| | Competency Profile:- Electronic Identity
- Security Engineering
- Identity Management
- Security Protocols
- Cryptography
- Reputation Management
- Anonymization Techniques
Projects: The following projects are conducted with our partners at NEC Teaching: ...Patents: Method for detecting data of an identification document. Wolf Müller, Andreas Wolf, Matthias Fischbeck, 2015, DE102013113041A1, EP3074959A1, WO2015078785A1 Document, process for authenticating a user, more particularly for releasing a smart-card function, and computer system. Frank Dietrich, Paul Bastian, Manfred Paeschke, Wolf Müller, 2013 EP2774074B1, US9491154B2, WO2013064359A1 Distributed Virtual Network Access System and Method. J.-P. Redlich, T. Kuehnel und W. Mueller, 2005, US20050114490A1 Multi-ISP Controlled Access to IP Networks, Based on Third-Party Operated Untrusted Access Stations. J.-P. Redlich, T. Kuehnel und W. Mueller, 2002, JP4666169B2, US20120072727A1
Publications: 2020 - SAR-PR-2020-06
Post-Quantum Cryptography in WireGuard VPN, Quentin M. Kniep,
Wolf Müller, Jens-Peter Redlich In: Park N., Sun K., Foresti S., Butler K.,
Saxena N. (eds) Security and Privacy in Communication Networks. SecureComm
2020. Lecture Notes of the Institute for Computer Sciences, Social
Informatics and Telecommunications Engineering, vol 336. Springer, Cham.
pp 261-267, ISBN 978-3-030-63095-9, 2020.[SAR-PR-2020-06][https://doi.org/10.1007/978-3-030-63095-9_16] 20122011
- SAR-PR-2011-01
Mobiles Szenario für den neuen Personalausweis.
Wolf Müller,
Frank Morgner und
Dominik Oepen, in 21. Smartcard-Workshop, 2.-3. Februar 2011, Darmstadt, Deutschland, 10 Seiten 179-188. Herausg. Ullrich Waldmann, ISBN 978-3-8396-0215-7
[SAR-PR-2011-01]
2010
- SAR-PR-2010-08
Documentless Proof of Identity,
Wolf Müller, Chapter
4 in Book: Handbook of eID Security: Concepts, Practical Experiences,
Technologies. Editors Walter Fumy, Manfred Paeschke. Publicis
Publishing, ISBN-13:
978-3895783791, 2010. [SAR-PR-2010-08]
2008
-
SAR-PR-2008-18
Sybil Proof Anonymous Reputation Management.
Wolf Müller1,
Henryk Plötz1,
Jens-Peter Redlich1,
Takashi Shiraki2 (1Humboldt
University Berlin, 2NEC Corporation), 10 pages,
SecureComm 2008: 4th International Conference on Security and Privacy in
Communication Networks, Istanbul, Turkey, 2008. [Abstract], [Conference
Paper]
2007
2006
2005 |