Publications
- Oppliger, R., End-to-End Encrypted Messaging,
Artech House Publishers, Norwood, MA, to appear in 2020
- Oppliger, R., SSL and TLS: Theory and Practice, Second Edition,
ISBN 978-1-60807-998-8, Artech House Publishers, Norwood, MA, 2016
- Oppliger, R., Secure Messaging on the Internet,
ISBN 978-1-60807-717-5, Artech House Publishers, Norwood, MA, 2014
- Oppliger, R., Contemporary Cryptography, Second Edition,
ISBN 978-1-60807-145-6, Artech House Publishers, Norwood, MA, 2011
- Oppliger, R., SSL and TLS: Theory and Practice,
ISBN 978-1-59693-447-4, Artech House Publishers, Norwood, MA, 2009
- Oppliger, R., Contemporary Cryptography,
ISBN 978-1-58053-642-4, Artech House Publishers, Norwood, MA, 2005
- Oppliger, R.,
Security
Technologies for the World Wide Web, Second Edition,
ISBN 978-1-58053-348-5, Artech House Publishers, Norwood, MA, 2003
- Oppliger, R.,
Internet
and Intranet Security, Second Edition,
ISBN 978-1-58053-166-5, Artech House Publishers, Norwood, MA, 2002
- Oppliger, R.,
Secure
Messaging with PGP and S/MIME, ISBN 978-1-58053-161-0,
Artech House Publishers, Norwood, MA, 2001
- Oppliger, R.,
Security Technologies for the World Wide Web,
ISBN 978-1-58053-045-3, Artech House Publishers, Norwood, MA, 2000 (translated
into Chinese)
- Oppliger, R.,
Internet and Intranet Security,
ISBN 978-0-89006-829-8, Artech House Publishers, Norwood, MA, 1998
- Oppliger, R.,
IT-Sicherheit - Grundlagen und Umsetzung in der Praxis,
ISBN 978-3-52805-566-0, DuD Fachbeiträge, Friedr. Vieweg &
Sohn Verlagsgesellschaft mbH, Wiesbaden (Germany), 1997
(cover page)
- Oppliger, R.,
Authentication Systems for Secure Networks,
ISBN 978-0-89006-510-5, Artech House Publishers, Norwood, MA, 1996
(translated into Spanish)
- Oppliger, R., and Ph.J. Stüssi, Unternehmensweite
Kommunikationsnetze, ISBN 978-3-52805-423-6, Friedr. Vieweg
& Sohn Verlagsgesellschaft mbH, Wiesbaden (Germany), 1994
(cover page)
- Oppliger, R., Computersicherheit - Eine Einführung,
ISBN 978-3-52805-296-6, Friedr. Vieweg & Sohn
Verlagsgesellschaft mbH, Wiesbaden (Germany), 1992
(cover page)
- Oppliger, R., Geld im digitalen Zeitalter - Eine Standortbestimmung, In:
Baer, J., and W. Rother (Eds.), Geld - Philosophische, literaturwissenschaftliche
und ökonomische Perspektiven, ISBN 978-3-7965-2913-9, Schwabe Verlag,
Basel (Switzerland), 2013, pp. 187 - 207
- Oppliger, R., Network Security, In: Proakis, J.G. (Ed.),
Wiley Encyclopedia of Telecommunications, Vol. 3,
ISBN 978-0471369721, John Wiley & Sons, New York, NY, 2003,
pp. 1644 - 1652
- Oppliger, R., Datenschutzfreundliche Technologien für das
World Wide Web (WWW), In: Baeriswil, B., and B.
