![]() |
| 2008 | ||
|---|---|---|
| 6 | Peter Ebinger, Martin Sommer: Using Localization Information for Attack Detection in Mobile Ad hoc Networks. Sicherheit 2008: 395-406 | |
| 2006 | ||
| 5 | EE | Peter Ebinger, Tobias Bucher: Modelling and Analysis of Attacks on the MANET Routing in AODV. ADHOC-NOW 2006: 294-307 |
| 2005 | ||
| 4 | EE | Martin Schmucker, Peter Ebinger: Promotional and Commercial Content Distribution Based on a Legal and Trusted P2P Framework. CEC 2005: 439-442 |
| 3 | EE | Ulrich Pinsdorf, Peter Ebinger: Automated Discovery of Brand Piracy on the Internet. ICPADS (2) 2005: 550-554 |
| 2002 | ||
| 2 | EE | Peter Ebinger, Edlyn Teske: Factoring N = pq with the Elliptic Curve Method. ANTS 2002: 475-490 |
| 1 | EE | Zoltán Nochta, Peter Ebinger, Sebastian Abeck: PAMINA: A Certificate Based Privilege Management System. NDSS 2002 |
| 1 | Sebastian Abeck | [1] |
| 2 | Tobias Bucher | [5] |
| 3 | Zoltán Nochta | [1] |
| 4 | Ulrich Pinsdorf | [3] |
| 5 | Martin Schmucker | [4] |
| 6 | Martin Sommer | [6] |
| 7 | Edlyn Teske | [2] |