2008 | ||
---|---|---|
73 | Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings Springer 2008 | |
72 | EE | Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008) |
71 | EE | Dieter Gollmann: Editorial. Int. J. Inf. Sec. 7(2): 101 (2008) |
2007 | ||
70 | EE | Miranda Mowbray, Dieter Gollmann: Electing the Doge of Venice: Analysis of a 13th Century Protocol. CSF 2007: 295-310 |
69 | Jens Ove Lauf, Dieter Gollmann, Volker Turau: MASC - Monitoring and Security of Containers. GI Jahrestagung (1) 2007: 5-10 | |
68 | EE | Dieter Gollmann: Security in Distributed Applications. Lipari Summer School 2007: 254-276 |
2006 | ||
67 | Dieter Gollmann, Jan Meier, Andrei Sabelfeld: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings Springer 2006 | |
66 | EE | Audun Jøsang, Dieter Gollmann, Richard Au: A method for access authorisation through delegation networks. ACSW Frontiers 2006: 165-174 |
65 | EE | Dieter Gollmann: Why Trust is Bad for Security. Electr. Notes Theor. Comput. Sci. 157(3): 3-9 (2006) |
2005 | ||
64 | Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Springer 2005 | |
63 | EE | Dieter Gollmann: Protocol Analysis for Concrete Environments. EUROCAST 2005: 365-372 |
62 | EE | Susan Pancho-Festin, Dieter Gollmann: On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Formal Aspects in Security and Trust 2005: 5-15 |
2004 | ||
61 | Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004 | |
60 | EE | Dieter Gollmann: Identity and Location. Security Protocols Workshop 2004: 246-250 |
59 | EE | Dieter Gollmann: Identity and Location (Transcript of Discussion). Security Protocols Workshop 2004: 251-255 |
2003 | ||
58 | Einar Snekkenes, Dieter Gollmann: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings Springer 2003 | |
57 | Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003 | |
56 | EE | Dieter Gollmann: Facets of Security. Global Computing 2003: 192-202 |
2002 | ||
55 | Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Springer 2002 | |
54 | EE | Dieter Gollmann: Analysing Security Protocols. FASec 2002: 71-80 |
53 | EE | Olivier Markowitch, Dieter Gollmann, Steve Kremer: On Fairness in Exchange Protocols. ICISC 2002: 451-464 |
52 | EE | Dieter Gollmann: Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. IEEE Trans. Computers 51(5): 588-591 (2002) |
2001 | ||
51 | EE | Ulrich Lang, Dieter Gollmann, Rudolf Schreiner: Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-462 |
50 | EE | Ulrich Lang, Dieter Gollmann, Rudolf Schreiner: Cryptography and Middleware Security. ICICS 2001: 408-418 |
49 | EE | Dieter Gollmann: PIM Security. Security Protocols Workshop 2001: 80-81 |
48 | EE | Dieter Gollmann: PIM Security (Transcript of Discussion). Security Protocols Workshop 2001: 82-86 |
47 | Tuomas Aura, Dieter Gollmann: Communications security on the internet. Software Focus 2(3): 104-111 (2001) | |
2000 | ||
46 | Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000 | |
45 | EE | Dieter Gollmann: Mergers and Principals (Transcript of Discussion). Security Protocols Workshop 2000: 14-19 |
44 | EE | Dieter Gollmann: Mergers and Principals. Security Protocols Workshop 2000: 5-13 |
43 | EE | Dieter Gollmann: On the Verification of Cryptographic Protocols - A Tale of Two Committees. Electr. Notes Theor. Comput. Sci. 32: (2000) |
42 | EE | Dieter Gollmann: New paradigms - old paradigms? Future Generation Comp. Syst. 16(4): 343-349 (2000) |
1999 | ||
41 | Dieter Gollmann: What Is Authentication? Security Protocols Workshop 1999: 65-72 | |
40 | EE | Dieter Gollmann: Dual Bases and Bit-Serial Multiplication in Fqn. Theor. Comput. Sci. 226(1-2): 45-59 (1999) |
1998 | ||
39 | Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998 | |
38 | EE | Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 |
37 | EE | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
36 | EE | Dieter Gollmann: Insider Fraud (Position Paper). Security Protocols Workshop 1998: 213-219 |
35 | EE | Dieter Gollmann: Insider Fraud (Transcript of Discussion). Security Protocols Workshop 1998: 220-226 |
1997 | ||
34 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 | |
33 | EE | Jianying Zhou, Dieter Gollmann: An Efficient Non-repudiation Protocol . CSFW 1997: 126-132 |
32 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997) | |
1996 | ||
31 | Dieter Gollmann: Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings Springer 1996 | |
30 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 | |
29 | Jianying Zhou, Dieter Gollmann: Observations on Non-repudiation. ASIACRYPT 1996: 133-144 | |
28 | Willi Geiselmann, Dieter Gollmann: Correlation Attacks on Cascades of Clock Controlled Shift Registers. ASIACRYPT 1996: 346-359 | |
27 | EE | Jianying Zhou, Dieter Gollmann: Certified Electronic Mail. ESORICS 1996: 160-171 |
26 | EE | Dieter Gollmann: What do We Mean by Entity Authentication? IEEE Symposium on Security and Privacy 1996: 46-54 |
25 | EE | Jianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61 |
24 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 | |
23 | Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996) | |
1995 | ||
22 | EE | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30- |
21 | Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos: Public-key Cryptography on Smart Cards. Cryptography: Policy and Algorithms 1995: 250-269 | |
20 | Dieter Gollmann: Cryptographic APIs. Cryptography: Policy and Algorithms 1995: 290-300 | |
19 | Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43 | |
18 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995) | |
1994 | ||
17 | Dieter Gollmann: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings Springer 1994 | |
1993 | ||
16 | Dieter Gollmann: Cryptanalysis of Clock Controlled Shift Registers. FSE 1993: 121-126 | |
15 | Dieter Gollmann: The MSc in Information Security at Royal Holloway. SEC 1993: 31-36 | |
14 | EE | Dieter Gollmann, Thomas Beth, Frank Damm: Authentication services in distributed systems. Computers & Security 12(8): 753-764 (1993) |
13 | Willi Geiselmann, Dieter Gollmann: Self-Dual Bases in Fqn. Des. Codes Cryptography 3(4): 333-345 (1993) | |
12 | Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, P. Mellor, Stella Page, David Wright, J. Dobson, J. McDermid, Dieter Gollmann: Towards Operational Measures of Computer Security. Journal of Computer Security 2(2-3): 211-230 (1993) | |
1992 | ||
11 | EE | Kwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272 |
1990 | ||
10 | Willi Geiselmann, Dieter Gollmann: VLSI Design for Exponentiation in GF (2n). AUSCRYPT 1990: 398-405 | |
9 | EE | Zong-Duo Dai, Thomas Beth, Dieter Gollmann: Lower Bounds for the Linear Complexity of Sequences over Residue Rings. EUROCRYPT 1990: 189-195 |
1989 | ||
8 | Thomas Beth, Michael Clausen, Dieter Gollmann: Computer Algebra and Computer Aided Systems Theory. EUROCAST 1989: 161-169 | |
7 | EE | Dieter Gollmann, William G. Chambers: A Cryptanalysis of Stepk, m-Cascades. EUROCRYPT 1989: 680-687 |
1988 | ||
6 | Willi Geiselmann, Dieter Gollmann: Symmetry and Duality in Normal Basis Multiplication. AAECC 1988: 230-238 | |
5 | EE | William G. Chambers, Dieter Gollmann: Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. EUROCRYPT 1988: 331-343 |
1987 | ||
4 | EE | Sibylle Mund, Dieter Gollmann, Thomas Beth: Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. EUROCRYPT 1987: 25-35 |
1986 | ||
3 | EE | Thomas Beth, B. M. Cook, Dieter Gollmann: Architectures for Exponentiation in GF(2n). CRYPTO 1986: 302-310 |
2 | Dieter Gollmann: Linear Complexity of Sequences with Period pn. EUROCRYPT 1986: 33 | |
1984 | ||
1 | EE | Dieter Gollmann: Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. EUROCRYPT 1984: 93-98 |