The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sigrid Gürgens: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sigrid Gürgens, Javier Lopez, René Peralta
    Efficient Detection of Failure Modes in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:850-857 [Conf]
  2. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:473-482 [Conf]
  3. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Abstractions Preserving Parameter Confidentiality. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:418-437 [Conf]
  4. Sigrid Gürgens, Carsten Rudolph
    Security Analysis of (Un-) Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:97-114 [Conf]
  5. Sigrid Gürgens, René Peralta
    Validation of Cryptographic Protocols by Efficient Automated Testing. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2000, pp:7-12 [Conf]
  6. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Parameter-Confidentiality. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:383-394 [Conf]
  7. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Authenticity and Provability - A Formal Framework. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:227-245 [Conf]
  8. Sigrid Gürgens, Javier Lopez
    Suitability of a Classical Analysis Method for E-commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:46-62 [Conf]
  9. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
    On the Security of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:193-207 [Conf]
  10. Sigrid Gürgens
    SG Logic- A Formal Analysis Technique for Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:159-176 [Conf]
  11. Sigrid Gürgens, Carsten Rudolph
    Security analysis of efficient (Un-)fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:3, pp:260-276 [Journal]
  12. Sigrid Gürgens, Javier Lopez, René Peralta
    Analysis of e-commerce protocols: Adapting a traditional technique. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:21-36 [Journal]
  13. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
    On the security of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:253-262 [Journal]
  14. Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz
    Facilitating the Use of TPM Technologies through S&D Patterns. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:765-769 [Conf]
  15. Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
    Security Evaluation of Scenarios Based on the TCG's TPM Specification. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:438-453 [Conf]

  16. Towards a Generic Process for Security Pattern Integration. [Citation Graph (, )][DBLP]


  17. On the Security Validation of Integrated Security Solutions. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002