dblp.uni-trier.dewww.uni-trier.de

Dieter Gollmann

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
73 Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings Springer 2008
72EEHong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008)
71EEDieter Gollmann: Editorial. Int. J. Inf. Sec. 7(2): 101 (2008)
2007
70EEMiranda Mowbray, Dieter Gollmann: Electing the Doge of Venice: Analysis of a 13th Century Protocol. CSF 2007: 295-310
69 Jens Ove Lauf, Dieter Gollmann, Volker Turau: MASC - Monitoring and Security of Containers. GI Jahrestagung (1) 2007: 5-10
68EEDieter Gollmann: Security in Distributed Applications. Lipari Summer School 2007: 254-276
2006
67 Dieter Gollmann, Jan Meier, Andrei Sabelfeld: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings Springer 2006
66EEAudun Jøsang, Dieter Gollmann, Richard Au: A method for access authorisation through delegation networks. ACSW Frontiers 2006: 165-174
65EEDieter Gollmann: Why Trust is Bad for Security. Electr. Notes Theor. Comput. Sci. 157(3): 3-9 (2006)
2005
64 Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Springer 2005
63EEDieter Gollmann: Protocol Analysis for Concrete Environments. EUROCAST 2005: 365-372
62EESusan Pancho-Festin, Dieter Gollmann: On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Formal Aspects in Security and Trust 2005: 5-15
2004
61 Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004
60EEDieter Gollmann: Identity and Location. Security Protocols Workshop 2004: 246-250
59EEDieter Gollmann: Identity and Location (Transcript of Discussion). Security Protocols Workshop 2004: 251-255
2003
58 Einar Snekkenes, Dieter Gollmann: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings Springer 2003
57 Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003
56EEDieter Gollmann: Facets of Security. Global Computing 2003: 192-202
2002
55 Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Springer 2002
54EEDieter Gollmann: Analysing Security Protocols. FASec 2002: 71-80
53EEOlivier Markowitch, Dieter Gollmann, Steve Kremer: On Fairness in Exchange Protocols. ICISC 2002: 451-464
52EEDieter Gollmann: Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. IEEE Trans. Computers 51(5): 588-591 (2002)
2001
51EEUlrich Lang, Dieter Gollmann, Rudolf Schreiner: Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-462
50EEUlrich Lang, Dieter Gollmann, Rudolf Schreiner: Cryptography and Middleware Security. ICICS 2001: 408-418
49EEDieter Gollmann: PIM Security. Security Protocols Workshop 2001: 80-81
48EEDieter Gollmann: PIM Security (Transcript of Discussion). Security Protocols Workshop 2001: 82-86
47 Tuomas Aura, Dieter Gollmann: Communications security on the internet. Software Focus 2(3): 104-111 (2001)
2000
46 Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000
45EEDieter Gollmann: Mergers and Principals (Transcript of Discussion). Security Protocols Workshop 2000: 14-19
44EEDieter Gollmann: Mergers and Principals. Security Protocols Workshop 2000: 5-13
43EEDieter Gollmann: On the Verification of Cryptographic Protocols - A Tale of Two Committees. Electr. Notes Theor. Comput. Sci. 32: (2000)
42EEDieter Gollmann: New paradigms - old paradigms? Future Generation Comp. Syst. 16(4): 343-349 (2000)
1999
41 Dieter Gollmann: What Is Authentication? Security Protocols Workshop 1999: 65-72
40EEDieter Gollmann: Dual Bases and Bit-Serial Multiplication in Fqn. Theor. Comput. Sci. 226(1-2): 45-59 (1999)
1998
39 Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
38EEPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
37EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
36EEDieter Gollmann: Insider Fraud (Position Paper). Security Protocols Workshop 1998: 213-219
35EEDieter Gollmann: Insider Fraud (Transcript of Discussion). Security Protocols Workshop 1998: 220-226
1997
34 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
33EEJianying Zhou, Dieter Gollmann: An Efficient Non-repudiation Protocol . CSFW 1997: 126-132
32 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
1996
31 Dieter Gollmann: Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings Springer 1996
30 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
29 Jianying Zhou, Dieter Gollmann: Observations on Non-repudiation. ASIACRYPT 1996: 133-144
28 Willi Geiselmann, Dieter Gollmann: Correlation Attacks on Cascades of Clock Controlled Shift Registers. ASIACRYPT 1996: 346-359
27EEJianying Zhou, Dieter Gollmann: Certified Electronic Mail. ESORICS 1996: 160-171
26EEDieter Gollmann: What do We Mean by Entity Authentication? IEEE Symposium on Security and Privacy 1996: 46-54
25EEJianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61
24 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
23 Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996)
1995
22EELiqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
21 Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos: Public-key Cryptography on Smart Cards. Cryptography: Policy and Algorithms 1995: 250-269
20 Dieter Gollmann: Cryptographic APIs. Cryptography: Policy and Algorithms 1995: 290-300
19 Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43
18 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)
1994
17 Dieter Gollmann: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings Springer 1994
1993
16 Dieter Gollmann: Cryptanalysis of Clock Controlled Shift Registers. FSE 1993: 121-126
15 Dieter Gollmann: The MSc in Information Security at Royal Holloway. SEC 1993: 31-36
14EEDieter Gollmann, Thomas Beth, Frank Damm: Authentication services in distributed systems. Computers & Security 12(8): 753-764 (1993)
13 Willi Geiselmann, Dieter Gollmann: Self-Dual Bases in Fqn. Des. Codes Cryptography 3(4): 333-345 (1993)
12 Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, P. Mellor, Stella Page, David Wright, J. Dobson, J. McDermid, Dieter Gollmann: Towards Operational Measures of Computer Security. Journal of Computer Security 2(2-3): 211-230 (1993)
1992
11EEKwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272
1990
10 Willi Geiselmann, Dieter Gollmann: VLSI Design for Exponentiation in GF (2n). AUSCRYPT 1990: 398-405
9EEZong-Duo Dai, Thomas Beth, Dieter Gollmann: Lower Bounds for the Linear Complexity of Sequences over Residue Rings. EUROCRYPT 1990: 189-195
1989
8 Thomas Beth, Michael Clausen, Dieter Gollmann: Computer Algebra and Computer Aided Systems Theory. EUROCAST 1989: 161-169
7EEDieter Gollmann, William G. Chambers: A Cryptanalysis of Stepk, m-Cascades. EUROCRYPT 1989: 680-687
1988
6 Willi Geiselmann, Dieter Gollmann: Symmetry and Duality in Normal Basis Multiplication. AAECC 1988: 230-238
5EEWilliam G. Chambers, Dieter Gollmann: Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. EUROCRYPT 1988: 331-343
1987
4EESibylle Mund, Dieter Gollmann, Thomas Beth: Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. EUROCRYPT 1987: 25-35
1986
3EEThomas Beth, B. M. Cook, Dieter Gollmann: Architectures for Exponentiation in GF(2n). CRYPTO 1986: 302-310
2 Dieter Gollmann: Linear Complexity of Sequences with Period pn. EUROCRYPT 1986: 33
1984
1EEDieter Gollmann: Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. EUROCRYPT 1984: 93-98

