Search the dblp DataBase
Rüdiger Grimm :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Rüdiger Grimm , Kambiz Zangeneh Cybermoney in the Internet: An Overview over new Payment Systems in the Internet. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:183-195 [Conf ] Rüdiger Grimm , Hubert B. Keller , Kai Rannenberg Vorwort. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:3- [Conf ] Rüdiger Grimm , Jürgen Nützel A Friendly Peer-to-Peer File Sharing System with Profit but without Copy Protection. [Citation Graph (0, 0)][DBLP ] IICS, 2002, pp:133-142 [Conf ] Rüdiger Grimm , Alexander Roßnagel Can P3P help to protect privacy worldwide? [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:157-160 [Conf ] Rüdiger Grimm A Model of Security in Open Telecooperation. [Citation Graph (0, 0)][DBLP ] ULPAA, 1992, pp:425-440 [Conf ] Rüdiger Grimm Security. [Citation Graph (0, 0)][DBLP ] ULPAA, 1992, pp:463-465 [Conf ] Rüdiger Grimm , Jan Lühe , Wolfgang Schneider Towards Trustworthy Communication Systems - Experiences with the Security Toolkit SecuDE. [Citation Graph (0, 0)][DBLP ] ULPAA, 1994, pp:107-120 [Conf ] Rüdiger Grimm , Almoor M. Shivji Security. [Citation Graph (0, 0)][DBLP ] ULPAA, 1994, pp:413-415 [Conf ] Rüdiger Grimm , Thomas Hetschold Zugriffsschutz für OSI-Management - Erfahrungen aus dem DeTeBerkom-Projekt BMSec. [Citation Graph (0, 0)][DBLP ] VIS, 1995, pp:307-0 [Conf ] Rüdiger Grimm , Achim Steinacker Das Kooperations- und das Gleichgewichtsmodell - Theorie und Praxis. [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:85-106 [Conf ] Rüdiger Grimm Security on Networks: Do We Really Need It? [Citation Graph (0, 0)][DBLP ] Computer Networks, 1989, v:17, n:, pp:315-323 [Journal ] Rüdiger Grimm Security for Open Communication: The DFN Mail Security Project Report. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1990, v:19, n:3-5, pp:196-200 [Journal ] Rüdiger Grimm , Denise Heagerty Recommendation for a Shorthand X.400 Address Notation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1989, v:17, n:, pp:263-267 [Journal ] Rüdiger Grimm , Thomas Hetschold Security Policies in OSI-Management Experiences from the DeTeBerkom Project BMSec. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1996, v:28, n:4, pp:499-511 [Journal ] Rüdiger Grimm , Peter Ochsenschläger Binding telecooperation - a formal model for electronic commerce. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:37, n:2, pp:171-193 [Journal ] Johann Bizer , Rüdiger Grimm Virtuelle Waren. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2002, v:26, n:5, pp:- [Journal ] Rüdiger Grimm Technische Umsetzung der Anbieterkennzeichnung. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 1999, v:23, n:11, pp:- [Journal ] Rüdiger Grimm , Nils Löhndorf , Philip Scholz Datenschutz in Telediensten (DASIT) - Am Beispiel von Einkaufen und Bezahlen im Internet. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 1999, v:23, n:5, pp:- [Journal ] Rüdiger Grimm , Jürgen Nützel Geschäftsmodelle für virtuelle Waren. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2002, v:26, n:5, pp:- [Journal ] Rüdiger Grimm , Alexander Roßnagel Datenschutz für das Internet in den USA. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2000, v:24, n:8, pp:- [Journal ] Rüdiger Grimm , Alexander W. Röhm Sicherheit und E-Commerce. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2000, v:24, n:10, pp:- [Journal ] Rüdiger Grimm , Peter Ochsenschläger Elektronische Verträge und ihre verbindliche Aushandlung - Ein formales Modell für verbindliche Telekooperation. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 2000, v:15, n:4, pp:182-192 [Journal ] Matthias Enzmann , Henning Pagnia , Rüdiger Grimm Das Teledienstedatenschutzgesetz und seine Umsetzung in der Praxis. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 2000, v:42, n:5, pp:402-412 [Journal ] Rüdiger Grimm Security requirements for internet voting. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2001, pp:56-59 [Conf ] Rüdiger Grimm , Patrick Aichroth Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:93-99 [Conf ] Elektronische Wahlen, elektronische Teilhabe, Societyware - Beherrschbare Systeme? Wünschenswerte Systeme? [Citation Graph (, )][DBLP ] Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme. [Citation Graph (, )][DBLP ] Vorwort der Workshop-Leitung. [Citation Graph (, )][DBLP ] Security Requirements for Non-political Internet Voting. [Citation Graph (, )][DBLP ] Multiple Casts in Online Voting: Analyzing Chances. [Citation Graph (, )][DBLP ] Overview. [Citation Graph (, )][DBLP ] Development of a Formal IT Security Model for Remote Electronic Voting Systems. [Citation Graph (, )][DBLP ] Overview. [Citation Graph (, )][DBLP ] A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting. [Citation Graph (, )][DBLP ] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. [Citation Graph (, )][DBLP ] Using Instant Messaging Systems as a Platform for Electronic Voting. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs