2003 |
12 | | Lars Brückner,
Jan Steffan,
Wesley Terpstra,
Uwe G. Wilhelm:
Active Data Protection with Data Journals.
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 269-280 |
2001 |
11 | | Ludger Fiege,
Gero Mühl,
Uwe G. Wilhelm:
Electronic Commerce, Second International Workshop, WELCOM 2001 Heidelberg, Germany, November 16-17, 2001, Proceedings
Springer 2001 |
2000 |
10 | | Henning Pagnia,
Holger Vogt,
Felix C. Gärtner,
Uwe G. Wilhelm:
Solving Fair Exchange with Mobile Agents.
ASA/MA 2000: 57-72 |
9 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Computing 4(5): 40-48 (2000) |
1999 |
8 | | Sebastian Staamann,
Levente Buttyán,
Allan Coignet,
Ernesto Ruggiano,
Uwe G. Wilhelm,
Marc Zweiacker:
Closed user groups in Internet service centres.
DAIS 1999: 439- |
7 | EE | Sebastian Staamann,
Uwe G. Wilhelm:
Workshop on Electronic Commerce - Foreword.
SRDS 1999: 329 |
6 | | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Secure Internet Programming 1999: 469-489 |
1998 |
5 | EE | Levente Buttyán,
Sebastian Staamann,
Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design.
CSFW 1998: 153-162 |
4 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Protecting the Itinerary of Mobile Agents.
ECOOP Workshops 1998: 301 |
3 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems.
NDSS 1998 |
1997 |
2 | | Sebastian Staamann,
Uwe G. Wilhelm:
Cryptographic Protection of Connection Integrity with Interruption Detection in TINA.
DAIS 1997 |
1995 |
1 | | Uwe G. Wilhelm,
André Schiper:
A Hierarchy of Totally Ordered Multicasts.
SRDS 1995: 106-115 |