default search action
Rolf Oppliger
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Rolf Oppliger, Andreas Grünert:
How to Measure Cybersecurity and Why Heuristics Matter. Computer 57(2): 111-115 (2024) - [j37]Andreas Grünert, James Bret Michael, Rolf Oppliger, Ruedi Rytz:
Why Probabilities Cannot Be Used in Cyber Risk Management. Computer 57(10): 86-89 (2024) - 2023
- [j36]Rolf Oppliger, Andreas Grünert:
How to Manage Cyber Risks: Lessons Learned From Medical Science. Computer 56(1): 117-119 (2023)
2010 – 2019
- 2017
- [j35]Rolf Oppliger, Günther Pernul, Sokratis K. Katsikas:
New Frontiers: Assessing and Managing Security Risks. Computer 50(4): 48-51 (2017) - [j34]Rolf Oppliger:
Disillusioning Alice and Bob. IEEE Secur. Priv. 15(5): 82-84 (2017) - 2015
- [j33]Rolf Oppliger:
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale. IEEE Secur. Priv. 13(6): 18-21 (2015) - 2014
- [j32]Rolf Oppliger:
Certification Authorities Under Attack: A Plea for Certificate Legitimation. IEEE Internet Comput. 18(1): 40-47 (2014) - 2012
- [j31]Rolf Oppliger, Bruno Wildhaber:
Common Misconceptions in Computer and Information Security. Computer 45(6): 102-104 (2012) - 2011
- [j30]Rolf Oppliger:
Security and Privacy in an Online World. Computer 44(9): 21-22 (2011)
2000 – 2009
- 2009
- [j29]Rolf Oppliger, Ruedi Rytz, Thomas Holderegger:
Internet Banking: Client-Side Attacks and Protection Mechanisms. Computer 42(6): 27-33 (2009) - 2008
- [j28]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication revisited. Comput. Secur. 27(3-4): 64-70 (2008) - [j27]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS Session-Aware User Authentication. Computer 41(3): 59-65 (2008) - [j26]Rolf Oppliger, Ralf Hauser:
Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. Secur. Commun. Networks 1(2): 125-134 (2008) - [c17]Rolf Oppliger, Jörg Schwenk, Christoph Löhr:
CAPTCHA-based Code Voting. Electronic Voting 2008: 223-236 - [c16]Rolf Oppliger, Jörg Schwenk, Jörg Helbach:
Protecting Code Voting Against Vote Selling. Sicherheit 2008: 193-204 - 2007
- [j25]Rolf Oppliger:
IT security: in search of the Holy Grail. Commun. ACM 50(2): 96-98 (2007) - [j24]Rolf Oppliger:
Providing Certified Mail Services on the Internet. IEEE Secur. Priv. 5(1): 16-22 (2007) - [c15]Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser:
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). KiVS 2007: 225-236 - [c14]Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - 2006
- [j23]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Comput. Commun. 29(12): 2238-2246 (2006) - 2005
- [b4]Rolf Oppliger:
Contemporary cryptography. Artech House computer security series, Artech House 2005, ISBN 978-1-58053-642-4, pp. I-XXV, 1-503 - [j22]Rolf Oppliger:
Privacy-enhancing technologies for the world wide web. Comput. Commun. 28(16): 1791-1797 (2005) - [j21]Rolf Oppliger, Ruedi Rytz:
Does Trusted Computing Remedy Computer Security Problems? IEEE Secur. Priv. 3(2): 16-19 (2005) - [j20]Javier López, Rolf Oppliger, Günther Pernul:
Why have public key infrastructures failed so far? Internet Res. 15(5): 544-556 (2005) - [c13]Rolf Oppliger, Sebastian Gajek:
Effective Protection Against Phishing and Web Spoofing. Communications and Multimedia Security 2005: 32-41 - [c12]Javier López, Rolf Oppliger, Günther Pernul:
Classifying Public Key Certificates. EuroPKI 2005: 135-143 - 2004
- [j19]Rolf Oppliger:
Certified mail: the next challenge for secure messaging. Commun. ACM 47(8): 75-79 (2004) - [j18]Rolf Oppliger, Peter Stadlin:
A certified mail system (CMS) for the Internet. Comput. Commun. 27(13): 1229-1235 (2004) - [j17]Javier López, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey. Comput. Secur. 23(7): 578-590 (2004) - [j16]Rolf Oppliger:
