2008 |
10 | EE | Enrico Heinrich,
Sebastian Staamann,
Ralf Joost,
Ralf Salomon:
Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example.
ETFA 2008: 1449-1456 |
2007 |
9 | EE | Christoph Becker,
Sebastian Staamann,
Ralf Salomon:
Security Analysis of the Utilization of Corba Object References as Authorization Tokens.
ISORC 2007: 196-203 |
2000 |
8 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Computing 4(5): 40-48 (2000) |
1999 |
7 | | Sebastian Staamann,
Levente Buttyán,
Allan Coignet,
Ernesto Ruggiano,
Uwe G. Wilhelm,
Marc Zweiacker:
Closed user groups in Internet service centres.
DAIS 1999: 439- |
6 | EE | Sebastian Staamann,
Uwe G. Wilhelm:
Workshop on Electronic Commerce - Foreword.
SRDS 1999: 329 |
5 | | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Secure Internet Programming 1999: 469-489 |
1998 |
4 | EE | Levente Buttyán,
Sebastian Staamann,
Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design.
CSFW 1998: 153-162 |
3 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Protecting the Itinerary of Mobile Agents.
ECOOP Workshops 1998: 301 |
2 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems.
NDSS 1998 |
1997 |
1 | | Sebastian Staamann,
Uwe G. Wilhelm:
Cryptographic Protection of Connection Integrity with Interruption Detection in TINA.
DAIS 1997 |