2009 |
8 | EE | Sven Türpe,
Andreas Poller,
Jan Steffan,
Jan-Peter Stotz,
Jan Trukenmüller:
Attacking the BitLocker Boot Process.
TRUST 2009: 183-196 |
2005 |
7 | | Jan Steffan,
Marco Voss:
Security Mechanisms for Multi-Purpose Sensor Networks.
GI Jahrestagung (2) 2005: 158-160 |
6 | EE | Jan Steffan,
Ludger Fiege,
Mariano Cilia,
Alejandro P. Buchmann:
Towards Multi-Purpose Wireless Sensor Networks.
ICW/ICHSN/ICMCS/SENET 2005: 336-341 |
2004 |
5 | EE | Jan Steffan,
Ludger Fiege,
Mariano Cilia,
Alejandro P. Buchmann:
Scoping in wireless sensor networks: a position paper.
Middleware for Pervasive and Ad-hoc Computing 2004: 167-171 |
2003 |
4 | | Lars Brückner,
Jan Steffan,
Wesley Terpstra,
Uwe G. Wilhelm:
Active Data Protection with Data Journals.
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 269-280 |
2002 |
3 | EE | Jan Steffan,
Markus Schumacher:
Collaborative attack modeling.
SAC 2002: 253-259 |
2001 |
2 | | Hans-Christoph Wirth,
Jan Steffan:
Reload cost problems: minimum diameter spanning tree.
Discrete Applied Mathematics 113(1): 73-85 (2001) |
1999 |
1 | EE | Hans-Christoph Wirth,
Jan Steffan:
On Minimum Diameter Spanning Trees under Reload Costs.
WG 1999: 78-88 |