seite 164-167.  
  • Ruland, C.: Was ist ein Virtuelles Netz? In: Elektronische Rechenanlagen, 1981 (Jahrgang 23), Heft 3, S. 134-136.  
  • Ruland, C.: Virtuelle Netze für verschiedene Benutzerklassen. In: Online Heft 6, (Juni) 1981, S. 456-458.  

1978

  • Ruland, C.: Ein Verfahren zur Lösung von (? + k2) u = 0 in Außengebieten mit Ecken. In: Applicable Analysis, Vol. 7, pp. 69-79, 1978.  

1976

  • Ruland, C.: Ein Verfahren zur Berechnung der Lösung des Dirichletschen Außenraumproblems zur Helmholtzschen Schwingungsgleichung bei stückweise glatten Rändern. In: Bonner Mathematische Schriften, Nr. 88, 1976.  

1973

  • Ruland, C.: Zur theoretischen und numerischen Lösbarkeit des Dirichletschen Außenraumproblems für die Helmholtzsche Schwingungsgleichung. Diplomarbeit, Universität Bonn 1973.