Coauthor Index

1Martín Abadi [37]
2Richard Au [66]
3Tuomas Aura [47]
4Thomas Beth [3] [4] [8] [9] [14]
5Sarah Brocklehurst [12]
6William G. Chambers [5] [7]
7Serge Chaumette [73]
8Liqun Chen [18] [22] [24] [30] [32] [34]
9Siu Leung Chung [72]
10Michael Clausen [8]
11B. M. Cook [3]
12Frédéric Cuppens [46]
13Zongduo Dai (Zong-Duo Dai) [9]
14Frank Damm [14]
15Yves Deswarte [39] [46]
16J. Dobson [12]
17Norman E. Fenton [12]
18Riccardo Focardi [37]
19Andreas Fuchsberger [21]
20Willi Geiselmann [6] [10] [13] [28]
21Li Gong [38]
22Roberto Gorrieri [37]
23Yongfei Han [19] [23]
24Audun Jøsang [66]
25Günter Karjoth [38] [55]
26Steve Kremer [53]
27Kwok-Yan Lam [11] [72]
28Ulrich Lang [50] [51]
29Jens Ove Lauf [69]
30Jian-Bin Li [72]
31Bev Littlewood [12]
32Paul J. G. Lothian [21]
33Gavin Lowe [37]
34Constantinos Markantonakis [73]
35Olivier Markowitch [53]
36J. McDermid [12]
37Catherine Meadows [37] [39]
38Jan Meier [67]
39P. Mellor [12]
40Chris J. Mitchell [18] [19] [22] [23] [24] [30] [32] [34] [38]
41Refik Molva [61]
42Miranda Mowbray [70]
43Sibylle Mund [4]
44Jose Antonio Onieva [73]
45Stella Page [12]
46Susan Pancho-Festin [62]
47Kenneth G. Paterson [21]
48Sihan Qing [57]
49Jean-Jacques Quisquater [39]
50Peter Y. A. Ryan (Peter Ryan) [38] [61]
51Andrei Sabelfeld [67]
52Pierangela Samarati [61]
53Damien Sauveron [73]
54Rudolf Schreiner [50] [51]
55Abraham Sidiropoulos [21]
56Einar Snekkenes [58]
57Hong-Wei Sun [72]
58Jia-Guang Sun (Jiaguang Sun) [72]
59Paul F. Syverson [37] [64]
60Volker Turau [69]
61Sabrina De Capitani di Vimercati [64]
62Michael Waidner [46] [55]
63Peter R. Wild [34]
64David Wright [12]
65Jianying Zhou [25] [27] [29] [33] [57]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)