Microsoft .NET Passport and identity management. Inf. Secur. Tech. Rep. 9(1): 26-34 (2004) - 2003
- [j15]Rolf Oppliger:
Microsoft .NET Passport: A Security Analysis. Computer 36(7): 29-35 (2003) - [j14]Rolf Oppliger:
Sicherheit von Open Source Software. Mythos oder Wirklichkeit? Datenschutz und Datensicherheit 27(11) (2003) - [j13]Rolf Oppliger, Ruedi Rytz:
Digital Evidence: Dream and Reality. IEEE Secur. Priv. 1(5): 44-48 (2003) - 2000
- [j12]Refik Molva, Rolf Oppliger:
Éditorial - Sécurité dans les réseaux. Ann. des Télécommunications 55(7-8): 311-312 (2000) - [j11]Rolf Oppliger:
Managing certificates in a corporate environment. Ann. des Télécommunications 55(7-8): 341-351 (2000) - [j10]Rolf Oppliger:
Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla. Comput. Commun. 23(4): 429 (2000) - [j9]Madjid Merabti, Qi Shi, Rolf Oppliger:
Advanced security techniques for network protection. Comput. Commun. 23(17): 1581-1583 (2000) - [j8]Rolf Oppliger:
Privacy protection and anonymity services for the World Wide Web (WWW). Future Gener. Comput. Syst. 16(4): 379-391 (2000)
1990 – 1999
- 1999
- [j7]Rolf Oppliger:
D. B. Parker: Fighting computer crimes: a new framework for protecting information. Comput. Commun. 22(5): 491-492 (1999) - [j6]Rolf Oppliger:
Security issues related to mobile code and agent-based systems. Comput. Commun. 22(12): 1165-1170 (1999) - [c11]Rolf Oppliger, Andreas Greulich, Peter Trachsel:
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. ACSAC 1999: 241-248 - [c10]Rolf Oppliger:
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. Communications and Multimedia Security 1999: 163-175 - [c9]Rolf Oppliger:
Shaping the Research Agenda for Security in E-Commerce. DEXA Workshop 1999: 810-814 - [c8]Rolf Oppliger:
Authorization Methods for E-Commerce Applications. SRDS 1999: 366-371 - 1998
- [j5]Rolf Oppliger:
Security at the Internet Layer. Computer 31(9): 43-47 (1998) - 1997
- [b3]Rolf Oppliger:
IT-Sicherheit - Grundlagen und Umsetzung in der Praxis. DuD-Fachbeiträge, Vieweg 1997, ISBN 978-3-528-05566-0, pp. I-XXIII, 1-517 - [j4]Rolf Oppliger:
Internet Security: Firewalls and Beyond. Commun. ACM 40(5): 92-102 (1997) - [j3]Rolf Oppliger, Andres Albanese:
Participant registration, validation, and key distribution for large-scale conferencing systems. IEEE Commun. Mag. 35(6): 130-134 (1997) - [c7]Rolf Oppliger, Jean-Luc Nottaris:
Online Casinos. Kommunikation in Verteilten Systemen 1997: 2-16 - 1996
- [b2]Rolf Oppliger:
Authentication systems for secure networks. Artech House 1996, ISBN 978-0-89006-510-5, pp. I-XVII, 1-186 - [c6]Rolf Oppliger, Martin Bracher:
Distributed Registration and Key Distribution for Online Universities. Communications and Multimedia Security 1996: 166-175 - [c5]Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati:
A Security Architecture for Tenet Scheme 2. IDMS 1996: 163-174 - [c4]Rolf Oppliger, Andres Albanese:
Distributed registration and key distribution (DiRK). SEC 1996: 199-208 - [c3]Rolf Oppliger, Andres Albanese:
Distance education and on-line universities. WETICE 1996: 10-15 - 1995
- [j2]Rolf Oppliger:
Internet Security Enters the Middle Ages. Computer 28(10): 100-101 (1995) - [c2]Rolf Oppliger:
Authentifikations- und Schlüsselverteilsysteme. GI Jahrestagung 1995: 266-273 - 1993
- [c1]Rolf Oppliger, Stephan Weber, Dieter Hogrefe:
Entwurf von virtuell privaten Netzen. Kommunikation in Verteilten Systemen 1993: 428-441 - 1992
- [b1]Rolf Oppliger:
Computersicherheit - eine Einführung. Vieweg 1992, ISBN 978-3-528-05296-6, pp. 1-153 - [j1]Rolf Oppliger, Dieter Hogrefe:
Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN). Prax. Inf.verarb. Kommun. 15(4): 213-217 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint