Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter Lipp is active.

Publication


Featured researches published by Peter Lipp.


Archive | 2008

Trusted Computing - Challenges and Applications

Peter Lipp; Ahmad-Reza Sadeghi; Klaus-Michael Koch

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, held in Villach, Austria, in March 2008. The 13 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 43 submissions. The papers cover the core issues of trust in IT systems and present recent leading edge developments in the field of trusted infrastructure and computing to foster the international knowledge exchange necessary to catch up with the latest trends in science and technology developments.


trustworthy global computing | 2007

A practical approach for establishing trust relationships between remote platforms using trusted computing

Kurt Dietrich; Martin Pirker; Tobias Vejda; Ronald Toegl; Thomas Winkler; Peter Lipp

Over the past years, many different approaches and concepts in order to increase computer security have been presented. One of the most promising of these concepts is Trusted Computing which offers various services and functionalities like reporting and verifying the integrity and the configuration of a platform (attestation). The idea of reporting a platforms state and configuration to a challenger opens new and innovative ways of establishing trust relationships between entities. However, common applications are not aware of Trusted Computing facilities and are therefore not able to utilise Trusted Computing services at the moment. Hence, this article proposes an architecture that enables arbitrary applications to perform remote platform attestation, allowing them to establish trust based on their current configuration. The architectures components discussed in this article are also essential parts of the OpenTC proof-of-concept prototype. It demonstrates applications and techniques of the Trusted Computing Groups proposed attestation mechanism in the area of personal electronic transactions.


international conference on communications | 1997

Security concepts for the WWW

Peter Lipp; Vesna Hassler

This paper gives an overview of the existing World Wide Web security concepts. For each proposal we give a short description of the most important properties and discuss them briefly. The concepts are divided into three groups according to their relative position to the HTTP layer. A comparison of some of the properties of various concepts is given as well.


information security | 2000

Independent Policy Oriented Layering of Security Services

Herbert Leitold; Peter Lipp; Andreas Sterbenz

Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applications and feigning a conventional, insecure networking environment that is further transformed to a secure communication infrastructure.


Computer Networks and Isdn Systems | 1992

An inter-bridge-security protocol

Peter Lipp; Reinhard Posch

Abstract Local area networks offer a wide range of possibilities to intruders, especially if connected by a backbone network. By adding intelligence and encryption to the connecting points, bridges, a control of access to the local subnet and a possibility to secure communication by encrypting at network-speed is provided.


Innovations in Systems and Software Engineering | 2015

Signature Validation – a Dark Art?

Peter Lipp

ETSI Standard EN 319 102-1 (Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation [2]) is a new standard developed by ETSI during the implementation of Mandate M460 and is currently undergoing the EN approval procedure. The standard covers, as the title suggests, the creation and validation of digital signatures. Some experts, who so far were convinced they understood what needs to be done when validating a signature, are confused. To them the standard is either wrong, not understandable or worst case both. This article tries to shed a light into the approach taken but also discusses why signature validation sometimes gets complex, maybe more complex than necessary, and considers whether this complexity can be avoided.


GI/OCG/ÖGI-Jahrestagung 1985, Wirtschaftsuniversität Wien, Übersichtsbeiträge und Fachgespräche zu den Themenschwerpunkten Softwaretechnologie / Standardsoftware / Bürokommunikation / Bildschirmtext | 1995

GASC: ein Graphik- und Software Kommunikationssystem

H. Cheng; Peter Lipp; Hermann A. Maurer; Reinhard Posch

Lokale Btx- und Btx-ahnliche Systeme haben erst durch den Einsatz von intelligenten Endgeraten die Chance, erfolgreich zu sein. Die am Markt erhaltlichen Systeme nutzen aber zur Zeit die Intelligenz der Endgerate nicht voll aus. In dieser Arbeit stellen wir ein System vor, bei dem die Ausnutzung der Intelligenz der Endgerate von Anfang an im Mittelpunkt der Uberlegungen stand. Dadurch kann ein besonders gutes Preis/Leistungsverhaltnis erzielt werden.


AES Candidate Conference | 2000

Performance of the AES Candidate Algorithms in Java.

Andreas Sterbenz; Peter Lipp


Archive | 2006

Electronic Signatures and Infrastructures (ESI); Provision of harmonized Trust-service status information

J.C. Cruellas; Peter Lipp; Gianluca Ramunno; F. Ruggieri; R. Wilsher


Archive | 2015

Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java

Stefan More; Dieter Bratko; Peter Lipp

Collaboration


Dive into the Peter Lipp's collaboration.

Top Co-Authors

Avatar

Reinhard Posch

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Andreas Sterbenz

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Vesna Hassler

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Herbert Leitold

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kurt Dietrich

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Martin Pirker

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Roderick Bloem

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ronald Toegl

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Winkler

Graz University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge