Search the dblp DataBase
Walter Fumy :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Walter Fumy Orthogonal Transform Encoding of Cyclic Codes. [Citation Graph (0, 0)][DBLP ] AAECC, 1985, pp:131-134 [Conf ] Walter Fumy Key Management. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:132-147 [Conf ] Walter Fumy (Local Area) Network Security. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:211-226 [Conf ] Walter Fumy Key Management Techniques. [Citation Graph (0, 0)][DBLP ] State of the Art in Applied Cryptography, 1997, pp:142-162 [Conf ] Walter Fumy Internet Security Protocols. [Citation Graph (0, 0)][DBLP ] State of the Art in Applied Cryptography, 1997, pp:186-208 [Conf ] Walter Fumy On the F-function of FEAL. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:434-437 [Conf ] Walter Fumy , Michael Munzert A Modular Approach to Key Distribution. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:274-283 [Conf ] Walter Fumy IT Security Trends. [Citation Graph (0, 0)][DBLP ] DFN-Arbeitstagung über Kommunikationsnetze, 2002, pp:13-27 [Conf ] Bart Preneel , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen Race Integrity Primitives Evaluation (RIPE): A Status Report. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:547-551 [Conf ] Joos Vandewalle , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:267-271 [Conf ] Walter Fumy Datensicherheit in Netzen der Automatisierungstechnik. [Citation Graph (0, 0)][DBLP ] Prozeßrechnersysteme, 1988, pp:242-251 [Conf ] Walter Fumy , Hans Peter Rieß Kommunikationssicherheit in industriellen Netzen. [Citation Graph (0, 0)][DBLP ] Prozeßrechnersysteme, 1991, pp:251-260 [Conf ] Walter Fumy Designprinzipien für Authentifikationsmechanismen. [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:307-319 [Conf ] Walter Fumy , Matthias Leclerc Placement of Cryptographic Key Distribution Within OSI: Design Alternatives and Assessment. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1993, v:26, n:2, pp:217-225 [Journal ] Walter Fumy Von Common Criteria bis zu elliptischen Kurven - Sicherheitsstandards von ISO/IEC JTC 1/SC 27. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2000, v:24, n:7, pp:- [Journal ] Walter Fumy , Peter Landrock Principles of Key Management. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:785-793 [Journal ] Search in 0.523secs, Finished in 0.523secs