Rudin (Eds.), Perspektive Datenschutz: Praxis und
Entwicklungen in Recht und Technik, ISBN 978-3725543298,
Schulthess, Zürich (Switzerland), 2002, pp. 295 - 326
- Oppliger, R., Contributions to Research in Network Security,
Habilitation thesis (Habilitationsschrift), Department of
Computer Science, Faculty for Economic Sciences,
University of Zürich (Switzerland), January 1999
- Oppliger, R., Analyse und Entwurf von unternehmensweiten
Kommunikationsnetzen, Ph.D. thesis (Dissertation),
Institute for Computer Science and Applied Mathematics (IAM),
Faculty for Natural Sciences, University of Berne (Switzerland),
June 1993 (supervised by Prof. Dr. D. Hogrefe)
- Oppliger, R., Computersicherheit, M.Sc. thesis
(Diplomarbeit), Institute for Computer Science and
Applied Mathematics (IAM), Faculty for Natural Sciences,
University of Berne (Switzerland), May 1991 (supervised by
Prof. Dr. D. Hogrefe)
- Oppliger, R., Disillusioning Alice and Bob, IEEE Security & Privacy,
Vol. 15, No. 5, September/October 2017, pp. 82 - 84
- Oppliger, R., Pernul, G., and S. Katsikas,
Guest Editor's Introduction - New Frontiers: Assessing and Managing Security Risks,
IEEE Computer, Vol. 50, No. 4, April 2017, pp. 48 - 51
- Oppliger, R., Quantitative Risk Analysis in Information Security Management: A Modern Fairy
Tale, IEEE Security & Privacy, Vol. 13, No. 6, November/December 2015, pp. 18 - 21
- Oppliger, R., Certification Authorities Under Attack: A Plea for Certificate
Legitimation, IEEE Internet Computing, Vol. 18, No. 1, January/February 2014, pp. 40 - 47
- Oppliger, R., and B. Wildhaber,
Common Misconceptions in Computer and Information Security,
IEEE Computer, Vol. 45, No. 6, June 2012, pp. 102 - 104
- Oppliger, R.,
Guest Editor's Introduction - Security and Privacy in an Online World,
IEEE Computer, Vol. 44, No. 9, September 2011, pp. 21 - 22
- Oppliger, R., Rytz, R., and T. Holderegger,
Internet Banking: Client-Side Attacks and Protection Mechanisms,
IEEE Computer, Vol. 42, No. 6, June 2009, pp. 27 - 33
- Oppliger, R., Hauser, R., and D. Basin,
SSL/TLS Session-Aware User Authentication Revisited, Computers & Security,
Vol. 27, Issues 3 - 4, May/June 2008, pp. 64 - 70
- Oppliger, R., and R. Hauser,
Protecting TLS-SA Implementations for the Challenge-Response Feature of
EMV-CAP Against Challenge Collision Attacks, Security and Communication
Networks, Vol. 1, Issue 2, March/April 2008, pp. 125 - 134
- Oppliger, R., Hauser, R., and D. Basin,
SSL/TLS Session-Aware User Authentication, IEEE Computer, Vol. 41, No. 3,
March 2008, pp. 59 - 65
- Oppliger, R.,
IT Security: In Search of the Holy Grail,
Communications of the ACM, Vol. 50, No. 2, February 2007, pp. 96 - 98
- Oppliger, R., Providing Certified Mail Services on the Internet,
IEEE Security & Privacy, Vol. 5, No. 1, January/Februrary 2007, pp. 16 - 22
- Oppliger, R., Hauser, R., and D. Basin, SSL/TLS
session-aware user authentication-Or how to effectively thwart the
man-in-the-middle,
Computer Communications, Vol. 29, Issue 12, August 2006, pp. 2238 - 2246
- Lopez, J., Oppliger, R., and G. Pernul, Why have public key infrastructures
failed so far? Internet Research, Vol. 15, No. 5, 2005, pp. 544 - 556
- Oppliger, R., Privacy-enhancing Technologies for the world wide web,
Computer Communications, Vol. 28, Issue 16, October 2005, pp. 1791 - 1797
- Oppliger, R., and R. Rytz, Does Trusted Computing Remedy Computer
Security Problems? IEEE Security & Privacy, Vol. 3, No. 2,
March/April 2005, pp. 16 - 19
- Lopez, J., Oppliger, R., and G. Pernul, Authentication and authorization
infrastructures (AAIs): a comparative survey, Computers & Security,
Vol. 23, Issue 7, October 2004, pp. 578 - 590
- Oppliger, R.,
Certified Mail: The Next Challenge for Secure Messaging,
Communications of the ACM, Vol. 47, No. 8, August 2004, pp. 75 - 79
- Oppliger, R., and P. Stadlin, A certified mail system (CMS) for the
Internet, Computer Communications, Vol. 27, Issue 13, August 2004,
pp. 1229 - 1235
- Oppliger, R., Microsoft .NET Passport and identity management,
Information Security Technical Report, Vol. 9, No. 1, 2004, pp. 26 - 34
- Oppliger, R.,
Sicherheit von Open Source Software - Mythos oder Wirklichkeit?
