default search action
Christian Gehrmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Syafiq Al Atiiq, Christian Gehrmann:
Regaining Dominance in CIDER and Lazarus. IEEE Access 12: 124589-124603 (2024) - [c43]Syafiq Al Atiiq, Christian Gehrmann, Yachao Yuan, Jakob Sternby:
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF. FMEC 2024: 90-98 - [i9]Syafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:
Attacks Against Mobility Prediction in 5G Networks. CoRR abs/2402.19319 (2024) - [i8]Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil:
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection. CoRR abs/2408.02329 (2024) - 2023
- [j12]Hui Zhu, Christian Gehrmann, Paula Roth:
Access Security Policy Generation for Containers as a Cloud Service. SN Comput. Sci. 4(6): 748 (2023) - [c42]Rohon Kundu, Christian Gehrmann, Maria Kihl:
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack. ICPADS 2023: 659-666 - [c41]Syafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:
Attacks Against Mobility Prediction in 5G Networks. TrustCom 2023: 1502-1511 - [c40]Sara Ramezanian, Christian Gehrmann:
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key. TrustCom 2023: 1718-1727 - 2022
- [j11]William Tärneberg, Martin Gunnarsson, Maria Kihl, Christian Gehrmann:
Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [c39]Pegah Nikbakht Bideh, Christian Gehrmann:
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air. CPSIOTSEC@CCS 2022: 35-46 - [c38]Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:
Insight of Anomaly Detection with NWDAF in 5G. CITS 2022: 1-6 - [c37]Hui Zhu, Christian Gehrmann:
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine. COMSNETS 2022: 129-137 - 2021
- [j10]Hui Zhu, Christian Gehrmann:
Lic-Sec: An enhanced AppArmor Docker security profile generator. J. Inf. Secur. Appl. 61: 102924 (2021) - [c36]Hui Zhu, Christian Gehrmann:
AppArmor Profile Generator as a Cloud Service. CLOSER 2021: 45-55 - [c35]William Tärneberg, Per Skarin, Christian Gehrmann, Maria Kihl:
Prototyping intrusion detection in an industrial cloud-native digital twin. ICIT 2021: 749-755 - [c34]Syafiq Al Atiiq, Christian Gehrmann:
X-Pro: Distributed XDP Proxies Against Botnets of Things. NordSec 2021: 51-71 - [c33]Mohsen Toorani, Christian Gehrmann:
A decentralized dynamic PKI based on blockchain. SAC 2021: 1646-1655 - 2020
- [j9]Christian Gehrmann, Martin Gunnarsson:
A Digital Twin Based Industrial Automation and Control System Security Architecture. IEEE Trans. Ind. Informatics 16(1): 669-680 (2020) - [c32]Martin Gunnarsson, Christian Gehrmann:
Secure Ownership Transfer for Resource Constrained IoT Infrastructures. ICISSP (Revised Selected Papers) 2020: 22-47 - [c31]Martin Gunnarsson, Christian Gehrmann:
Secure Ownership Transfer for the Internet of Things. ICISSP 2020: 33-44 - [c30]Syafiq Al Atiiq, Christian Gehrmann:
CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things. PerCom Workshops 2020: 1-6 - [i7]Hui Zhu, Christian Gehrmann:
Lic-Sec: an enhanced AppArmor Docker security profile generator. CoRR abs/2009.11572 (2020) - [i6]Mohsen Toorani, Christian Gehrmann:
A Decentralized Dynamic PKI based on Blockchain. CoRR abs/2012.15351 (2020)
2010 – 2019
- 2019
- [j8]Nicolae Paladi, Christian Gehrmann:
SDN Access Control for the Masses. Comput. Secur. 80: 155-172 (2019) - [j7]Christian Gehrmann, Marcus Rodan, Niklas Jönsson:
Metadata filtering for user-friendly centralized biometric authentication. EURASIP J. Inf. Secur. 2019: 7 (2019) - [c29]Christian Gehrmann, Martin Gunnarsson:
An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics. IEEE BigData 2019: 5744-5753 - 2018
- [c28]Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin:
Practical Attacks on Relational Databases Protected via Searchable Encryption. ISC 2018: 171-191 - [i5]Nicolae Paladi, Christian Gehrmann:
SDN Access Control for the Masses. CoRR abs/1811.08094 (2018) - [i4]Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin:
Practical Attacks on Relational Databases Protected via Searchable Encryption. IACR Cryptol. ePrint Arch. 2018: 715 (2018) - 2017
- [j6]Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake. Int. J. Inf. Sec. 16(2): 173-193 (2017) - [j5]Nicolae Paladi, Christian Gehrmann:
Bootstrapping trust in software defined networks. EAI Endorsed Trans. Security Safety 4(11): e5 (2017) - [j4]Nicolae Paladi, Christian Gehrmann, Antonis Michalas:
Providing User Security Guarantees in Public Infrastructure Clouds. IEEE Trans. Cloud Comput. 5(3): 405-419 (2017) - [c27]Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:
Searchable Encrypted Relational Databases: Risks and Countermeasures. DPM/CBT@ESORICS 2017: 70-85 - [i3]Nicolae Paladi, Christian Gehrmann:
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. CoRR abs/1702.04143 (2017) - [i2]Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases. IACR Cryptol. ePrint Arch. 2017: 24 (2017) - 2016
- [c26]Mohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl:
Executing Boolean Queries on an Encrypted Bitmap Index. CCSW 2016: 11-22 - [c25]Christian Gehrmann, Mohamed Ahmed Abdelraheem:
IoT Protection through Device to Cloud Synchronization. CloudCom 2016: 527-532 - [c24]Christoph Baumann, Mats Näslund, Christian Gehrmann, Oliver Schwarz, Hans Thorsen:
A high assurance virtualization platform for ARMv8. EuCNC 2016: 210-214 - [c23]Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg:
A Secure Group-Based AKA Protocol for Machine-Type Communications. ICISC 2016: 3-27 - [c22]Rosario Giustolisi, Christian Gehrmann:
Threats to 5G Group-based Authentication. SECRYPT 2016: 360-367 - [c21]Nicolae Paladi, Christian Gehrmann:
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. SecureComm 2016: 104-124 - [i1]Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
Robust and Scalable DTLS Session Establishment. ERCIM News 2016(106) (2016) - 2015
- [j3]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. J. Inf. Secur. Appl. 22: 28-39 (2015) - [c20]Christian Gehrmann, Marco Tiloca, Rikard Hoglund:
SMACK: Short message authentication check against battery exhaustion in the Internet of Things. SECON 2015: 274-282 - [c19]Nicolae Paladi, Christian Gehrmann:
Towards Secure Multi-tenant Virtualized Networks. TrustCom/BigDataSE/ISPA (1) 2015: 1180-1185 - 2014
- [c18]Nicolae Paladi, Antonis Michalas, Christian Gehrmann:
Domain based storage protection with secure access control for the cloud. SCC@ASIACCS 2014: 35-42 - [c17]Antonis Michalas, Nicolae Paladi, Christian Gehrmann:
Security aspects of e-Health systems migration to the cloud. Healthcom 2014: 212-218 - [c16]Oliver Schwarz, Christian Gehrmann, Viktor Do:
Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System. TRUST 2014: 37-54 - [c15]Nicolae Paladi, Mudassar Aslam, Christian Gehrmann:
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. TrustCom 2014: 352-360 - [c14]Manoranjan Mohanty, Christian Gehrmann, Pradeep K. Atrey:
Avoiding weak parameters in secret image sharing. VCIP 2014: 506-509 - 2013
- [c13]Nicolae Paladi, Christian Gehrmann, Fredric Morenius:
Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds. NordSec 2013: 279-296 - [c12]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. SIN 2013: 136-143 - [c11]Ludwig Seitz, Göran Selander, Christian Gehrmann:
Authorization framework for the Internet-of-Things. WOWMOM 2013: 1-6 - 2012
- [c10]Mudassar Aslam, Christian Gehrmann, Lars Rasmusson, Mats Björkman:
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. CLOSER 2012: 511-521 - [c9]Oliver Schwarz, Christian Gehrmann:
Securing DMA through virtualization. COMPENG 2012: 1-6 - [c8]Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius:
Trusted Launch of Virtual Machine Instances in Public IaaS Environments. ICISC 2012: 309-323 - [c7]Omer Nawaz, Christian Gehrmann, Markus Fiedler:
Secure mobile social networks using USIM in a closed environment. ICITST 2012: 439-446 - [c6]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Security and Trust Preserving VM Migrations in Public Clouds. TrustCom 2012: 869-876 - 2011
- [c5]Christian Gehrmann, Heradon Douglas, Dennis Kengo Nilsson:
Are there good reasons for protecting mobile phones with hypervisors? CCNC 2011: 906-911
2000 – 2009
- 2000
- [c4]Christian Gehrmann, Pekka Nikander:
Securing ad hoc services, a Jini view: extended abstract. MobiHoc 2000: 135-136
1990 – 1999
- 1998
- [j2]Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets:
Unconditionally Secure Group Authentication. Des. Codes Cryptogr. 14(3): 281-296 (1998) - [j1]Christian Gehrmann:
Multiround Unconditionally Secure Authentication. Des. Codes Cryptogr. 15(1): 67-86 (1998) - 1997
- [c3]Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets:
Fast Message Authentication Using Efficient Polynomial Evaluation. FSE 1997: 190-204 - 1995
- [c2]Christian Gehrmann:
Secure Multiround Authentication Protocols. EUROCRYPT 1995: 158-167 - 1994
- [c1]Christian Gehrmann:
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. CRYPTO 1994: 121-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint