The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Philippe A. Janson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philippe A. Janson
    Using Type-Extension to Organize Virtual-Memory Mechanisms. [Citation Graph (1, 0)][DBLP]
    Operating Systems Review, 1981, v:15, n:4, pp:6-38 [Journal]
  2. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of Two-Party Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:44-61 [Conf]
  3. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:107-122 [Conf]
  4. Bernd W. Meister, Philippe A. Janson, Liba Svobodova
    File Transfer in Local-Area Networks: A Performance Study. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1985, pp:338-349 [Conf]
  5. Philippe A. Janson, Gene Tsudik, Moti Yung
    Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:725-736 [Conf]
  6. Philippe A. Janson
    Operating system support for communications. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1985, pp:19-22 [Conf]
  7. Philippe A. Janson
    Dynamic Linking and Environment Initialization in a Multi-Domain Process. [Citation Graph (0, 0)][DBLP]
    SOSP, 1975, pp:43-50 [Conf]
  8. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    State of the art in electronic payment systems. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2000, v:53, n:, pp:426-451 [Journal]
  9. Philippe A. Janson, Refik Molva
    Security in Open Networks and Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1991, v:22, n:5, pp:232-346 [Journal]
  10. Stefano Zatti, Philippe A. Janson
    Interconnecting OSI and Non-Osi Networks Using an Integrated Directory Service. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1988, v:15, n:, pp:269-283 [Journal]
  11. Philippe A. Janson, Gene Tsudik
    Secure and minimal protocols for authenticated key distribution. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:9, pp:645-653 [Journal]
  12. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    The State of the Art in Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:9, pp:28-35 [Journal]
  13. Brian E. Carpenter, Philippe A. Janson
    Abstract interdomain security assertions: A basis for extra-grid virtual organizations. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2004, v:43, n:4, pp:689-701 [Journal]
  14. Philippe A. Janson, Refik Molva, Stefano Zatti
    Architectural Directions for Opening IBM Networks: The Case of OSI. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1992, v:31, n:2, pp:313-335 [Journal]
  15. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal]
  16. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal]
  17. Liba Svobodova, Philippe A. Janson, Eduard Mumprecht
    Heterogeneity and OSI. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:1, pp:67-79 [Journal]
  18. Bernd W. Meister, Philippe A. Janson, Liba Svobodova
    Connection-Oriented Versus Connectionless Protocols: A Performance Study. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1985, v:34, n:12, pp:1164-1173 [Journal]
  19. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    The KryptoKnight family of light-weight protocols for authentication and key distribution. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:31-41 [Journal]

Search in 0.066secs, Finished in 0.067secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002