Datenschutz und Datensicherheit (DuD), Vol. 27, No. 11,
November 2003, pp. 669 - 675
- Oppliger, R., and R. Rytz, Digital Evidence: Dream and Reality,
IEEE Security & Privacy, Vol. 1, No. 5, September/October 2003,
pp. 44 - 48
- Oppliger, R.,
Microsoft .NET Passport: A Security Analysis,
IEEE Computer, Vol. 36, No. 7, July 2003, pp. 29 - 35
- Oppliger, R., Microsoft Outlook Web Access: Blessing or Bane
to Security? IEEE IT Professional, Vol. 5, No. 1,
January/February 2003, pp. 27 - 31
- Oppliger, R., Managing certificates in a corporate
environment, Annals of telecommunications,
Vol. 55, No. 7-8, July/August 2000, pp. 341 - 351
- Oppliger, R.,
Privacy protection and anonymity services for the world
wide web (WWW), Future Generation Computer Systems (FGCS)
Journal, Vol. 16, Issue 4, February 2000, pp. 379 - 391
- Oppliger, R.,
Security issues related to mobile code and agent-based
systems, Computer Communications, Vol. 22, Issue 12,
July 1999, pp. 1165 - 1170
- Oppliger, R.,
Security at the Internet Layer, IEEE Computer,
Vol. 31, No. 9, September 1998, pp. 43 - 47
- Oppliger, R.,
Sicherheitsprotokolle für das Internet,
Datenschutz und Datensicherheit (DuD), Vol. 21, No. 12,
December 1997, pp. 686 - 690
- Oppliger, R., and A. Albanese.
Participants Registration, Validation, and Key Distribution
for Large-Scale Conferencing Systems,
IEEE Communications, Vol. 35, No. 6, June 1997,
pp. 130 - 135
- Oppliger, R.,
Internet
Security: Firewalls and Beyond, Communications
of the ACM, Vol. 40, No. 5, May 1997, pp. 92 - 102
- Oppliger, R., Internet Kiosk: Internet security enters the Middle
Ages, IEEE Computer, Vol. 28, No. 10, October 1995,
pp. 100 - 101
- Oppliger, R., and D. Hogrefe,
Sicherheit in unternehmensweiten Kommunikationsnetzen
(CCN), Praxis der Informationsverarbeitung und
Kommunikation (PIK), Vol. 15, No. 4, 1992, pp. 213 - 217
5. Conference and Workshop Papers |
- Oppliger, R., Schwenk, J., and C. Loehr, CAPTCHA-based Code Voting, Proceedings of
the 3rd International Conference on Electronic Voting 2008 (EVOTE08), Bregenz
(Austria), August 6 - 9, 2008
- Oppliger, R., Schwenk, J., and J. Helbach,
Protecting Code Voting Against Vote Selling, Proceedings of
the GI Conference on "Sicherheit, Schutz und Zuverlässigkeit"
(Sicherheit 2008), Saarbrücken (Germany), Springer-Verlag, Berlin,
April 2 - 4, 2008
- Oppliger, R., Hauser, R., Basin, D., Rodenhaeuser, A., and B. Kaiser,
A Proof of Concept Implementation of SSL/TLS Session-Aware
User Authentication (TLS-SA), Proceedings of the 15th
GI/ITG Conference on "Kommunikation in Verteilten Systemen"
(KiVS '07), Berne (Switzerland), Springer-Verlag, Berlin,
February 26 - March 2, 2007, pp. 225 - 236
- Oppliger, R., Gajek, S., and R. Hauser,
Security of Microsoft's Identity Metasystem and CardSpace,
Proceedings of the 15th GI/ITG Conference on "Kommunikation in
Verteilten Systemen" (KiVS '07), Industry Track, Berne (Switzerland),
VDE Verlag, Berlin, February 26 - March 2, 2007, pp. 63 - 74
- Oppliger, R., Hauser, R., and D. Basin,
Browser Enhancements to Support
SSL/TLS Session-Aware User Authentication, Position paper, W3C Workshop
on Transparency and Usability of Web Authentication, New York, USA,
March 15 - 16, 2006
- Oppliger, R., and S. Gajek,
Effective Protection Against Phishing and Web Spoofing,
Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and
Multimedia Security (CMS 2005), Salzburg (Austria), Springer-Verlag, LNCS 3677,
September 19 - 21, 2005, pp. 32 - 41
- Lopez, J., Oppliger, R., and G. Pernul,
Classifying Public Key Certificates, Proceedings of the 2nd
European PKI Workshop, Canterbury (UK), Springer-Verlag, LNCS 3545,
June 30 - July 1, 2005, pp. 135 - 143
- Lopez, J., Montenegro, J.A., Oppliger, R., and G. Pernul,
On
a Taxonomy of Systems for Authentication and/or Authorization
Services, Proceedings of the TERENA
Networking Conference, Rhodes (Greece), June 7 - 10, 2004
- Oppliger, R.,
How
to Address the Secure Platform Problem for Remote Internet
Voting, Proceedings of the 5th Conference on
"Sicherheit in Informationssystemen" (SIS 2002),
Vienna (Austria), October 3 - 4, 2002, vdf Hochschulverlag, pp. 153 - 173
- Oppliger, R., Pernul, G., and Ch. Strauss,
Using
Attribute Certificates to Implement Role-based
Authorization and Access Control, Proceedings of the
4th Conference on "Sicherheit in Informationssystemen" (SIS 2000),
Zürich (Switzerland), October 5 - 6, 2000, vdf Hochschulverlag,
pp. 169 - 184
- Oppliger, R., Greulich, A., and P. Trachsel,
A
Distributed Certificate Management System (DCMS) Supporting Group-Based Access
Controls, Proceedings of the 15th Annual Computer
Security Applications Conference (ACSAC '99),
Scottsdale, AZ, December 6 - 10, 1999, IEEE Computer
Society Press, Los Alamitos, CA, pp. 241 - 248
- Oppliger, R., Authorization Methods for E-Commerce Applications,
Proceedings of the 18th IEEE International Symposium on Reliable Distributed
Systems (SRDS '99), Workshop on Electronic Commerce,
Lausanne (Switzerland), October 19 - 22, 1999, IEEE Computer
Society Press, Los Alamitos, CA, pp. 366 - 371
- Oppliger, R., Greulich, A., and P. Trachsel,
Der Einsatz
eines verteilten Zertifikat-Managementsystems in der
Schweizerischen Bundesverwaltung,
Proceedings of the German Informatics Society (GI) Working
Conference on "Verlässliche IT-Systeme" (VIS '99), Essen
(Germany), September 22 - 24, 1999, DuD Fachbeiträge,
Friedr. Vieweg & Sohn Verlagsgesellschaft mbH,
Wiesbaden (Germany), pp. 81 - 96
- Oppliger, R.,
Protecting Key
Exchange and Management Protocols Against Resource
Clogging Attacks, Proceedings of the IFIP TC6 and TC11
Joint Working Conference on Communications and Multimedia
Security (CMS '99), Leuven (Belgium), September 20 - 21, 1999,
Kluwer Academic Publishers, pp. 163 - 175
- Oppliger, R.,
Shaping the
Research Agenda for Security in E-Commerce,
Proceedings of the Workshop on Security and Electronic Commerce
held in conjunction with the 10th International Conference on
Database and Expert Systems (DEXA '99), Florence (Italy),
August 30 - September 3, 1999, IEEE Computer Society Press,
Los Alamitos, CA, pp. 810 - 814
- Oppliger, R., and J.L. Nottaris,
Online Casinos,
Proceedings of the GI/ITG Conference on "Kommunikation
in Verteilten Systemen" (KiVS '97), Braunschweig (Germany),
February 17 - 22, 1997, Springer-Verlag, Berlin, pp. 2 - 16
- Oppliger, R.,
Participants Registration,
Validation, and Key Distribution for MBone Conferencing,
Swiss Computer Science Conference (SCSC '96), Zürich
(Switzerland), October 22 - 23, 1996
- Oppliger, R., Bracher, M., and A. Albanese,
Distributed registration
and key distribution for online universities,
Proceedings of the IFIP TC6 and TC11 Joint Working
Conference on Communications and Multimedia Security
