| |
Competency Profile:-
Electronic Identity
-
Security Engineering
-
Identity Management
-
Security Protocols
-
Cryptography
-
Reputation Management
-
Anonymization Techniques
Projects:
The following projects are conducted
with our partners at NEC
Teaching:
...
Patents:
-
Method for detecting data
of an identification document. Wolf Müller, Andreas Wolf, Matthias
Fischbeck, 2015,
DE102013113041A1,
EP3074959A1,
WO2015078785A1
-
Document, process for authenticating a user, more
particularly for releasing a smart-card function, and computer system. Frank Dietrich, Paul Bastian, Manfred Paeschke,
Wolf Müller, 2013
EP2774074B1,
US9491154B2,
WO2013064359A1
-
Distributed Virtual Network Access System and Method.
J.-P. Redlich, T. Kuehnel und
W. Mueller, 2005,
US20050114490A1
-
Multi-ISP Controlled Access to IP Networks, Based on
Third-Party Operated Untrusted Access Stations.
J.-P. Redlich, T. Kuehnel und
W. Mueller, 2002,
JP4666169B2,
US20120072727A1
Publications:
2020
- SAR-PR-2020-06
Post-Quantum Cryptography in WireGuard VPN, Quentin M. Kniep,
Wolf Müller, Jens-Peter Redlich In: Park N., Sun K., Foresti S., Butler K.,
Saxena N. (eds) Security and Privacy in Communication Networks. SecureComm
2020. Lecture Notes of the Institute for Computer Sciences, Social
Informatics and Telecommunications Engineering, vol 336. Springer, Cham.
pp 261-267, ISBN 978-3-030-63095-9, 2020.[SAR-PR-2020-06][https://doi.org/10.1007/978-3-030-63095-9_16] 2012
2011
- SAR-PR-2011-01
Mobiles Szenario für den neuen Personalausweis.
Wolf Müller,
Frank Morgner und
Dominik Oepen, in 21. Smartcard-Workshop, 2.-3. Februar 2011, Darmstadt, Deutschland, 10 Seiten 179-188. Herausg. Ullrich Waldmann, ISBN 978-3-8396-0215-7
[SAR-PR-2011-01]
2010
- SAR-PR-2010-08
Documentless Proof of Identity,
Wolf Müller, Chapter
4 in Book: Handbook of eID Security: Concepts, Practical Experiences,
Technologies. Editors Walter Fumy, Manfred Paeschke. Publicis
Publishing, ISBN-13:
978-3895783791, 2010. [SAR-PR-2010-08]
2008
-
SAR-PR-2008-18
Sybil Proof Anonymous Reputation Management.
Wolf Müller1,
Henryk Plötz1,
Jens-Peter Redlich1,
Takashi Shiraki2 (1Humboldt
University Berlin, 2NEC Corporation), 10 pages,
SecureComm 2008: 4th International Conference on Security and Privacy in
Communication Networks, Istanbul, Turkey, 2008. [Abstract], [Conference
Paper]
2007
2006
2005
|