Dr. Henrich C. Pöhls
Dr. rer. nat. Henrich C. Pöhls
Lecturer & Research Assistant
Chair of IT-Security
Innstr. 43
94032 Passau
Room: ITZ/IH 136
Phone: +49(0)851/509-3217
Fax: +49(0)851/509-3212
E-Mail: henrichDOTpoehls@uni-passau.de
PGP-Key / PGP-Key (local)
PGP-Fingerprint: 13a2 45ed 4fdc 2a66 f99e 1e29 e98e 021a 937a f4f2
Mastodon: https://infosec.exchange/@henrichpoehls
Current Activities
Henrich C. Pöhls currently lectures in IT-Security, i.e General IT-Security as well as Secure AI Systems, and in his teaching and research he tries to bridge gaps by conducting interdisciplinary work especially in the fields of IT-Security (esp. cryptography), software development and law:
"The more gaps between those worlds get bridged, the more sound (=safe, secure and legally compliant) ICT-enhanced products and digitally-enhanced environments will be."
Besides teaching he collaborated and lead several successful research projects on security and privacy for Cloud (eg. PRISMACLOUD) & IoT (eg. RERUM and SEMIoTICS). Finally, he is also active in national and international standardisation (eg. editor of ISO/IEC standard 23264 on Redaction of authentic data in ISO JTC1/SC27).
Research Interests
- Secure AI Systems (increasing the IT-security of AI systems and risk analysis of systems that incorporate AI functions)
- Integrity protection (legally, cryptographically, organisationally),
- Redactable & Sanitizable Signatures,
- Legal implications of Digital Signatures (EU Electronic Signature Legislation - eIDAS),
- Privacy Enhancing Technology (PET) and Data Protection with respect to Authenticity and (Structural) Integrity Protection of the contained Information,
- Security of Internet-Of-things (IoT),
- SupplyChain- / SOA- / BusinessProcess-Security,
- Digitally Signed Microformatted Content and
- Tree-Based Structured Document Formats (XML-Based).
- Additional interests:
- Web-Services, "Web 2.0"
- Wireless Communications (WLAN, Bluetooth, RFID, etc.)
- TLS, PKI, and Certificates
- Networked Smartcards
Teaching
SoSe 21
- 6037 Lecture: Sichere KI-Systeme / Secure AI-Systems
- 5825HS Advanced seminar: Real Life Security M. Sc.
- 5827HS Advanced seminar: Real Life Security B. Sc.
SoSe 20
WiSe 18/19
SoSe 19
- 5622UE System Security (Software-Sicherheit )
- 5825HS Real Life Security M. Sc.
- 5827HS Real Life Security B. Sc.
WiSe 18/19
SoSe 14
WiSe 10/11
SoSe 10
WiSe 09/10
SoSe 09
- 5231 Was Sie schon immer über IT-Sicherheit wissen wollten aber nie zu fragen wagten
- 5622UE Software-Sicherheit
- 5822 Software-Sicherheit
- 5826 IT Security unleashed 2.0
- 5827 IT Security unleashed
WiSe 08/09
Publications
2023
https://www.imbus.de/downloads?no_cache=1&tx_abdownloads_pi1%5Baction%5D=getviewclickeddownload&tx_abdownloads_pi1%5Bcatids%5D=107&tx_abdownloads_pi1%5Buid%5D=1061&cHash=4a3aa33d9023463a56894cb2104e3f4a
2022
https://committee.iso.org/files/live/sites/jtc1sc27/files/resources/ISO-IECJTC1-SC27_N22216_SC27_Journal_Vol_1_Issue_3.pdf
2021
https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8
http://henrich.poehls.com/papers/2020_Menges-et-al_Computers-and-Security_Journal_GDPR_Compliant_Data_Processing_in_Modern_SIEM_Systems.pdf
2020
https://henrich.poehls.com/papers/2020_PoehlsRakotondravony_HCII2020_DynamicConsent-Physical-%20switches-and-feedback-to-adjust-consent.pdf
http://henrich.poehls.com/papers/2019_KrennPoehlsSamleinSlamanig_FullyInvisibleProteanSignatures_IET-IFS-2019-0141.pdf
http://henrich.poehls.com/papers/2020_Pattern-driven-Security-Privacy-Dependability-and-Interoperability-in-IoT_978-1-68083-683-7_ch7.pdf
http://henrich.poehls.com/papers/2020_KlementPoehlsSpielvogel_GIOTS20_Privacy-preserving-local-monitoring-and-evaluation-of-IoT-network-traffic.pdf
2019
http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf
2018
http://henrich.poehls.com/papers/2018_SellPoehlsLoruenser_CostOfSecretSharedCloudStorage_IEEE-CloudCom.pdf
DOI: https://doi.org/10.1007/978-3-319-89339-6_2
http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_TrapdoorChamHash_AFRICACRYPT2018_full.pdf
DOI: https://doi.org/10.1145/3230833.3233765
http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf
https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf
DOI: https://doi.org/10.1007/978-3-030-00434-7_13
http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_SanitizableAndDeleteableSignature_CANS-full.pdf
http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf
2017
DOI: https://eprint.iacr.org/2017/011
http://henrich.poehls.com/papers/2017_CDKPSS_chamhash_with_ephemeral_trapdoors_PKC-eprint.pdf
http://henrich.poehls.com/papers/2017_BilzhausePoehlsSamelin_ARES17_RSS_SSS_PastPresentFuture.pdf
DOI: https://eprint.iacr.org/2017/445.pdf
http://henrich.poehls.com/papers/2017_BCDKPSS_Practical-Strongly-Invisible-and-Strongly-Accountable-Sanitizable-Signatures_ACISP.pdf
http://henrich.poehls.com/papers/2017_PoehlsPetschkuhn_IoT_signature_encoding_CAMAD.pdf
2016
http://henrich.poehls.com/papers/2016_Moldovan-et-al_IoT-middleware-for-enhanced-sec-and-priv-RERUM_NTMS.pdf
http://henrich.poehls.com/papers/2016_BilzhauseHuberPoehlsSamelin_4EyesPrinciple_ARES_SECPID.pdf
http://henrich.poehls.com/papers/2016_Bauer-et-al_ECDSA-on-things_ICICS.pdf
http://henrich.poehls.com/papers/2016_SelectiveDisclosureControl_ICICS2016_full.pdf
http://cordis.europa.eu/docs/projects/cnect/4/609094/080/deliverables/001-RERUMdeliverableD32Ares20153669911.pdf
http://henrich.poehls.com/papers/2016_LoruenserSlamanigLaengerPoehls_PRISMCLOUD-Architecture_SECPID_ARES.pdf
http://www.theiet.org/resources/books/security/secIoT.cfm
http://henrich.poehls.com/papers/2016_LaengerPoehlsGhernaouti_SecurityPatternsForClouds_ENISA-APF.pdf
DOI: http://www.springer.com/de/book/9783319417622
http://henrich.poehls.com/papers/2015_DerlerHanserPoehlsSlamanig_Towards_Auth_Private_Accountable_Workflows.pdf
DOI: http://dx.doi.org/10.1109/WoWMoM.2016.7523559
http://henrich.poehls.com/papers/2016_Moessinger_et_al-Towards_quantifying_the_cost_of_a_secure_IoT.pdf
2015
DOI: http://link.springer.com/content/pdf/10.1007%2F978-3-319-30840-1_1.pdf
http://henrich.poehls.com/papers/2015_DerlerPoehlsSamelinSlamanig-GeneralFrameworkForRedactableSignatures_ICISC.pdf
http://henrich.poehls.com/papers/2015_Poehls-Samelin_Accountable-Redactable-Signatures_ARES15.pdf
http://cordis.europa.eu/docs/projects/cnect/4/609094/080/deliverables/001-609094RERUMD31renditionDownload.pdf
DOI: http://dx.doi.org/10.1109/IMIS.2015.48
http://henrich.poehls.com/papers/2015_Poehls-JSONSensorSignatures_esIoT.pdf
http://henrich.poehls.com/papers/2015_TechReport_PRISMACLOUD_D_4_4.pdf
https://bscw.ict-rerum.eu/pub/bscw.cgi/d31975/RERUM%20deliverable%20D3_2.pdf
http://henrich.poehls.com/papers/Building_the_Hyperconnected_Society_IERC_2015_Cluster_eBook_978-87-93237-98-8_P_Web.pdf
https://drive.google.com/file/d/0B-Yu3Ni9z3PXM2lBajhCXzhoWk0/view
DOI: http://arxiv.org/abs/1506.05980v2
http://henrich.poehls.com/papers/2015_DerlerPoehlsSamelinSlamanig-GeneralFrameworkForRedactableSignatures_ICISC.pdf
2014
DOI: http://dx.doi.org/10.1109/CAMAD.2014.7033231
http://henrich.poehls.com/papers/2014_PoehlsMoessingerPetschkuhnRueckert_AggregationAndPerturbationInPractice_CAMAD2014.pdf
DOI: http://dx.doi.org/10.1109/PerComW.2014.6815175
http://dx.doi.org/10.1109/PerComW.2014.6815175
DOI: http://dx.doi.org/10.1007/978-3-319-04897-0_8
http://henrich.poehls.com/papers/2014_DeMeerPoehlsPoseggaSamelin_Relation-between-Sanitizable-and-Redactable-Signatures_ESSOS2014.pdf
DOI: http://link.springer.com/chapter/10.1007/978-3-319-07536-5_27
http://henrich.poehls.com/papers/2014_PoehlsSamelin_OnUpdatableRedactableSignatures_ACNS14_full.pdf
DOI: http://dx.doi.org/10.1007/978-3-662-44791-8_10
http://henrich.poehls.com/papers/2014_DeMeerPoehlsPoseggaSamlin_RSS-for-Trees-With-Signer-Controlled-Non-Leaf-Redactions_CCIS.pdf
DOI: http://link.springer.com/chapter/10.1007/978-3-319-10329-7_6/fulltext.html
http://henrich.poehls.com/papers/2014_Poehls_Karwe_RedactableSignaturesToControlTheMaximumNoiseForDifferentialPrivacyInTheSmartGrid.pdf
DOI: http://dx.doi.org/10.1109/WCNCW.2014.6934872
http://dx.doi.org/10.1109/WCNCW.2014.6934872
2013
DOI: http://dx.doi.org/10.1007/978-3-642-38323-6_10
http://henrich.poehls.com/papers/2013_Poehls_Contingency.pdf
DOI: http://dx.doi.org/10.1007/978-3-642-53997-8_2
http://henrich.poehls.com/papers/2013_BrzuskaPoehlsSamelin_Efficient-and-Perfectly-Unlinkable-Sanitizable-Signatures_EuroPKI13.pdf
DOI: http://dx.doi.org/10.1007/978-3-642-38530-8_2
http://henrich.poehls.com/papers/2013_PoehlsPetersSamelinPoseggaDeMeer_WISTP.pdf
DOI: http://dx.doi.org/10.1109/ARES.2013.26
http://henrich.poehls.com/papers/2013_DeMeer_Poehls_Posegga_Samelin-ScopeofSecurityPropertiesofSanitizableSignaturesRevisited.pdf
2012
http://henrich.poehls.com/papers/2012-Poehls-Samelin-DeMeer-Posegga_SECRYPT12_Flexible-Redactable-Signature-Schemes-for-Trees.pdf
https://www.fim.uni-passau.de/fileadmin/files/forschung/mip-berichte/MIP_1210.pdf
http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1201.pdf
http://henrich.poehls.com/papers/2012_BrzuskaPoehlsSamelin_NonInteractive-Public-Accountability-for-SanSigs.pdf
DOI: http://link.springer.com/chapter/10.1007/978-3-642-31284-7_11
http://henrich.poehls.com/papers/2012_Samelin-Poehls-Bilzhause-Posegga-DeMeer-OnStructuralSignaturesForTrees.pdf
http://henrich.poehls.com/papers/2012_HoehnePoehlsSamelin_DuD1207.pdf
http://henrich.poehls.com/papers/2012_Samelin_Poehls_Bilzhause_Posegga_DeMeer_ISPEC_SeperateRedactionOfContentAndStructure.pdf
http://henrich.poehls.com/papers/2011_Poehls-Hoehne_STM-11_Role-of-Data-Integrity-in-EU-Digital-Signature-Legislation.pdf
http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1206.pdf
2011
http://henrich.poehls.com/papers/2011_Poehls-Samelin-Posegga_ACNS_Sanitizable-Signatures-in-XML-Signature.pdf
http://henrich.poehls.com/papers/2011_Poehls-Bilzhause-Samelin-Posegga_Sanitizable-Signed-Privacy-Preferences-for-Social-Networks_DICCDI-2011.pdf
2010
DOI: http://www.computer.org/csdl/proceedings/services/2010/4129/00/4129a645-abs.html
http://henrich.poehls.com/papers/2010_Herkenhohner_Poehls_Jensen_AutomatedRightofAccess.pdf
http://web.sec.uni-passau.de/papers/2010_Poehls_Show_Multiple_SSL_Certificate_Verifications_GI-Sicherheit.pdf
2008
DOI: http://subs.emis.de/LNI/Proceedings/Proceedings134/article2208.html
http://henrich.poehls.com/papers/2008_braun_poehls_authenticity_missing_link_in_social_networks.pdf
http://henrich.poehls.com/papers/2008_poehls_GI-Sicherheit_Concert-Content-revocation-using-certificates.pdf
http://henrich.poehls.com/papers/2008_Poehls_Westphal_2008_DFN-CERT-WS_Untiefen_der_XML-Dokumentenformate.pdf
DOI: http://dx.doi.org/10.1007/978-3-540-88625-9_19
http://henrich.poehls.com/papers/2008_Poehls_RevocableExpressionOfConsent_ICICS2008.pdf
2007
http://henrich.poehls.com/papers/2007_Poehls_TechReport_B-276-07.pdf
2006
http://henrich.poehls.com/papers/2006_Poehls_Posegga_SmartcardFirewallsRevisited.pdf