| 2008 |
| 73 | | Jose Antonio Onieva,
Damien Sauveron,
Serge Chaumette,
Dieter Gollmann,
Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
Springer 2008 |
| 72 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Dieter Gollmann,
Siu Leung Chung,
Jian-Bin Li,
Jia-Guang Sun:
Efficient Fingercode Classification.
IEICE Transactions 91-D(5): 1252-1260 (2008) |
| 71 | EE | Dieter Gollmann:
Editorial.
Int. J. Inf. Sec. 7(2): 101 (2008) |
| 2007 |
| 70 | EE | Miranda Mowbray,
Dieter Gollmann:
Electing the Doge of Venice: Analysis of a 13th Century Protocol.
CSF 2007: 295-310 |
| 69 | | Jens Ove Lauf,
Dieter Gollmann,
Volker Turau:
MASC - Monitoring and Security of Containers.
GI Jahrestagung (1) 2007: 5-10 |
| 68 | EE | Dieter Gollmann:
Security in Distributed Applications.
Lipari Summer School 2007: 254-276 |
| 2006 |
| 67 | | Dieter Gollmann,
Jan Meier,
Andrei Sabelfeld:
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
Springer 2006 |
| 66 | EE | Audun Jøsang,
Dieter Gollmann,
Richard Au:
A method for access authorisation through delegation networks.
ACSW Frontiers 2006: 165-174 |
| 65 | EE | Dieter Gollmann:
Why Trust is Bad for Security.
Electr. Notes Theor. Comput. Sci. 157(3): 3-9 (2006) |
| 2005 |
| 64 | | Sabrina De Capitani di Vimercati,
Paul F. Syverson,
Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
Springer 2005 |
| 63 | EE | Dieter Gollmann:
Protocol Analysis for Concrete Environments.
EUROCAST 2005: 365-372 |
| 62 | EE | Susan Pancho-Festin,
Dieter Gollmann:
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol.
Formal Aspects in Security and Trust 2005: 5-15 |
| 2004 |
| 61 | | Pierangela Samarati,
Peter Y. A. Ryan,
Dieter Gollmann,
Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings
Springer 2004 |
| 60 | EE | Dieter Gollmann:
Identity and Location.
Security Protocols Workshop 2004: 246-250 |
| 59 | EE | Dieter Gollmann:
Identity and Location (Transcript of Discussion).
Security Protocols Workshop 2004: 251-255 |
| 2003 |
| 58 | | Einar Snekkenes,
Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings
Springer 2003 |
| 57 | | Sihan Qing,
Dieter Gollmann,
Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings
Springer 2003 |
| 56 | EE | Dieter Gollmann:
Facets of Security.
Global Computing 2003: 192-202 |
| 2002 |
| 55 | | Dieter Gollmann,
Günter Karjoth,
Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings
Springer 2002 |
| 54 | EE | Dieter Gollmann:
Analysing Security Protocols.
FASec 2002: 71-80 |
| 53 | EE | Olivier Markowitch,
Dieter Gollmann,
Steve Kremer:
On Fairness in Exchange Protocols.
ICISC 2002: 451-464 |
| 52 | EE | Dieter Gollmann:
Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n.
IEEE Trans. Computers 51(5): 588-591 (2002) |
| 2001 |
| 51 | EE | Ulrich Lang,
Dieter Gollmann,
Rudolf Schreiner:
Verifiable Identifiers in Middleware Security.
ACSAC 2001: 450-462 |
| 50 | EE | Ulrich Lang,
Dieter Gollmann,
Rudolf Schreiner:
Cryptography and Middleware Security.
ICICS 2001: 408-418 |
| 49 | EE | Dieter Gollmann:
PIM Security.
Security Protocols Workshop 2001: 80-81 |
| 48 | EE | Dieter Gollmann:
PIM Security (Transcript of Discussion).
Security Protocols Workshop 2001: 82-86 |
| 47 | | Tuomas Aura,
Dieter Gollmann:
Communications security on the internet.
Software Focus 2(3): 104-111 (2001) |
| 2000 |
| 46 | | Frédéric Cuppens,
Yves Deswarte,
Dieter Gollmann,
Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
Springer 2000 |
| 45 | EE | Dieter Gollmann:
Mergers and Principals (Transcript of Discussion).
Security Protocols Workshop 2000: 14-19 |
| 44 | EE | Dieter Gollmann:
Mergers and Principals.
Security Protocols Workshop 2000: 5-13 |
| 43 | EE | Dieter Gollmann:
On the Verification of Cryptographic Protocols - A Tale of Two Committees.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
| 42 | EE | Dieter Gollmann:
New paradigms - old paradigms?
Future Generation Comp. Syst. 16(4): 343-349 (2000) |
| 1999 |
| 41 | | Dieter Gollmann:
What Is Authentication?
Security Protocols Workshop 1999: 65-72 |
| 40 | EE | Dieter Gollmann:
Dual Bases and Bit-Serial Multiplication in Fqn.
Theor. Comput. Sci. 226(1-2): 45-59 (1999) |
| 1998 |
| 39 | | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 |
| 38 | EE | Peter Y. A. Ryan,
Dieter Gollmann,
Li Gong,
Günter Karjoth,
Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies.
CSFW 1998: 164-166 |
| 37 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
| 36 | EE | Dieter Gollmann:
Insider Fraud (Position Paper).
