2008 |
5 | EE | Thomas Weigold,
Thorsten Kramp,
Reto Hermann,
Frank Höring,
Peter Buhler,
Michael Baentsch:
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks.
TRUST 2008: 75-91 |
1997 |
4 | EE | Jürgen Nehmer,
Peter Sturm,
Michael Baentsch,
Lothar Baum,
Georg Molter,
Steffen Rothkugel:
Customization of system software for large-scale embedded applications.
Computer Communications 20(3): 189-196 (1997) |
3 | | Michael Baentsch,
Lothar Baum,
Georg Molter,
Steffen Rothkugel,
Peter Sturm:
Enhancing the Web's Infrastructure: From Caching to Replication.
IEEE Internet Computing 1(2): 18-27 (1997) |
1996 |
2 | EE | Michael Baentsch,
Georg Molter,
Peter Sturm:
Introducing Application-Level Replication and Naming into Today's Web.
Computer Networks 28(7-11): 921-930 (1996) |
1995 |
1 | EE | Michael Baentsch,
Georg Molter,
Peter Sturm:
WebMake: Integrating Distributed Software Development in a Structure-Enhanced Web.
Computer Networks and ISDN Systems 27(6): 789-800 (1995) |