| 2008 |
| 10 | EE | Enrico Heinrich,
Sebastian Staamann,
Ralf Joost,
Ralf Salomon:
Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example.
ETFA 2008: 1449-1456 |
| 2007 |
| 9 | EE | Christoph Becker,
Sebastian Staamann,
Ralf Salomon:
Security Analysis of the Utilization of Corba Object References as Authorization Tokens.
ISORC 2007: 196-203 |
| 2000 |
| 8 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Computing 4(5): 40-48 (2000) |
| 1999 |
| 7 | | Sebastian Staamann,
Levente Buttyán,
Allan Coignet,
Ernesto Ruggiano,
Uwe G. Wilhelm,
Marc Zweiacker:
Closed user groups in Internet service centres.
DAIS 1999: 439- |
| 6 | EE | Sebastian Staamann,
Uwe G. Wilhelm:
Workshop on Electronic Commerce - Foreword.
SRDS 1999: 329 |
| 5 | | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Secure Internet Programming 1999: 469-489 |
| 1998 |
| 4 | EE | Levente Buttyán,
Sebastian Staamann,
Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design.
CSFW 1998: 153-162 |
| 3 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Protecting the Itinerary of Mobile Agents.
ECOOP Workshops 1998: 301 |
| 2 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems.
NDSS 1998 |
| 1997 |
| 1 | | Sebastian Staamann,
Uwe G. Wilhelm:
Cryptographic Protection of Connection Integrity with Interruption Detection in TINA.
DAIS 1997 |