Security Protocols Workshop 1998: 213-219 |
| 35 | EE | Dieter Gollmann:
Insider Fraud (Transcript of Discussion).
Security Protocols Workshop 1998: 220-226 |
| 1997 |
| 34 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell,
Peter R. Wild:
Secret Sharing with Reusable Polynomials.
ACISP 1997: 183-193 |
| 33 | EE | Jianying Zhou,
Dieter Gollmann:
An Efficient Non-repudiation Protocol .
CSFW 1997: 126-132 |
| 32 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Authentication Using Minimally Trusted Servers.
Operating Systems Review 31(3): 16-28 (1997) |
| 1996 |
| 31 | | Dieter Gollmann:
Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings
Springer 1996 |
| 30 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms.
ACISP 1996: 121-133 |
| 29 | | Jianying Zhou,
Dieter Gollmann:
Observations on Non-repudiation.
ASIACRYPT 1996: 133-144 |
| 28 | | Willi Geiselmann,
Dieter Gollmann:
Correlation Attacks on Cascades of Clock Controlled Shift Registers.
ASIACRYPT 1996: 346-359 |
| 27 | EE | Jianying Zhou,
Dieter Gollmann:
Certified Electronic Mail.
ESORICS 1996: 160-171 |
| 26 | EE | Dieter Gollmann:
What do We Mean by Entity Authentication?
IEEE Symposium on Security and Privacy 1996: 46-54 |
| 25 | EE | Jianying Zhou,
Dieter Gollmann:
A Fair Non-repudiation Protocol.
IEEE Symposium on Security and Privacy 1996: 55-61 |
| 24 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains.
Security Protocols Workshop 1996: 139-153 |
| 23 | | Dieter Gollmann,
Yongfei Han,
Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptography 7(1-2): 135-151 (1996) |
| 1995 |
| 22 | EE | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key distribution without individual trusted authentification servers.
CSFW 1995: 30- |
| 21 | | Andreas Fuchsberger,
Dieter Gollmann,
Paul J. G. Lothian,
Kenneth G. Paterson,
Abraham Sidiropoulos:
Public-key Cryptography on Smart Cards.
Cryptography: Policy and Algorithms 1995: 250-269 |
| 20 | | Dieter Gollmann:
Cryptographic APIs.
Cryptography: Policy and Algorithms 1995: 290-300 |
| 19 | | Yongfei Han,
Dieter Gollmann,
Chris J. Mitchell:
Minimal Weight k-SR Representations.
IMA Conf. 1995: 34-43 |
| 18 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers.
Journal of Computer Security 3(4): 255-268 (1995) |
| 1994 |
| 17 | | Dieter Gollmann:
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings
Springer 1994 |
| 1993 |
| 16 | | Dieter Gollmann:
Cryptanalysis of Clock Controlled Shift Registers.
FSE 1993: 121-126 |
| 15 | | Dieter Gollmann:
The MSc in Information Security at Royal Holloway.
SEC 1993: 31-36 |
| 14 | EE | Dieter Gollmann,
Thomas Beth,
Frank Damm:
Authentication services in distributed systems.
Computers & Security 12(8): 753-764 (1993) |
| 13 | | Willi Geiselmann,
Dieter Gollmann:
Self-Dual Bases in Fqn.
Des. Codes Cryptography 3(4): 333-345 (1993) |
| 12 | | Bev Littlewood,
Sarah Brocklehurst,
Norman E. Fenton,
P. Mellor,
Stella Page,
David Wright,
J. Dobson,
J. McDermid,
Dieter Gollmann:
Towards Operational Measures of Computer Security.
Journal of Computer Security 2(2-3): 211-230 (1993) |
| 1992 |
| 11 | EE | Kwok-Yan Lam,
Dieter Gollmann:
Freshness Assurance of Authentication Protocols.
ESORICS 1992: 261-272 |
| 1990 |
| 10 | | Willi Geiselmann,
Dieter Gollmann:
VLSI Design for Exponentiation in GF (2n).
AUSCRYPT 1990: 398-405 |
| 9 | EE | Zong-Duo Dai,
Thomas Beth,
Dieter Gollmann:
Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
EUROCRYPT 1990: 189-195 |
| 1989 |
| 8 | | Thomas Beth,
Michael Clausen,
Dieter Gollmann:
Computer Algebra and Computer Aided Systems Theory.
EUROCAST 1989: 161-169 |
| 7 | EE | Dieter Gollmann,
William G. Chambers:
A Cryptanalysis of Stepk, m-Cascades.
EUROCRYPT 1989: 680-687 |
| 1988 |
| 6 | | Willi Geiselmann,
Dieter Gollmann:
Symmetry and Duality in Normal Basis Multiplication.
AAECC 1988: 230-238 |
| 5 | EE | William G. Chambers,
Dieter Gollmann:
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers.
EUROCRYPT 1988: 331-343 |
| 1987 |
| 4 | EE | Sibylle Mund,
Dieter Gollmann,
Thomas Beth:
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
EUROCRYPT 1987: 25-35 |
| 1986 |
| 3 | EE | Thomas Beth,
B. M. Cook,
Dieter Gollmann:
Architectures for Exponentiation in GF(2n).
CRYPTO 1986: 302-310 |
| 2 | | Dieter Gollmann:
Linear Complexity of Sequences with Period pn.
EUROCRYPT 1986: 33 |
| 1984 |
| 1 | EE | Dieter Gollmann:
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.
EUROCRYPT 1984: 93-98 |