![]() | ![]() |
2000 | ||
---|---|---|
7 | EE | Volkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. IEEE Trans. Software Eng. 26(8): 702-712 (2000) |
1999 | ||
6 | EE | Volkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. World Congress on Formal Methods 1999: 718-737 |
5 | Heike Neumann, Volker Kessler: Formale Analyse von kryptographischen Protokollen mit BAN-Logik. Datenschutz und Datensicherheit 23(2): (1999) | |
1998 | ||
4 | EE | Volker Kessler, Heike Neumann: A Sound Logic for Analysing Electronic Commerce Protocols. ESORICS 1998: 345-360 |
1996 | ||
3 | EE | Gabriele Wedel, Volker Kessler: Formal Semantics for Authentication Logics. ESORICS 1996: 219-241 |
1994 | ||
2 | Volker Kessler, Gabriele Wedel: AUTLOG - An Advanced Logic of Authentication. CSFW 1994: 90-99 | |
1992 | ||
1 | EE | Volker Kessler: On the Chinese Wall Model. ESORICS 1992: 41-54 |
1 | Volkmar Lotz | [6] [7] |
2 | Heike Neumann | [4] [5] |
3 | Georg Walter | [6] [7] |
4 | Gabriele Wedel | [2] [3] |