(CMS '96), Essen (Germany), September 23 - 24, 1996,
Chapman & Hall, London, pp. 166 - 175
- Oppliger, R., and A. Albanese,
Distance Education and
Online Universities, Proceedings of the IEEE 5th
Workshop on Enabling Technologies: Infrastructure for
Collaborative Enterprises (WET ICE '96), Workshop on
Distance Learning, Stanford University, CA, June 19 - 21,
1996, IEEE Computer Society Press, Los Alamitos, CA, pp. 10 - 15
- Oppliger, R., and A. Albanese,
Distributed registration
and key distribution (DiRK), Proceedings of the
12th International Conference on Information Security
(IFIP SEC '96), Island of Samos (Greece), May 21 - 24, 1996,
Chapman & Hall, London, pp. 199 - 208
- Oppliger, R., Gupta, A., Moran, M., and R. Bettati,
A Security
Architecture for Tenet Scheme 2, Proceedings of the 2nd European
Workshop on Interactive Distributed Multimedia Systems and
Services (IDMS '96), Berlin (Germany), March 4 - 6, 1996,
Springer-Verlag, Berlin, LNCS 1045, pp. 163 - 174
- Oppliger, R.,
Authentication
and key distribution in computer networks and distributed systems,
Proceedings of the IFIP TC6, TC11 and Austrian Computer Society Joint
Working Conference on Communications and Multimedia Security (CMS '95),
Graz (Austria), September 20 - 21, 1995, Chapman & Hall, London,
pp. 148 - 159
- Oppliger, R.,
Authentifikations-
und Schlüsselverteilsysteme, Proceedings of the
First Joint Conference of the German Informatics Society and the Swiss
Informaticians Society (GISI '95), Zürich (Switzerland),
September 18 - 20, 1995, Springer-Verlag, Berlin, pp. 266 - 273
- Oppliger, R., and D. Hogrefe,
Security
Concepts for Corporate Networks, Proceedings of the 10th
International Conference on Information Security
(IFIP SEC '94), Curaçao (N.A.), May 23 - 27, 1994
- Oppliger, R., and D. Hogrefe,
Corporate Network Security, Proceedings of the
IEEE Singapore International Conference on Networks and International
Conference on Information Engineering (SICON/ICIE '93),
Singapore, September 6 - 11, 1993, pp. 426 - 430
- Oppliger, R., Weber, S., and D. Hogrefe,
Entwurf von virtuell privaten Netzen,
Proceedings of the GI/ITG Conference on "Kommunikation in Verteilten Systemen"
(KiVS '93), Munich (Germany), March 3 - 5, 1993, Springer-Verlag, Berlin, pp. 428 - 441
- Oppliger, R., Weber, S., and D. Hogrefe,
An Optimization Method for Virtual Private Network Design,
Proceedings of the IEE 2nd International Conference on
Private Switching Systems and Networks, London (UK), June 23 - 25, 1992,
pp. 31 - 36
- Oppliger, R., Vorsicht, Verwundbarkeit!, return, 01/18, pp. 63 - 65
- Oppliger, R., SSL/TLS: Attacks, Countermeasures, and Counterattacks,
PenTest Magazine, 09/2017, pp. 152 - 159
- Oppliger, R., TLS security: Past, present and future,
Help Net Security, July 3, 2017
- Oppliger, R.,
Public-Key-Infrastrukturen (PKI), digma,
Vol. 15, No. 2, August 2015, pp. 58 - 59
- Oppliger, R.,
IT-Sicherheit und Privacy (Editorial), hitech, Bern University of
Applied Sciences, No. 2, 2014, p. 3
- Oppliger, R.,
eSecurity - ein Fachgebiet im Wandel readme
alumni, Issue 28, September 2012, 28/12, pp. 3 - 4
- Oppliger, R.,
Sicherheit im Cloud Computing digma,
Vol. 12, No. 1, April 2012, pp. 28 - 31
- Oppliger, R.,
E-Voting auf unsicheren Client-Plattformen digma,
Vol. 8, No. 2, June 2008, pp. 82 - 85
- Oppliger, R.,
Anonymes E-Voting - eine Illusion? digma,
Vol. 8, No. 1, March 2008, pp. 24 - 27
- Oppliger, R., Sicherheit auch in der Informatik - Jetzt gilt es
ernst, Editorial for a guidebook entitled "Schutz und Sicherheit"
distributed with the Tages-Anzeiger of December 20, 2007, p. 2
- Oppliger, R., Hauser, R., and D. Basin,
Protecting Ecommerce Against The Man-In-The-Middle,
Business Communications Review, January 2007, pp. 54 - 58
- Oppliger, R., Hauser, R., and P. Frey,
MITM-Angriffe: Phishing in Echtzeit, digma,
Vol. 6, No. 1, March 2006, pp. 32 - 35
- Oppliger, R.,
Die Jagd nach dem heiligen Gral, digma,
Vol. 5, No. 2, June 2005, pp. 92 - 93
- Oppliger, R.,
"Sichere" Streichlisten, digma,
Vol. 5, No. 1, March 2005, pp. 34 - 35
- Oppliger, R.,
Mit Hash auf Kollisionskurs - Hashfunktion SHA-1 möglicherweise geknackt,
Neue Zürcher Zeitung, February 25, 2005, p. 65
- Oppliger, R.,
Der Mann in der Mitte - Zur Sicherheit des Internet-Banking,
Neue Zürcher Zeitung, October 8, 2004, p. 65
- Oppliger, R.,
Open Source Software und Sicherheit, digma,
Vol. 3, No. 3, October 2003, pp. 122 - 126
- Oppliger, R.,
Wie sicher ist Open Source Software? Offenheit bedeutet nicht
automatisch Sicherheit, Neue Zürcher Zeitung,
Sonderbeilage Orbit/Comdex, B15, September 23, 2003
- Oppliger, R., and R. Rytz,
Digitale Signatur: Ist der Beweiswert gegeben? Netzwoche
"Netzguide E-Security," ISBN 3-907096-04-5, 2003, pp. 68 - 69
- Oppliger, R.,
Sicherheit im E-Voting: Facettenreiche Probleme bei Wahlen und
Abstimmungen, Neue Zürcher Zeitung, Sonderbeilage Informatik,
B3, February 4, 2003
- Oppliger, R.,
E-Voting sicherheitstechnisch betrachtet - Sicherheitsfragen und
-probleme bei elektronischen Abstimmungsmechanismen, digma,
Vol. 2, No. 4, December 2002, pp. 184 - 188
- Oppliger, R.,
Wie weiter mit dem "Wer ist wer" im Netz:
Digitale Zertifikate und elektronische Identitätskarten,
Neue Zürcher Zeitung, November 29, 2002, p. 77
- Oppliger, R.,
Von der PKI zum Trust Management - Möglichkeiten und
Grenzen einer Schweizer PKI aus technischer Sicht, digma,
Vol. 1, No. 2, June 2001, pp. 70 - 77
- Oppliger, R.,
What is a security architecture and why would your enterprise
need one? CSI Computer Security Alert, May 2001, No. 219,
pp. 1, 8
- Oppliger, R., and M. Holthaus,
Totale Überwachung ist möglich - Technische Aspekte
der Kontrolle von Internet-Aktivitäten der Mitarbeiterinnen
und Mitarbeiter am Arbeitsplatz, digma, Vol. 1, No. 1,
April 2001, pp. 14 - 19
- Oppliger, R.,
Trouble Ahead, Trouble Behind: The Future of Computer
Security, CSI Computer Security Journal, Vol. XVII, No. 1,
Winter 2001, pp. 19 - 25
- Oppliger, R.,
SSL and TLS Protocols: How to Address Critical Security
Issues, CSI Computer Security Journal, Vol. XVI, No. 1,
Winter 2000, pp. 15 - 38
- Oppliger, R.,
Dezentralisierung erhöht die Sicherheitsrisiken:
Ungelöste Probleme beim Agent-based Computing,
Neue Zürcher Zeitung, Sonderbeilage Informatik, B10,
February 8, 2000
- Oppliger, R.,
PKI in der Schweiz, ISACA Switzerland Chapter Newsletter,
December 1999, No. 46, pp. 11 - 13
- Oppliger, R.,
Take a closer look to demystify provably secure systems,
CSI Computer Security Alert, October 1999, No. 199, p. 10
- Oppliger, R.,
Methods of Securing Applications for the World Wide Web
(WWW), CSI Computer Security Journal, Vol. XV, No. 1, 1999,
pp. 1 - 9
- Oppliger, R.,
Mobile code and agent-based systems,
