The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hartmut König: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fuwen Liu, Hartmut König
    Puzzle - A Novel Video Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:88-97 [Conf]
  2. Fuwen Liu, Hartmut König
    Efficient Key Distribution for Closed Meetings in the Internet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:271-272 [Conf]
  3. Michael Sobirey, Birk Richter, Hartmut König
    The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:278-290 [Conf]
  4. Alek Opitz, Hartmut König
    Optimizing the Access to Read-Only Data in Grid Computing. [Citation Graph (0, 0)][DBLP]
    DAIS, 2005, pp:206-219 [Conf]
  5. Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König
    Verteilte Mehrteilnehmer-Videokonferenzen im Internet. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:167-180 [Conf]
  6. Thomas Holz, Michael Meier, Hartmut König
    High-Efficient Intrusion Detection Infrastructure. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2003, pp:217-232 [Conf]
  7. Michael Meier, Sebastian Schmerl, Hartmut König
    Improving the Efficiency of Misuse Detection. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:188-205 [Conf]
  8. Thomas Preuß, Jens-Hagen Syrbe, Hartmut König
    Virtual Private Resources. [Citation Graph (0, 0)][DBLP]
    EDOC, 1997, pp:216-226 [Conf]
  9. Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier
    Simplifying Signature Engineering by Reuse. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:436-450 [Conf]
  10. Peter Langendörfer, Hartmut König
    Automatische Generierung effizienter Protokollimplementierungen. [Citation Graph (0, 0)][DBLP]
    FBT, 1999, pp:135-144 [Conf]
  11. Peter Langendörfer, Thomas Krüger, Hartmut König
    Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. [Citation Graph (0, 0)][DBLP]
    FBT, 2000, pp:143-152 [Conf]
  12. Abdelaziz Guerrouat, Hartmut König, Andreas Ulrich
    SELEXPERT - A Knowledge-based Tool for Test Case Selection. [Citation Graph (0, 0)][DBLP]
    FORTE, 1995, pp:313-328 [Conf]
  13. Ralf Henke, Andreas Mitschele-Thiel, Hartmut König
    On the Influence of Semantic Constraints on the Code Generation from Estelle Specifications. [Citation Graph (0, 0)][DBLP]
    FORTE, 1997, pp:399-414 [Conf]
  14. Peter Langendörfer, Hartmut König
    Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. [Citation Graph (0, 0)][DBLP]
    FORTE, 1999, pp:169-184 [Conf]
  15. Sven Twarok, Peter Langendörfer, Hartmut König
    Automated Derivation of ILP Implementations from SDL Specifications. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:3-18 [Conf]
  16. Andreas Ulrich, Hartmut König
    Specification-based Testing of Concurrent Systems. [Citation Graph (0, 0)][DBLP]
    FORTE, 1997, pp:7-22 [Conf]
  17. Hartmut König
    Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2005, pp:638-642 [Conf]
  18. Mario Zühlke, Hartmut König
    A Signaling Protocol for Small Closed Dynamic Multi-peer Groups. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:973-984 [Conf]
  19. Peter Langendörfer, Hartmut König
    Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:451-458 [Conf]
  20. Ines Beier, Hartmut König
    GCSVA - A Multiparty Videoconferencing System with Distributed Group and QoS Management. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:594-598 [Conf]
  21. Peter Langendörfer, Hartmut König
    Automated Protocol Implementations Based on Activity Threads. [Citation Graph (0, 0)][DBLP]
    ICNP, 1999, pp:3-10 [Conf]
  22. Mario Zühlke, Hartmut König
    Voting Based Bandwidth Management in Multiparty Video Conferences. [Citation Graph (0, 0)][DBLP]
    IDMS/PROMS, 2002, pp:202-215 [Conf]
  23. R. Födisch, Thomas Held, Hartmut König
    A Protocol Development Environment Based on Estelle. [Citation Graph (0, 0)][DBLP]
    INDC, 1992, pp:121-141 [Conf]
  24. Hartmut König, Peter Neumann
    Formale Beschreibungstechniken für Kommunikationsprotokolle: Problemem ihrer praktischen Anwendung. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1993, pp:545-559 [Conf]
  25. Fuwen Liu, Hartmut König
    Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge und Workshop, 2005, pp:163-167 [Conf]
  26. Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König
    BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge, 2003, pp:167-180 [Conf]
  27. Thomas Preuß, Jens-Hagen Syrbe, Hartmut König
    Permanent Customer-Provider Relationships for Electric Service Markets. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1999, pp:326-337 [Conf]
  28. Daniel Rakel, Hartmut König
    Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge und Workshop, 2005, pp:159-162 [Conf]
  29. Birk Richter, Michael Sobirey, Hartmut König
    Host-orientiertes Netz-Audit. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:48-61 [Conf]
  30. Fuwen Liu, Hartmut König
    A novel encryption algorithm for high resolution video. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2005, pp:69-74 [Conf]
  31. Fuwen Liu, Hartmut König
    A Secure P2P Video Conference System for Enterprise Environments. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:88-96 [Conf]
  32. Ralf Henke, Andreas Mitschele-Thiel, Hartmut König
    Conjunct Application of Model-based and Code-based Optimization to Derive Efficient Parallel Implementations from SDL. [Citation Graph (0, 0)][DBLP]
    PDSE, 1998, pp:230-237 [Conf]
  33. Thomas Held, Hartmut König
    Increasing the efficiency of computer-aided protocol implementations. [Citation Graph (0, 0)][DBLP]
    PSTV, 1994, pp:387-394 [Conf]
  34. Ralf Plato, Thomas Held, Hartmut König
    PARES - a portable parallel Estelle compiler. [Citation Graph (0, 0)][DBLP]
    PSTV, 1995, pp:403-418 [Conf]
  35. Alexandre Petrenko, Rachida Dssouli, Hartmut König
    On Evaluation of Testability of Protocol Structures. [Citation Graph (0, 0)][DBLP]
    Protocol Test Systems, 1993, pp:111-124 [Conf]
  36. Andreas Ulrich, Hartmut König
    Test Derivation from LOTOS Using Structure Information. [Citation Graph (0, 0)][DBLP]
    Protocol Test Systems, 1993, pp:279-293 [Conf]
  37. Andreas Ulrich, Hartmut König
    Architectures for Testing Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IWTCS, 1999, pp:93-108 [Conf]
  38. Peter Langendörfer, Hartmut König
    COCOS - A configurable SDL compiler for generating efficient protocol implementations. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1999, pp:259-274 [Conf]
  39. Ralf Henke, Hartmut König, Andreas Mitschele-Thiel
    Derivation of efficient implementations from SDL specifications employing data referencing, integrated packet framing and activity threads. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1997, pp:397-414 [Conf]
  40. Ines Beier, Hartmut König
    Distributed QoS Management for A Multiparty Video Conferencing System. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 1999, pp:335-348 [Conf]
  41. Alek Opitz, Torsten Mielke, Hartmut König
    Virtual Private Components. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 2002, pp:- [Conf]
  42. Mario Zühlke, Hartmut König
    GCP. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 2002, pp:- [Conf]
  43. Fuwen Liu, Hartmut König
    Secure and efficient key distribution for collaborative applications. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  44. Reinhard Gotzhein, Jan Bredereke, Wolfgang Effelsberg, Stephan Fischer, Thomas Held, Hartmut König
    Improving the efficiency of automated protocol implementation using Estelle. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:14, pp:1226-1235 [Journal]
  45. Hartmut König, Peter Langendörfer, Heiko Krumm
    Improving the efficiency of automated protocol implementations using a configurable FDT compiler. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:12, pp:1179-1195 [Journal]
  46. Hartmut König, Heiko Krumm
    Implementierung von Kommunikationsprotokollen. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1996, v:19, n:6, pp:316-325 [Journal]
  47. Samuel T. Chanson, A. Hui, Hartmut König, Mario Zühlke
    Das OCTOPUS-Videokonferenzsystem. [Citation Graph (0, 0)][DBLP]
    Praxis der Informationsverarbeitung und Kommunikation, 2000, v:23, n:4, pp:- [Journal]
  48. Peter Langendörfer, Rolf Kraemer, Hartmut König
    Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2001, v:20, n:2, pp:161-173 [Journal]
  49. Fuwen Liu, Hartmut König
    A Token Based Key Distribution Protocol for Closed Group Meetings. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2005, pp:29-43 [Conf]
  50. Sebastian Schmerl, Hartmut König
    Towards Systematic Signature Testing. [Citation Graph (0, 0)][DBLP]
    TestCom/FATES, 2007, pp:276-291 [Conf]

  51. Systematic Signature Engineering by Re-use of Snort Signatures. [Citation Graph (, )][DBLP]


  52. 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  53. 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP]


  54. 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  55. Predicting Free Computing Capacities on Individual Machines. [Citation Graph (, )][DBLP]


  56. Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort. [Citation Graph (, )][DBLP]


  57. Identifying Modeling Errors in Signatures by Model Checking. [Citation Graph (, )][DBLP]


  58. Security Policy Management for Peer Group Meetings. [Citation Graph (, )][DBLP]


  59. A survey of video encryption algorithms. [Citation Graph (, )][DBLP]


Search in 0.010secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002