Search For:

Displaying 1-5 out of 5 total
Secure Identifiers and Initial Credential Bootstrapping for IoT@Work
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Kai Fischer,Jurgen Gessner,Steffen Fries
Issue Date:July 2012
pp. 781-786
Internet of Things is gaining momentum in industrial automation environments. The objectives of the EU project IoT@Work are to transfer Internet of Things approaches to industrial automation environments and to develop mechanisms and protocols to enable pl...
Protecting Voice over IP Communication Using Electronic Identity Cards
Found in: Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, International Conference on
By Rainer Falk, Steffen Fries, Hans Joachim Hof
Issue Date:August 2010
pp. 5-10
Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities ...
Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments
Found in: Internet and Web Applications and Services, International Conference on
By Steffen Fries, Hans Joachim Hof, Maik Seewald
Issue Date:May 2010
pp. 135-142
Information security has gained tremendous importance for energy distribution and energy automation systems over the last years. Standards like IEC61850 offer standardized communication services and standardized data models for communication in energy auto...
Profiling the Protection of Sensitive Enterprise Multimedia Communication
Found in: Internet and Web Applications and Services, International Conference on
By Rainer Falk, Steffen Fries
Issue Date:May 2009
pp. 239-246
Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental...
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge
Found in: Availability, Reliability and Security, International Conference on
By Jens-Uwe Bu├čer, Steffen Fries, Martin Otto, Peter Hartmann
Issue Date:March 2008
pp. 335-343
Authentication of participants is fundamental for secure communication systems. Many traditional systems rely on central components (like certification authorities). These have to be powerful and well-protected, making them expensive, and require trust in ...