Logo of the University of Passau

Dr. rer. nat. Henrich C. Pöhls

Dr. rer. nat. Henrich C. Pöhls
Lecturer & Research Assistant
Room ITZ/IH 136
Innstr. 43
94032 Passau
Fax: +49(0)851/5093212

PGP-Key / PGP-Key (local)
PGP-Fingerprint: 13a2 45ed 4fdc 2a66 f99e 1e29 e98e 021a 937a f4f2
Mastodon: https://infosec.exchange/@henrichpoehls

Current Activities

Henrich C. Pöhls currently is the managing director of the Centre for IT-Security and he is a senior researcher and lectures in IT-Security, i.e General IT-Security as well as Secure AI Systems. In his research he tries to bridge gaps by conducting interdisciplinary work especially in the fields of IT-Security (esp. cryptography), software development and law:

"The more gaps between those worlds get bridged, the more sound (=safe, secure and legally compliant) ICT-enhanced products and digitally-enhanced environments will be."

Besides teaching he collaborated and lead several successful research projects on security and privacy for Cloud (eg. PRISMACLOUD) & IoT (eg. RERUM and SEMIoTICS). Finally, he is also active in national and international standardisation (eg. editor of ISO/IEC standard 23264 on Redaction of authentic data in ISO JTC1/SC27).

Research Interests

  • Secure AI Systems (increasing the IT-security of AI systems and risk analysis of systems that incorporate AI functions)
  • Integrity protection (legally, cryptographically, organisationally),
  • Redactable & Sanitizable Signatures,
  • Legal implications of Digital Signatures (EU Electronic Signature Legislation - eIDAS),
  • Privacy Enhancing Technology (PET) and Data Protection with respect to Authenticity and (Structural) Integrity Protection of the contained Information,
  • Security of Internet-Of-things (IoT),
  • SupplyChain- / SOA- / BusinessProcess-Security,
  • Digitally Signed Microformatted Content and
  • Tree-Based Structured Document Formats (XML-Based).
  • Additional interests:
    • Web-Services, "Web 2.0"
    • Wireless Communications (WLAN, Bluetooth, RFID, etc.)
    • TLS, PKI, and Certificates
    • Networked Smartcards

Publications

2025

Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices

H. C. Pöhls and L. Steffens, "Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices" in ICT Systems Security and Privacy Protection - 40th IFIP SEC Conference , Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro, Eds. Springer, 2025. pp. 49-63.

DOI: https://doi.org/10.1007/978-3-031-92886-4_4

ISBN: 978-3-031-92885-7

File: https://henrich.poehls.com/papers/2025_Poehls-Steffens_BLE-Pairing-Security-CaseStudy_IFIPSEC.pdf

IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions

E. Geloczi, N. Mexis, B. Holler, H. C. P\"ohls and S. Katzenbeisser, "IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions" in Proceedings of the Workshop AIoTS at the Applied Cryptography and Network Security (ACNS) , Springer, 2025.

File: https://henrich.poehls.com/papers/2025_GelocziMexisHollePoehlsKatzenbeisser_Categorize-IoT-Devices_AIoTS-ACNS.pdf

Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes

H. C. Pöhls, F. Kügler, E. Geloczi and F. Klement, "Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes" , Future Internet , vol. 1, no. 1, pp. 77-138, 2025. MDPI.

DOI: https://doi.org/10.3390/fi17020077

File: https://www.mdpi.com/1999-5903/17/2/77/pdf

The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach

H. C. Pöhls, D. Eckhardt, N. Feist, S. Pfeiffer, D. Herrmann and S. Katzenbeisser, "The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach" in Proceedings of the 27th International Conference on Human-Computer Interaction (HCII 2025) , Moallem, A., Eds. Springer, 2025. pp. 105-124.

DOI: https://doi.org/10.1007/978-3-031-92833-8_7

ISBN: 978-3-031-92832-1

File: https://henrich.poehls.com/papers/2025_Poehls-et-al_CyberSecurity-in-Everyday-Life_HCIint.pdf

2024

MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.

H. C. Pöhls, S. Gebauer, F. Scharnböck, K. Spielvogel and J. Posegga, "MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation." in In Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024) , Springer, 2024.

Weblink: https://link.springer.com/book/9783031603907

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme

D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" in Sicherheit 2024 , Gesellschaft für Informatik e.V., 2024, pp. 107-118.

Weblink: https://doi.org/10.18420/sicherheit2024_007

Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments

E. Geloczi, H. C. Pöhls, F. Klement, J. Posegga and S. Katzenbeisser, "Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments" in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) , 2024.

DOI: https://doi.org/10.1145/3689943.3695040

File: https://henrich.poehls.com/papers/2024_GelozciPoehlsKlementPoseggaKatzenbeisser_Unveiling_the_Shadows_WPES.pdf

Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks.

N. Rakotondravony, H. C. Pöhls, J. Pfeifer and L. Harrison, "Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks." in 26th International Conference on Human-Computer Interaction (HCII 2024) , Springer, 2024.

Weblink: https://www.springer.com/series/16277/books

2023

Ein Werkzeug für eine gemeinsame KI-Terminologie

G. Runze, M. Haimerl, M. Hauer, T. Holoyad, O. Obert, H. C. Pöhls, R. Tagiew and J. Ziehn, Ein Werkzeug für eine gemeinsame KI-Terminologie. .... SIGS DATACOM GmbH, 05 2023.

Weblink: https://www.imbus.de/downloads?no_cache=1&tx_abdownloads_pi1%5Baction%5D=getviewclickeddownload&tx_abdownloads_pi1%5Bcatids%5D=107&tx_abdownloads_pi1%5Buid%5D=1061&cHash=4a3aa33d9023463a56894cb2104e3f4a

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme

D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" , Fakultät für Informatik und Mathematik, Universität Passau, 2023.

Weblink: https://doi.org/10.15475/sidial.2023

Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems

H. C. Pöhls, "Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems" , 09 2023. Springer, https://henrich.poehls.com/papers/2023_poehls_abstract-ai-architecture_STM.pdf .

2021

TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT

K. Spielvogel, H. C. Pöhls and J. Posegga, "TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT" in Proc. of 17th International Workshop on Security and Trust Management (STM2021) , Springer, 092021. pp. 145-162.

Weblink: https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8

2020

Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection

H. C. Pöhls and N. Tiana Lilie Rakotondravony, "Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection" in Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2020) held in conjunsction with the 22nd International Conference on Human Computer Interaction (HCII 2020) , Springer, 072020.

File: https://henrich.poehls.com/papers/2020_PoehlsRakotondravony_HCII2020_DynamicConsent-Physical-%20switches-and-feedback-to-adjust-consent.pdf

Fully Invisible Protean Signatures Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Fully Invisible Protean Signatures Schemes" , IET Information Security , vol. 14, pp. 266-285, 05 2020. IET, https://doi.org/10.1049/iet-ifs.2019.0141 .

File: http://henrich.poehls.com/papers/2019_KrennPoehlsSamleinSlamanig_FullyInvisibleProteanSignatures_IET-IFS-2019-0141.pdf

Pattern-driven Security, Privacy, Dependability and Interoperability in IoT

N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis and S. Ioannidis, "Pattern-driven Security, Privacy, Dependability and Interoperability in IoT" in Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection , now publishers inc., 2020, pp. 121-142.

File: http://henrich.poehls.com/papers/2020_Pattern-driven-Security-Privacy-Dependability-and-Interoperability-in-IoT_978-1-68083-683-7_ch7.pdf

Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications

F. Klement, H. C. Pöhls and K. Spielvogel, "Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications" in Global Internet of Things Summit (GIoTS) , 072020.

File: http://henrich.poehls.com/papers/2020_KlementPoehlsSpielvogel_GIOTS20_Privacy-preserving-local-monitoring-and-evaluation-of-IoT-network-traffic.pdf

2019

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net" , Journal of Reliable Intelligent Environments (JRIE) , vol. 5, no. 1, pp. 41-64, 04 2019. https://doi.org/10.1007/s40860-019-00075-0 .

File: http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf

2018

C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality

L. Sell, H. C. Pöhls and T. Lorünser, "C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality" in Proceedings of the 10th International Conference on Cloud Computing Technology and Science (CLOUDCOM 2018) , IEEE, 2018.

File: http://henrich.poehls.com/papers/2018_SellPoehlsLoruenser_CostOfSecretSharedCloudStorage_IEEE-CloudCom.pdf

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications" in Progress in Cryptology (AFRICACRYPT 2018) , Springer, 2018. pp. 11--32.

DOI: https://doi.org/10.1007/978-3-319-89339-6_2

ISBN: 978-3-319-89339-6

File: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_TrapdoorChamHash_AFRICACRYPT2018_full.pdf

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

T. Lorünser, H. C. Pöhls, L. Sell and T. Länger, "CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle" in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) , New York, NY, USA: ACM, 2018. pp. 4:1--4:9.

DOI: https://doi.org/10.1145/3230833.3233765

ISBN: 978-1-4503-6448-5

File: http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

H. C. Pöhls, "Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures", University of Passau, 2018.

File: https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf

Protean Signature Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Protean Signature Schemes" in Proc. of the 17th conference on Cryptology and Network Security (CANS 2018) , Springer, 2018. pp. 256--276.

DOI: https://doi.org/10.1007/978-3-030-00434-7_13

File: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_SanitizableAndDeleteableSignature_CANS-full.pdf

The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication" in {Proc. of The 7th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2018)} , IEEE, 2018.

File: http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf

2017

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures" in Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017) , IACR, 2017. pp. 152--182.

DOI: https://eprint.iacr.org/2017/011

File: http://henrich.poehls.com/papers/2017_CDKPSS_chamhash_with_ephemeral_trapdoors_PKC-eprint.pdf

Einsetzbare Kryptografie für die Cloud

H. C. Pöhls and T. Länger, "Einsetzbare Kryptografie für die Cloud" , Zeitschrift für Datenrecht und Informationssicherheit (digma) , vol. 17, no. 1, pp. 78--81, 2017. Schulthess Juristische Medien.

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

A. Bilzhause, H. C. Pöhls and K. Samelin, "Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 12th International Conference on Availability, Reliability and Security (ARES SECPID 2017) , Conference Publishing Services (CPS), 2017.

File: http://henrich.poehls.com/papers/2017_BilzhausePoehlsSamelin_ARES17_RSS_SSS_PastPresentFuture.pdf

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

M. Till Beck, J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures" in Proc. of 22nd Australasian Conference on Information Security and Privacy (ACISP 2017) , Springer, 2017. pp. 437--452.

DOI: https://eprint.iacr.org/2017/445.pdf

File: http://henrich.poehls.com/papers/2017_BCDKPSS_Practical-Strongly-Invisible-and-Strongly-Accountable-Sanitizable-Signatures_ACISP.pdf

Towards compactly encoded signed IoT messages

H. C. Pöhls and B. Petschkuhn, "Towards compactly encoded signed IoT messages" in IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2017) , IEEE, 2017.

File: http://henrich.poehls.com/papers/2017_PoehlsPetschkuhn_IoT_signature_encoding_CAMAD.pdf

2016

A Privacy Engineering Framework for the Internet of Things

A. Kung, F. Kargl, S. Suppan, J. Cuellar, H. C. Pöhls, A. Kapovits, N. Notario and Y. Samuel Martin, "A Privacy Engineering Framework for the Internet of Things" in Proc. of 9th edition of the international conference Computers, Privacy and Data Protection 2016 (CDPD 2016) , 2016.

An IoT middleware for enhanced security and privacy: the RERUM approach

G. Moldovan, E. Z. Tragos, A. Fragkiadakis, H. C. Pöhls and D. Calvo, "An IoT middleware for enhanced security and privacy: the RERUM approach" in Proc. of 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016) , IEEE, 2016.

File: http://henrich.poehls.com/papers/2016_Moldovan-et-al_IoT-middleware-for-enhanced-sec-and-priv-RERUM_NTMS.pdf

Cryptographically Enforced Four-Eyes Principle

A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin, "Cryptographically Enforced Four-Eyes Principle" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016) , Conference Publishing Services (CPS), 2016.

File: http://henrich.poehls.com/papers/2016_BilzhauseHuberPoehlsSamelin_4EyesPrinciple_ARES_SECPID.pdf

Designing Secure IoT Architectures for Smart City Applications

E. Z. Tragos, A. Fragkiadakis, V. Angelakis and H. C. Pöhls, "Designing Secure IoT Architectures for Smart City Applications" in Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions , Springer, 2016.

ECDSA on things: IoT integrity protection in practise

J. Bauer, R. C. Staudemeyer, H. C. Pöhls and A. Fragkiadakis, "ECDSA on things: IoT integrity protection in practise" in Proc. of Information and Communications Security (ICICS 2016) , K.-Y. Lam et al., Eds. Springer, 2016.

File: http://henrich.poehls.com/papers/2016_Bauer-et-al_ECDSA-on-things_ICICS.pdf

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud and IoT

C. Frädrich, H. C. Pöhls, W. Popp, N. Rakotondravony and K. Samelin, "Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud and IoT" in Proc. of Information and Communications Security (ICICS 2016) , K.-Y. Lam et al., Eds. Springer, 2016.

File: http://henrich.poehls.com/papers/2016_SelectiveDisclosureControl_ICICS2016_full.pdf

Laboratory Evaluation Results (RERUM Deliverable D5.2)

G. Oikonomou, R. C. Staudemeyer, A. Fragkiadakis, M. Wójcik, E. Tragos, G. Papadopoulos, H. C. Pöhls, D. Gundlegard, V. Angelakis, S. Katuri, J. Bauer, B. Petschkuhn, P. Charalampidis, G. Stamatakis, M. Surligas and A. Makrogiannakis, "Laboratory Evaluation Results (RERUM Deliverable D5.2)" , internal report, 2016.

File: http://cordis.europa.eu/docs/projects/cnect/4/609094/080/deliverables/001-RERUMdeliverableD32Ares20153669911.pdf

Modelling the trustworthiness of the IoT (RERUM Deliverable D3.3)

D. Ruiz-López, J. Cuellar, R. C. Staudemeyer, P. Charalampidis, A. Fragkiadakis, P. Kasinathan, H. C. Pöhls, S. Suppan, E. Tragos and R. Weber, "Modelling the trustworthiness of the IoT (RERUM Deliverable D3.3)" , 2016.

PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services

T. Lorünser, D. Slamanig, T. Länger and H. C. Pöhls, "PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016) , Conference Publishing Services (CPS), 2016.

File: http://henrich.poehls.com/papers/2016_LoruenserSlamanigLaengerPoehls_PRISMCLOUD-Architecture_SECPID_ARES.pdf

Securing Communications Among Severely Constrained, Wireless Embedded Devices

A. Fragkiadakis, G. Oikonomou, H. C. Pöhls, E. Z. Tragos and M. Wójcik, "Securing Communications Among Severely Constrained, Wireless Embedded Devices" in Engineering Secure Internet of Things Systems , Benjamin Aziz and Alvaro Arenas and Bruno Crispo, Eds. The Institute of Engineering and Technology, 2016.

File: http://www.theiet.org/resources/books/security/secIoT.cfm

Security & Privacy for the Internet-of-Things communication in the SmartCity

R. C. Staudemeyer, H. C. Pöhls and B. W. Watson, "Security & Privacy for the Internet-of-Things communication in the SmartCity" in Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions , Springer, 2016, pp. 28.

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

T. Länger, H. C. Pöhls and S. Ghernaouti, "Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds" in Privacy Technologies and Policy - 4th Annual Privacy Forum (APF 2016) , Springer, 2016.

File: http://henrich.poehls.com/papers/2016_LaengerPoehlsGhernaouti_SecurityPatternsForClouds_ENISA-APF.pdf

Towards Authenticity and Privacy Preserving Accountable Workflows

D. Derler, C. Hanser, H. C. Pöhls and D. Slamanig, "Towards Authenticity and Privacy Preserving Accountable Workflows" in {Privacy and Identity Management. Time for a Revolution? - Proc. of 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School} , Springer, 2016. pp. 170-186.

DOI: http://www.springer.com/de/book/9783319417622

ISBN: 978-3-319-41762-2

File: http://henrich.poehls.com/papers/2015_DerlerHanserPoehlsSlamanig_Towards_Auth_Private_Accountable_Workflows.pdf

Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECCsignatures on an ARM-based device

M. Mössinger, B. Petschkuhn, J. Bauer, R. C.Staudemeyer, M. Wójcik and H. C. Pöhls, "Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECCsignatures on an ARM-based device" in {Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016)} , IEEE, 2016.

DOI: http://dx.doi.org/10.1109/WoWMoM.2016.7523559

File: http://henrich.poehls.com/papers/2016_Moessinger_et_al-Towards_quantifying_the_cost_of_a_secure_IoT.pdf

2015

A General Framework for Redactable Signatures and New Constructions

D. Derler, H. C. Pöhls, K. Samelin and D. Slamanig, "A General Framework for Redactable Signatures and New Constructions" in {Proc. of 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)} , Springer, 2015. pp. 3-19.

DOI: http://link.springer.com/content/pdf/10.1007%2F978-3-319-30840-1_1.pdf

File: http://henrich.poehls.com/papers/2015_DerlerPoehlsSamelinSlamanig-GeneralFrameworkForRedactableSignatures_ICISC.pdf

Accountable Redactable Signatures

H. C. Pöhls and K. Samelin, "Accountable Redactable Signatures" in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015) , IEEE, 2015.

File: http://henrich.poehls.com/papers/2015_Poehls-Samelin_Accountable-Redactable-Signatures_ARES15.pdf

Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities (RERUM Deliverable D3.1)

D. Ruiz, C. Reyes, A. Fragkiadakis, E. Tragos, V. Siris, A. Traganitis, P. Charalampides, H. C. Pöhls, B. Petschkuhn, J. Bauer, K. Fischer, J. Gessner, S. Suppan, J. Cuellar, M. Wójcik and G. Oikonomou, "Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities (RERUM Deliverable D3.1)" , internal report, 2015.

File: http://cordis.europa.eu/docs/projects/cnect/4/609094/080/deliverables/001-609094RERUMD31renditionDownload.pdf

Internet of Things -- Governance, Privacy and Security Issues

G. Baldini, T. Peirce, M. Botterman, M. Chiara Talacchini, A. Pereira, M. Handte, D. Rotondi, H. C. Pöhls, O. Vermesan, A. Baddii, B. Copigneaux, D. Schreckling, L. Vigano, G. Steri, S. Piccione, P. Vlacheas, V. Stavroulaki, D. Kelaidonis, R. Neisse, E. Tragos, P. Smadja, C. Hennebert, M. Serrano, S. Severi, G. Abreu, P. T. Kirstein, S. Varakliotis and A. Skarmeta, Internet of Things -- Governance, Privacy and Security Issues. .... IERC, 2015.

JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application

H. C. Pöhls, "JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application" in Proc. of the Workshop on Extending Seamlessly to the Internet of Things (esIoT), collocated at the IMIS-2012 International Conference (IMIS 2015) , IEEE, 2015. pp. 306 - 312.

DOI: http://dx.doi.org/10.1109/IMIS.2015.48

File: http://henrich.poehls.com/papers/2015_Poehls-JSONSensorSignatures_esIoT.pdf

Overview of Functional and Malleable Signature Schemes (PRISMACLOUD Deliverable D4.4)

D. Demirel, D. Derler, C. Hanser, H. C. Pöhls, D. Slamanig and G. Traverso, "Overview of Functional and Malleable Signature Schemes (PRISMACLOUD Deliverable D4.4)" , 2015.

File: http://henrich.poehls.com/papers/2015_TechReport_PRISMACLOUD_D_4_4.pdf

Privacy and Security in communications for Smart City applications

TODO

Privacy enhancing techniques in Smart City applications (RERUM Deliverable D3.2)

H. C. Pöhls, J. Cuellar, R. Weber, R. C. Staudemeyer, S. Suppan, E. Tragos, A. Fragkiadakis, M. Wójcik, J. Bauer, B. Petschkuhn and D. Ruiz, "Privacy enhancing techniques in Smart City applications (RERUM Deliverable D3.2)" , 2015.

File: https://bscw.ict-rerum.eu/pub/bscw.cgi/d31975/RERUM%20deliverable%20D3_2.pdf

Securing the Internet of Things - Security and Privacy in a Hyperconnected World

E. Z. Tragos, H. C. Pöhls, R. C. Staudemeyer, D. Slamanig, A. Kapovits, S. Suppan, A. Fragkiadakis, G. Baldini, R. Neisse, P. Langendörfer, Z. Dyka and C. Wittke, "Securing the Internet of Things - Security and Privacy in a Hyperconnected World" in Building the Hyperconnected Society - IoT Research and Innovation Value Chains, Ecosystems and Markets , Ovidiu Vermesan and Peter Friess, Eds. River Publishers, 2015, pp. 189-219.

File: http://henrich.poehls.com/papers/Building_the_Hyperconnected_Society_IERC_2015_Cluster_eBook_978-87-93237-98-8_P_Web.pdf

The legal status of malleable- and functional signatures in light of Regulation (EU) No910/2014

F. Geelkerken, H. C. Pöhls and S. Fischer-Hübner, "The legal status of malleable- and functional signatures in light of Regulation (EU) No910/2014" in {Proc. of 3rd International Academic Conference of Young Scientists on Law \& Psychology 2015 (LPS 2015)} , L'viv Polytechnic Publishing House, 2015. pp. 404-410.

ISBN: 978-617-607-856-2

File: https://drive.google.com/file/d/0B-Yu3Ni9z3PXM2lBajhCXzhoWk0/view

Towards a New Paradigm for Privacy and Security in Cloud Services

T. Lorünser, C. Bastos Rodriguez, D. Demirel, S. Fischer-Hübner, T. Gross, T. Länger, M. Noes, H. C. Pöhls, B. Rozenberg and D. Slamanig, "Towards a New Paradigm for Privacy and Security in Cloud Services" in New LEIT projects on Security-by-Design - 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Brussels, Belgium, April 28 - 29 , Springer, 2015.

DOI: http://arxiv.org/abs/1506.05980v2

File: http://henrich.poehls.com/papers/2015_DerlerPoehlsSamelinSlamanig-GeneralFrameworkForRedactableSignatures_ICISC.pdf

2014

Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy and Performance

H. C. Pöhls, B. Petschkuhn, J. Rückert and M. Mössinger, "Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy and Performance" in IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2014) , IEEE, 2014.

DOI: http://dx.doi.org/10.1109/CAMAD.2014.7033231

File: http://henrich.poehls.com/papers/2014_PoehlsMoessingerPetschkuhnRueckert_AggregationAndPerturbationInPractice_CAMAD2014.pdf

Enabling Reliable and Secure IoT-based Smart City Applications

E. Z. Tragos, V. Angelakis, A. Fragkiadakis, D. Gundlegard, S. Nechifor, G. Oikonomou, H. C. Pöhls and A. Gavras, "Enabling Reliable and Secure IoT-based Smart City Applications" in Proc. of 1st International IEEE Workshop on Pervasive Systems for Smart Cities , IEEE, 2014.

DOI: http://dx.doi.org/10.1109/PerComW.2014.6815175

File: http://dx.doi.org/10.1109/PerComW.2014.6815175

Integrity -- Definitions, Pitfalls, and Importance for the Internet of Things

TODO

On the Relation between Redactable and Sanitizable Signature Schemes

H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "On the Relation between Redactable and Sanitizable Signature Schemes" in Proc. of the 6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014) , Jürjens, Jan and Piessens, Frank and Bielova, Nataliia, Eds. Springer International Publishing, 2014. pp. 113-130.

DOI: http://dx.doi.org/10.1007/978-3-319-04897-0_8

ISBN: 978-3-319-04896-3

File: http://henrich.poehls.com/papers/2014_DeMeerPoehlsPoseggaSamelin_Relation-between-Sanitizable-and-Redactable-Signatures_ESSOS2014.pdf

On Updatable Redactable Signatures

H. C. Pöhls and K. Samelin, "On Updatable Redactable Signatures" in Proc. of the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , Springer, 2014.

DOI: http://link.springer.com/chapter/10.1007/978-3-319-07536-5_27

File: http://henrich.poehls.com/papers/2014_PoehlsSamelin_OnUpdatableRedactableSignatures_ACNS14_full.pdf

Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions

[English] H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions" , vol. 455, pp. 155-171, 2014. Springer Berlin Heidelberg.

DOI: http://dx.doi.org/10.1007/978-3-662-44791-8_10

ISBN: 978-3-662-44790-1

File: http://henrich.poehls.com/papers/2014_DeMeerPoehlsPoseggaSamlin_RSS-for-Trees-With-Signer-Controlled-Non-Leaf-Redactions_CCIS.pdf

Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid

H. C. Pöhls and M. Karwe, "Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid" in Proc. of the 2nd Workshop on Smart Grid Security (SmartGridSec 2014) , Jorge Cuellar, Eds. Springer International Publishing, 2014.

DOI: http://link.springer.com/chapter/10.1007/978-3-319-10329-7_6/fulltext.html

File: http://henrich.poehls.com/papers/2014_Poehls_Karwe_RedactableSignaturesToControlTheMaximumNoiseForDifferentialPrivacyInTheSmartGrid.pdf

RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects

H. C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E. Z. Tragos, R. Diaz Rodriguez and T. Mouroutis, "RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects" in Proc. of the IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies , IEEE, 2014.

DOI: http://dx.doi.org/10.1109/WCNCW.2014.6934872

File: http://dx.doi.org/10.1109/WCNCW.2014.6934872

2013

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity

H. C. Pöhls, "Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity" in Trust Management VII , Fernandez-Gago, Carmen and Martinelli, Fabio and Pearson, Siani and Agudo, Isaac, Eds. Springer Berlin Heidelberg, 2013. pp. 136-150.

DOI: http://dx.doi.org/10.1007/978-3-642-38323-6_10

ISBN: 978-3-642-38322-9

File: http://henrich.poehls.com/papers/2013_Poehls_Contingency.pdf

Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures

C. Brzuska, H. C. Pöhls and K. Samelin, "Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures" in Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013) , Katsikas, Sokratis and Agudo, Isaac, Eds. Springer Berlin Heidelberg, 2013. pp. 12-30.

DOI: http://dx.doi.org/10.1007/978-3-642-53997-8_2

ISBN: 978-3-642-53996-1

File: http://henrich.poehls.com/papers/2013_BrzuskaPoehlsSamelin_Efficient-and-Perfectly-Unlinkable-Sanitizable-Signatures_EuroPKI13.pdf

Malleable Signatures for Resource Constrained Platforms

H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. Meer, "Malleable Signatures for Resource Constrained Platforms" in Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems , Cavallaro, Lorenzo and Gollmann, Dieter, Eds. Springer-Verlag, 2013. pp. 18-33.

DOI: http://dx.doi.org/10.1007/978-3-642-38530-8_2

ISBN: 978-3-642-38529-2

File: http://henrich.poehls.com/papers/2013_PoehlsPetersSamelinPoseggaDeMeer_WISTP.pdf

Scope of Security Properties of Sanitizable Signatures Revisited

H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "Scope of Security Properties of Sanitizable Signatures Revisited" in Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013) , IEEE, 2013. pp. 188-197.

DOI: http://dx.doi.org/10.1109/ARES.2013.26

File: http://henrich.poehls.com/papers/2013_DeMeer_Poehls_Posegga_Samelin-ScopeofSecurityPropertiesofSanitizableSignaturesRevisited.pdf

2012

Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction

H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction" in Proc. of the International Conference on Security and Cryptography (SECRYPT 2012) , SciTePress, 2012. pp. 113-125.

ISBN: 978-989-8565-24-2

File: http://henrich.poehls.com/papers/2012-Poehls-Samelin-DeMeer-Posegga_SECRYPT12_Flexible-Redactable-Signature-Schemes-for-Trees.pdf

Indistinguishability of One-Way Accumulators

H. Meer, M. Liedel, H. C. Pöhls, J. Posegga and K. Samelin, "Indistinguishability of One-Way Accumulators" , 2012.

File: https://www.fim.uni-passau.de/fileadmin/files/forschung/mip-berichte/MIP_1210.pdf

Length-Hiding Redactable Signatures from One-Way Accumulators in O(n)

H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Length-Hiding Redactable Signatures from One-Way Accumulators in O(n)" , 2012.

File: http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1201.pdf

No Integrity, thanks --- Verifiable Explicit Consented Undecidability of Integrity

TODO

Non-Interactive Public Accountability for Sanitizable Signatures

C. Brzuska, H. C. Pöhls and K. Samelin, "Non-Interactive Public Accountability for Sanitizable Signatures" in Proc. of the 9th European PKI Workshop: Research and Applications (EuroPKI 2012) , Springer-Verlag, 2012. pp. 178.

File: http://henrich.poehls.com/papers/2012_BrzuskaPoehlsSamelin_NonInteractive-Public-Accountability-for-SanSigs.pdf

On Structural Signatures for Tree Structured Data

K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. Meer, "On Structural Signatures for Tree Structured Data" in Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012) , Springer, 2012.

DOI: http://link.springer.com/chapter/10.1007/978-3-642-31284-7_11

File: http://henrich.poehls.com/papers/2012_Samelin-Poehls-Bilzhause-Posegga-DeMeer-OnStructuralSignaturesForTrees.pdf

Rechtsfolgen editierbarer Signaturen

F. Höhne, H. C. Pöhls and K. Samelin, "Rechtsfolgen editierbarer Signaturen" , Datenschutz und Datenrecht (DuD) , vol. Volume 36, no. 6, pp. 485-491, 2012.

File: http://henrich.poehls.com/papers/2012_HoehnePoehlsSamelin_DuD1207.pdf

Redactable Signatures for Independent Removal of Structure and Content

K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. Meer, "Redactable Signatures for Independent Removal of Structure and Content" in Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012) , Springer, 2012.

File: http://henrich.poehls.com/papers/2012_Samelin_Poehls_Bilzhause_Posegga_DeMeer_ISPEC_SeperateRedactionOfContentAndStructure.pdf

Redactable vs. Sanitizable Signatures

K. Samelin, H. C. Pöhls, J. Posegga and H. Meer, "Redactable vs. Sanitizable Signatures" , 2012.

Sticky Signatures: Legal Advantages of Redactable Signatures and Credentials in the Food Supply Chain

H. C. Pöhls and F. Höhne, "Sticky Signatures: Legal Advantages of Redactable Signatures and Credentials in the Food Supply Chain" in Proc. of the 5th Interdisciplinary Conference on Current Issues in IT Security 2012 , Dunker \& Humblot, Berlin, 2012.

The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes

H. C. Pöhls and F. Höhne, "The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes" in Proc. of 7th International Workshop on Security and Trust Management (STM 2011) , Springer, 2012. pp. 175-192.

File: http://henrich.poehls.com/papers/2011_Poehls-Hoehne_STM-11_Role-of-Data-Integrity-in-EU-Digital-Signature-Legislation.pdf

Transparent Mergeable Redactable Signatures with Signer Commitment and Applications

H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Transparent Mergeable Redactable Signatures with Signer Commitment and Applications" , 2012.

File: http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1206.pdf

2011

Authenticity and Confidentiality - A ''one-night stand'' in TLS?

TODO

Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency

H. C. Pöhls, K. Samelin and J. Posegga, "Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency" in Proc. of 9th International Conference on Applied Cryptography and Network Security (ACNS 2011) , Springer, 2011.

File: http://henrich.poehls.com/papers/2011_Poehls-Samelin-Posegga_ACNS_Sanitizable-Signatures-in-XML-Signature.pdf

Sanitizable Signed Privacy Preferences for Social Networks

H. C. Pöhls, A. Bilzhause, K. Samelin and J. Posegga, "Sanitizable Signed Privacy Preferences for Social Networks" in Proc. of GI Workshop on Privacy and Identity Management for Communities - Communities for Privacy and Identity Management (DICCDI 2011) , GI, 2011.

File: http://henrich.poehls.com/papers/2011_Poehls-Bilzhause-Samelin-Posegga_Sanitizable-Signed-Privacy-Preferences-for-Social-Networks_DICCDI-2011.pdf

2010

BitFlip: Determine a Data's Signature Coverage from within the Application

TODO

Grund und Grenzen staatlicher Schutzpflichten für die IT-Infrastruktur

F. Höhne and H. C. Pöhls, "Grund und Grenzen staatlicher Schutzpflichten für die IT-Infrastruktur" in Tagungsband der 11. Herbstakademie der Deutschen Stiftung für Recht und Informatik (DSRI): Digitale Evolution - Herausforderungen für das Informations- und Medienrecht , {OlWIR} Oldenburger Verlag für Wirtschaft, Informatik und Recht, 2010.

ISBN: 978-3-939704-50-8

Staatliche Schutzpflichten für die IT-Infrastruktur

F. Höhne and H. C. Pöhls, "Staatliche Schutzpflichten für die IT-Infrastruktur" in Proc. of D-A-CH Security 2010 , 2010.

The State of XML Digital Signatures

TODO

Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions

R. Herkenhöner, M. Jensen, H. C. Pöhls and H. Meer, "Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions" in IEEE 2010 International Workshop on WebService and Business Process Security (WSBPS 2010) , IEEE, 2010.

DOI: http://www.computer.org/csdl/proceedings/services/2010/4129/00/4129a645-abs.html

File: http://henrich.poehls.com/papers/2010_Herkenhohner_Poehls_Jensen_AutomatedRightofAccess.pdf

Why Showing one TLS Certificate is not enough? Towards a Browser Feedback for Multiple TLS Certificate Verifications

H. C. Pöhls, "Why Showing one TLS Certificate is not enough? Towards a Browser Feedback for Multiple TLS Certificate Verifications" in Proc. of GI Sicherheit 2010 - Gesellschaft für Informatik , GI, 2010.

File: http://web.sec.uni-passau.de/papers/2010_Poehls_Show_Multiple_SSL_Certificate_Verifications_GI-Sicherheit.pdf

2009

Authenticity for Web Content - Why the web's transport security era must end?

TODO

2008

Authenticity: The missing link in the social semantic web

B. Braun and H. C. Pöhls, "Authenticity: The missing link in the social semantic web" in INFORMATIK 2008 Beherrschbare Systeme - dank Informatik, Digitale Soziale Netze 2008 , Lecture Notes in Informatics (LNI), Springer, 2008.

DOI: http://subs.emis.de/LNI/Proceedings/Proceedings134/article2208.html

File: http://henrich.poehls.com/papers/2008_braun_poehls_authenticity_missing_link_in_social_networks.pdf

ConCert: Content Revocation using Certificates

H. C. Pöhls, "ConCert: Content Revocation using Certificates" in GI Sicherheit 2008 - Gesellschaft für Informatik , Jörg Siekmann, Eds. GI, 2008. pp. 149-162.

File: http://henrich.poehls.com/papers/2008_poehls_GI-Sicherheit_Concert-Content-revocation-using-certificates.pdf

Die ''Untiefen'' der neuen XML-basierten Dokumentenformate

H. C. Pöhls and L. Westphal, "Die ''Untiefen'' der neuen XML-basierten Dokumentenformate" in 15. DFN CERT Workshop Sicherheit in vernetzten Systemen , Christian Paulsen, Eds. 2008.

File: http://henrich.poehls.com/papers/2008_Poehls_Westphal_2008_DFN-CERT-WS_Untiefen_der_XML-Dokumentenformate.pdf

Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data

H. C. Pöhls, "Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data" in Proc. of Information and Communications Security (ICICS) 2008 , L. Chen, M.D. Ryan, and G. Wang, Eds. Springer, 2008. pp. 279-293.

DOI: http://dx.doi.org/10.1007/978-3-540-88625-9_19

File: http://henrich.poehls.com/papers/2008_Poehls_RevocableExpressionOfConsent_ICICS2008.pdf

Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data

TODO

2007

Authenticity and Revocation of Web Content using Signed Microformats and PKI

H. C. Pöhls, "Authenticity and Revocation of Web Content using Signed Microformats and PKI" , Hamburg, Germany, 2007.

File: http://henrich.poehls.com/papers/2007_Poehls_TechReport_B-276-07.pdf

2006

Smartcard Firewalls Revisited

H. C. Pöhls and J. Posegga, "Smartcard Firewalls Revisited" in Proc. 7th Intern. Conf. on Smart Card Research and Applications , Tarragona, Spain: Springer Verlag, 2006. pp. 179-191.

File: http://henrich.poehls.com/papers/2006_Poehls_Posegga_SmartcardFirewallsRevisited.pdf

Data Driven and Data Centric Security

TODO

Digital Signatures and Context-Loss - How Digital Signatures might facilitate Data Protection Claims in SOA

TODO

Integrity Protection for Authorized Changes - Sanitizable Signatures with Transparency or Detectability

TODO

I agree that a connection to the Vimeo server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
I agree that a connection to the YouTube server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
Show video