Search the dblp DataBase
Roland Schmitz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Roland Schmitz Security for the core network of third generation mobile systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Stefan Pütz , Roland Schmitz , Benno Tietz Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:142-152 [Conf ] Andreas Böhm , Roland Schmitz , Stefan Uellner Kundenspezifische interaktive Konfiguration von Telekommunikationssystemen. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1997, pp:436-445 [Conf ] Andreas Böhm , Roland Schmitz , Stefan Uellner , Wolfgang Orth , Jörg Rahmer A Reference Model for Model-Based Configuration of Telecooperation Systems. [Citation Graph (0, 0)][DBLP ] HICSS (5), 1998, pp:432-0 [Conf ] Ernst-Günter Giessmann , Roland Schmitz Zum Gültigkeitsmodell für elektronische Signaturen nach SigG und X.509. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2000, v:24, n:7, pp:- [Journal ] Stefan Pütz , Roland Schmitz UMTS Sicherheitsdienste. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2001, v:25, n:4, pp:- [Journal ] Stefan Pütz , Roland Schmitz , Tobias Martin Security Mechanisms in UMTS. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2001, v:25, n:6, pp:- [Journal ] On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP ] hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP ] Public Key Cryptography: A Dynamical Systems Perspective. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs