The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dieter Gollmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Willi Geiselmann, Dieter Gollmann
    Symmetry and Duality in Normal Basis Multiplication. [Citation Graph (0, 0)][DBLP]
    AAECC, 1988, pp:230-238 [Conf]
  2. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:121-133 [Conf]
  3. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
    Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:183-193 [Conf]
  4. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
    Verifiable Identifiers in Middleware Security. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:450-462 [Conf]
  5. Audun Jøsang, Dieter Gollmann, Richard Au
    A method for access authorisation through delegation networks. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:165-174 [Conf]
  6. Willi Geiselmann, Dieter Gollmann
    VLSI Design for Exponentiation in GF (2n). [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:398-405 [Conf]
  7. Willi Geiselmann, Dieter Gollmann
    Correlation Attacks on Cascades of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:346-359 [Conf]
  8. Jianying Zhou, Dieter Gollmann
    Observations on Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:133-144 [Conf]
  9. Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos
    Public-key Cryptography on Smart Cards. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:250-269 [Conf]
  10. Dieter Gollmann
    Cryptographic APIs. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:290-300 [Conf]
  11. Thomas Beth, B. M. Cook, Dieter Gollmann
    Architectures for Exponentiation in GF(2n). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:302-310 [Conf]
  12. Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
    Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:79-82 [Conf]
  13. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:30-0 [Conf]
  14. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell
    Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:164-166 [Conf]
  15. Jianying Zhou, Dieter Gollmann
    An Efficient Non-repudiation Protocol . [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:126-132 [Conf]
  16. Kwok-Yan Lam, Dieter Gollmann
    Freshness Assurance of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:261-272 [Conf]
  17. Jianying Zhou, Dieter Gollmann
    Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:160-171 [Conf]
  18. Thomas Beth, Michael Clausen, Dieter Gollmann
    Computer Algebra and Computer Aided Systems Theory. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1989, pp:161-169 [Conf]
  19. Dieter Gollmann
    Protocol Analysis for Concrete Environments. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2005, pp:365-372 [Conf]
  20. William G. Chambers, Dieter Gollmann
    Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:331-343 [Conf]
  21. Zong-Duo Dai, Thomas Beth, Dieter Gollmann
    Lower Bounds for the Linear Complexity of Sequences over Residue Rings. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:189-195 [Conf]
  22. Dieter Gollmann
    Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:93-98 [Conf]
  23. Dieter Gollmann
    Linear Complexity of Sequences with Period pn. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:33- [Conf]
  24. Dieter Gollmann, William G. Chambers
    A Cryptanalysis of Stepk, m-Cascades. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:680-687 [Conf]
  25. Sibylle Mund, Dieter Gollmann, Thomas Beth
    Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:25-35 [Conf]
  26. Dieter Gollmann
    Analysing Security Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:71-80 [Conf]
  27. Dieter Gollmann
    Cryptanalysis of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:121-126 [Conf]
  28. Dieter Gollmann
    Facets of Security. [Citation Graph (0, 0)][DBLP]
    Global Computing, 2003, pp:192-202 [Conf]
  29. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
    Cryptography and Middleware Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:408-418 [Conf]
  30. Olivier Markowitch, Dieter Gollmann, Steve Kremer
    On Fairness in Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:451-464 [Conf]
  31. Susan Pancho-Festin, Dieter Gollmann
    On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:5-15 [Conf]
  32. Yongfei Han, Dieter Gollmann, Chris J. Mitchell
    Minimal Weight k-SR Representations. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:34-43 [Conf]
  33. Dieter Gollmann
    The MSc in Information Security at Royal Holloway. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:31-36 [Conf]
  34. Dieter Gollmann
    What do We Mean by Entity Authentication? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:46-54 [Conf]
  35. Jianying Zhou, Dieter Gollmann
    A Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:55-61 [Conf]
  36. Dieter Gollmann
    Mergers and Principals (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:14-19 [Conf]
  37. Dieter Gollmann
    Mergers and Principals. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:5-13 [Conf]
  38. Dieter Gollmann
    PIM Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:80-81 [Conf]
  39. Dieter Gollmann
    PIM Security (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:82-86 [Conf]
  40. Dieter Gollmann
    Insider Fraud (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:213-219 [Conf]
  41. Dieter Gollmann
    Insider Fraud (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:220-226 [Conf]
  42. Dieter Gollmann
    What Is Authentication? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:65-72 [Conf]
  43. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:139-153 [Conf]
  44. Dieter Gollmann
    Identity and Location. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:246-250 [Conf]
  45. Dieter Gollmann
    Identity and Location (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:251-255 [Conf]
  46. Dieter Gollmann, Thomas Beth, Frank Damm
    Authentication services in distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:8, pp:753-764 [Journal]
  47. Willi Geiselmann, Dieter Gollmann
    Self-Dual Bases in Fqn. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1993, v:3, n:4, pp:333-345 [Journal]
  48. Dieter Gollmann, Yongfei Han, Chris J. Mitchell
    Redundant Integer Representations and Fast Exponentiation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:135-151 [Journal]
  49. Dieter Gollmann
    On the Verification of Cryptographic Protocols - A Tale of Two Committees. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  50. Dieter Gollmann
    Why Trust is Bad for Security. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:3-9 [Journal]
  51. Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, P. Mellor, Stella Page, David Wright, J. Dobson, J. McDermid, Dieter Gollmann
    Towards Operational Measures of Computer Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:211-230 [Journal]
  52. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal]
  53. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Authentication Using Minimally Trusted Servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:3, pp:16-28 [Journal]
  54. Tuomas Aura, Dieter Gollmann
    Communications security on the internet. [Citation Graph (0, 0)][DBLP]
    Software Focus, 2001, v:2, n:3, pp:104-111 [Journal]
  55. Dieter Gollmann
    Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:5, pp:588-591 [Journal]
  56. Dieter Gollmann
    Dual Bases and Bit-Serial Multiplication in Fqn. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:45-59 [Journal]
  57. Dieter Gollmann
    New paradigms - old paradigms? [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:343-349 [Journal]

  58. Electing the Doge of Venice: Analysis of a 13th Century Protocol. [Citation Graph (, )][DBLP]


  59. Caught in the Maze of Security Standards. [Citation Graph (, )][DBLP]


  60. MASC - Monitoring and Security of Containers. [Citation Graph (, )][DBLP]


  61. Secure Applications without Secure Infrastructures. [Citation Graph (, )][DBLP]


  62. A Formal P3P Semantics for Composite Services. [Citation Graph (, )][DBLP]


  63. Security in Distributed Applications. [Citation Graph (, )][DBLP]


Search in 0.043secs, Finished in 0.046secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002