![]() |
| 2000 | ||
|---|---|---|
| 7 | EE | Volkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. IEEE Trans. Software Eng. 26(8): 702-712 (2000) |
| 1999 | ||
| 6 | EE | Volkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. World Congress on Formal Methods 1999: 718-737 |
| 5 | Heike Neumann, Volker Kessler: Formale Analyse von kryptographischen Protokollen mit BAN-Logik. Datenschutz und Datensicherheit 23(2): (1999) | |
| 1998 | ||
| 4 | EE | Volker Kessler, Heike Neumann: A Sound Logic for Analysing Electronic Commerce Protocols. ESORICS 1998: 345-360 |
| 1996 | ||
| 3 | EE | Gabriele Wedel, Volker Kessler: Formal Semantics for Authentication Logics. ESORICS 1996: 219-241 |
| 1994 | ||
| 2 | Volker Kessler, Gabriele Wedel: AUTLOG - An Advanced Logic of Authentication. CSFW 1994: 90-99 | |
| 1992 | ||
| 1 | EE | Volker Kessler: On the Chinese Wall Model. ESORICS 1992: 41-54 |
| 1 | Volkmar Lotz | [6] [7] |
| 2 | Heike Neumann | [4] [5] |
| 3 | Georg Walter | [6] [7] |
| 4 | Gabriele Wedel | [2] [3] |