CSI Computer Security Alert, October 1998, No. 187, p. 1, 7 - 8
- Oppliger, R., Trusted Services (ETS) in Europe, CSI Computer Security Alert,
July 1998, No. 184, p. 3
- Oppliger, R.,
How to build a corporate PKI,
CSI Computer Security Alert, May 1998, No. 182, pp. 1, 6 - 8
- Oppliger, R.,
Sind WWW Cookies gefährlich? BFI News Express, 3/97, p. 10
- Oppliger, R., Choosing VPN protocols, CSI Computer Security Alert,
January 1997, No. 166, pp. 4 - 5
- Oppliger, R., Pilotbetrieb eines "sicheren" WWW-Servers,
BFI News, 2/96, pp. 26 - 34
- Oppliger, R.,
Authentifikations- und Schlüsselverteilsysteme:
Eine Übersicht, Informatik/Informatique, Vol. 3, No. 4,
1996, pp. 28 - 33
- Oppliger, R.,
OECD crypto standards,
CSI Computer Security Alert, August 1996, No. 161, p. 6
- Oppliger, R.,
Next generation malicious code ,
CSI Computer Security Alert, June 1996, No. 159, p. 7
- Oppliger, R.,
Europe explores key escrow issues,
CSI Computer Security Alert, April 1996, No. 157, pp. 4 - 5
- Oppliger, R., Sicherheit im WWW, BFI News, 1/96, pp. 33 - 39
- Oppliger, R., Clipper und die Diskussion um Key-Escrow,
Telematik-Spektrum, February 1996, pp. 16 - 17
- Oppliger, R., Netzbasierte Softwareangriffe, BFI News, 2/95, pp. 5 - 7
- Oppliger, R., Baselines simplify risk analysis, CSI Computer Security Alert,
November 1995, No. 152, p. 4
- Oppliger, R., Firewalls aren't Enough: Authentication and Key
Distribution Systems, CSI Computer Security Journal,
Vol. XI, No. 2, 1995, pp. 15 - 24
- Oppliger, R., Firewalls aren't enough: an authentication systems
overview, CSI Computer Security Alert, June 1995, No. 147, pp. 4 - 5
- Oppliger, R., Sicherheit in X.400-Netzen, Telematik-Spektrum,
May 1994, pp. 35 - 37
- Oppliger, R., and D. Hogrefe,
Sicherheitsüberlegungen für unternehmensweite
Kommunikationsnetze, Telematik-Spektrum, February 1994,
pp. 31 - 33
- Oppliger, R., Weber, S., and B. Liver,
Expertensystem konfiguriert virtuell private Netze,
Output, May 1992, pp. 43 - 47
- Oppliger, R., Open Source Software: Eine sicherheitstechnische
Beurteilung, August 14, 2003
- Belser, U., Federspiel, B., Kessler, Th., Kobel, Ch., Maurer, D.,
Oppliger, R., Schnyder, M., Thorn, A., Trenta, G., and H. Walter,
Cryptographic Key Recovery: Ein Beitrag zur
Entspannung der Kryptographiediskussion,
Working Group on Security, Swiss Informaticians Society (SI),
May 1999
- Oppliger, R., Gupta, A., Moran, M., and R. Bettati, A Security
Architecture for Tenet Scheme 2, International Computer
Science Institute, Berkeley, CA, TR-95-051, 1995
- Oppliger, R., Greulich, A., and D. Hogrefe, Authentifkations-
und Schlüsselverteilsysteme, University of Berne
(Switzerland), IAM-94-006, June 1994
- Oppliger, R., Book Review for "Tvede, L., Pircher, P., and
J. Bodenkamp, Data Broadcasting: The Technology and the
Business, John Wiley & Sons Ltd., 1999",
Computer Communications, Vol. 24, Issue 11, June 2001, pp. 1115 - 1116
- Oppliger, R., Book Review for "Escamilla, T., Intrusion
Detection: Network Security Beyond the Firewall, John Wiley
& Sons, New York, NY, 1998", Computer Communications,
Vol. 23, Issue 4, February 2000, p. 429
- Oppliger, R., Book Review for "Parker, D.B., Fighting computer
crimes: a new framework for protecting information, John Wiley
& Sons, New York, NY, 1998", Computer Communications,
Vol. 22, Issue 5, April 1999, pp. 491 - 492
© 2019 Rolf Oppliger