2008 |
73 | | Jose Antonio Onieva,
Damien Sauveron,
Serge Chaumette,
Dieter Gollmann,
Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
Springer 2008 |
72 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Dieter Gollmann,
Siu Leung Chung,
Jian-Bin Li,
Jia-Guang Sun:
Efficient Fingercode Classification.
IEICE Transactions 91-D(5): 1252-1260 (2008) |
71 | EE | Dieter Gollmann:
Editorial.
Int. J. Inf. Sec. 7(2): 101 (2008) |
2007 |
70 | EE | Miranda Mowbray,
Dieter Gollmann:
Electing the Doge of Venice: Analysis of a 13th Century Protocol.
CSF 2007: 295-310 |
69 | | Jens Ove Lauf,
Dieter Gollmann,
Volker Turau:
MASC - Monitoring and Security of Containers.
GI Jahrestagung (1) 2007: 5-10 |
68 | EE | Dieter Gollmann:
Security in Distributed Applications.
Lipari Summer School 2007: 254-276 |
2006 |
67 | | Dieter Gollmann,
Jan Meier,
Andrei Sabelfeld:
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
Springer 2006 |
66 | EE | Audun Jøsang,
Dieter Gollmann,
Richard Au:
A method for access authorisation through delegation networks.
ACSW Frontiers 2006: 165-174 |
65 | EE | Dieter Gollmann:
Why Trust is Bad for Security.
Electr. Notes Theor. Comput. Sci. 157(3): 3-9 (2006) |
2005 |
64 | | Sabrina De Capitani di Vimercati,
Paul F. Syverson,
Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
Springer 2005 |
63 | EE | Dieter Gollmann:
Protocol Analysis for Concrete Environments.
EUROCAST 2005: 365-372 |
62 | EE | Susan Pancho-Festin,
Dieter Gollmann:
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol.
Formal Aspects in Security and Trust 2005: 5-15 |
2004 |
61 | | Pierangela Samarati,
Peter Y. A. Ryan,
Dieter Gollmann,
Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings
Springer 2004 |
60 | EE | Dieter Gollmann:
Identity and Location.
Security Protocols Workshop 2004: 246-250 |
59 | EE | Dieter Gollmann:
Identity and Location (Transcript of Discussion).
Security Protocols Workshop 2004: 251-255 |
2003 |
58 | | Einar Snekkenes,
Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings
Springer 2003 |
57 | | Sihan Qing,
Dieter Gollmann,
Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings
Springer 2003 |
56 | EE | Dieter Gollmann:
Facets of Security.
Global Computing 2003: 192-202 |
2002 |
55 | | Dieter Gollmann,
Günter Karjoth,
Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings
Springer 2002 |
54 | EE | Dieter Gollmann:
Analysing Security Protocols.
FASec 2002: 71-80 |
53 | EE | Olivier Markowitch,
Dieter Gollmann,
Steve Kremer:
On Fairness in Exchange Protocols.
ICISC 2002: 451-464 |
52 | EE | Dieter Gollmann:
Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n.
IEEE Trans. Computers 51(5): 588-591 (2002) |
2001 |
51 | EE | Ulrich Lang,
Dieter Gollmann,
Rudolf Schreiner:
Verifiable Identifiers in Middleware Security.
ACSAC 2001: 450-462 |
50 | EE | Ulrich Lang,
Dieter Gollmann,
Rudolf Schreiner:
Cryptography and Middleware Security.
ICICS 2001: 408-418 |
49 | EE | Dieter Gollmann:
PIM Security.
Security Protocols Workshop 2001: 80-81 |
48 | EE | Dieter Gollmann:
PIM Security (Transcript of Discussion).
Security Protocols Workshop 2001: 82-86 |
47 | | Tuomas Aura,
Dieter Gollmann:
Communications security on the internet.
Software Focus 2(3): 104-111 (2001) |
2000 |
46 | | Frédéric Cuppens,
Yves Deswarte,
Dieter Gollmann,
Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
Springer 2000 |
45 | EE | Dieter Gollmann:
Mergers and Principals (Transcript of Discussion).
Security Protocols Workshop 2000: 14-19 |
44 | EE | Dieter Gollmann:
Mergers and Principals.
Security Protocols Workshop 2000: 5-13 |
43 | EE | Dieter Gollmann:
On the Verification of Cryptographic Protocols - A Tale of Two Committees.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
42 | EE | Dieter Gollmann:
New paradigms - old paradigms?
Future Generation Comp. Syst. 16(4): 343-349 (2000) |
1999 |
41 | | Dieter Gollmann:
What Is Authentication?
Security Protocols Workshop 1999: 65-72 |
40 | EE | Dieter Gollmann:
Dual Bases and Bit-Serial Multiplication in Fqn.
Theor. Comput. Sci. 226(1-2): 45-59 (1999) |
1998 |
39 | | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 |
38 | EE | Peter Y. A. Ryan,
Dieter Gollmann,
Li Gong,
Günter Karjoth,
Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies.
CSFW 1998: 164-166 |
37 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
36 | EE | Dieter Gollmann:
Insider Fraud (Position Paper).
Security Protocols Workshop 1998: 213-219 |
35 | EE | Dieter Gollmann:
Insider Fraud (Transcript of Discussion).
Security Protocols Workshop 1998: 220-226 |
1997 |
34 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell,
Peter R. Wild:
Secret Sharing with Reusable Polynomials.
ACISP 1997: 183-193 |
33 | EE | Jianying Zhou,
Dieter Gollmann:
An Efficient Non-repudiation Protocol .
CSFW 1997: 126-132 |
32 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Authentication Using Minimally Trusted Servers.
Operating Systems Review 31(3): 16-28 (1997) |
1996 |
31 | | Dieter Gollmann:
Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings
Springer 1996 |
30 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms.
ACISP 1996: 121-133 |
29 | | Jianying Zhou,
Dieter Gollmann:
Observations on Non-repudiation.
ASIACRYPT 1996: 133-144 |
28 | | Willi Geiselmann,
Dieter Gollmann:
Correlation Attacks on Cascades of Clock Controlled Shift Registers.
ASIACRYPT 1996: 346-359 |
27 | EE | Jianying Zhou,
Dieter Gollmann:
Certified Electronic Mail.
ESORICS 1996: 160-171 |
26 | EE | Dieter Gollmann:
What do We Mean by Entity Authentication?
IEEE Symposium on Security and Privacy 1996: 46-54 |
25 | EE | Jianying Zhou,
Dieter Gollmann:
A Fair Non-repudiation Protocol.
IEEE Symposium on Security and Privacy 1996: 55-61 |
24 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains.
Security Protocols Workshop 1996: 139-153 |
23 | | Dieter Gollmann,
Yongfei Han,
Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptography 7(1-2): 135-151 (1996) |
1995 |
22 | EE | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key distribution without individual trusted authentification servers.
CSFW 1995: 30- |
21 | | Andreas Fuchsberger,
Dieter Gollmann,
Paul J. G. Lothian,
Kenneth G. Paterson,
Abraham Sidiropoulos:
Public-key Cryptography on Smart Cards.
Cryptography: Policy and Algorithms 1995: 250-269 |
20 | | Dieter Gollmann:
Cryptographic APIs.
Cryptography: Policy and Algorithms 1995: 290-300 |
19 | | Yongfei Han,
Dieter Gollmann,
Chris J. Mitchell:
Minimal Weight k-SR Representations.
IMA Conf. 1995: 34-43 |
18 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers.
Journal of Computer Security 3(4): 255-268 (1995) |
1994 |
17 | | Dieter Gollmann:
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings
Springer 1994 |
1993 |
16 | | Dieter Gollmann:
Cryptanalysis of Clock Controlled Shift Registers.
FSE 1993: 121-126 |
15 | | Dieter Gollmann:
The MSc in Information Security at Royal Holloway.
SEC 1993: 31-36 |
14 | EE | Dieter Gollmann,
Thomas Beth,
Frank Damm:
Authentication services in distributed systems.
Computers & Security 12(8): 753-764 (1993) |
13 | | Willi Geiselmann,
Dieter Gollmann:
Self-Dual Bases in Fqn.
Des. Codes Cryptography 3(4): 333-345 (1993) |
12 | | Bev Littlewood,
Sarah Brocklehurst,
Norman E. Fenton,
P. Mellor,
Stella Page,
David Wright,
J. Dobson,
J. McDermid,
Dieter Gollmann:
Towards Operational Measures of Computer Security.
Journal of Computer Security 2(2-3): 211-230 (1993) |
1992 |
11 | EE | Kwok-Yan Lam,
Dieter Gollmann:
Freshness Assurance of Authentication Protocols.
ESORICS 1992: 261-272 |
1990 |
10 | | Willi Geiselmann,
Dieter Gollmann:
VLSI Design for Exponentiation in GF (2n).
AUSCRYPT 1990: 398-405 |
9 | EE | Zong-Duo Dai,
Thomas Beth,
Dieter Gollmann:
Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
EUROCRYPT 1990: 189-195 |
1989 |
8 | | Thomas Beth,
Michael Clausen,
Dieter Gollmann:
Computer Algebra and Computer Aided Systems Theory.
EUROCAST 1989: 161-169 |
7 | EE | Dieter Gollmann,
William G. Chambers:
A Cryptanalysis of Stepk, m-Cascades.
EUROCRYPT 1989: 680-687 |
1988 |
6 | | Willi Geiselmann,
Dieter Gollmann:
Symmetry and Duality in Normal Basis Multiplication.
AAECC 1988: 230-238 |
5 | EE | William G. Chambers,
Dieter Gollmann:
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers.
EUROCRYPT 1988: 331-343 |
1987 |
4 | EE | Sibylle Mund,
Dieter Gollmann,
Thomas Beth:
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
EUROCRYPT 1987: 25-35 |
1986 |
3 | EE | Thomas Beth,
B. M. Cook,
Dieter Gollmann:
Architectures for Exponentiation in GF(2n).
CRYPTO 1986: 302-310 |
2 | | Dieter Gollmann:
Linear Complexity of Sequences with Period pn.
EUROCRYPT 1986: 33 |
1984 |
1 | EE | Dieter Gollmann:
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.
EUROCRYPT 1984: 93-98 |