|
Search the dblp DataBase
Jan Steffan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lars Brückner, Jan Steffan, Wesley Terpstra, Uwe G. Wilhelm
Active Data Protection with Data Journals. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:269-280 [Conf]
- Jan Steffan, Marco Voss
Security Mechanisms for Multi-Purpose Sensor Networks. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (2), 2005, pp:158-160 [Conf]
- Jan Steffan, Ludger Fiege, Mariano Cilia, Alejandro P. Buchmann
Towards Multi-Purpose Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICW/ICHSN/ICMCS/SENET, 2005, pp:336-341 [Conf]
- Jan Steffan, Ludger Fiege, Mariano Cilia, Alejandro P. Buchmann
Scoping in wireless sensor networks: a position paper. [Citation Graph (0, 0)][DBLP] Middleware for Pervasive and Ad-hoc Computing, 2004, pp:167-171 [Conf]
- Jan Steffan, Markus Schumacher
Collaborative attack modeling. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:253-259 [Conf]
- Hans-Christoph Wirth, Jan Steffan
On Minimum Diameter Spanning Trees under Reload Costs. [Citation Graph (0, 0)][DBLP] WG, 1999, pp:78-88 [Conf]
- Hans-Christoph Wirth, Jan Steffan
Reload cost problems: minimum diameter spanning tree. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2001, v:113, n:1, pp:73-85 [Journal]
Attacking the BitLocker Boot Process. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|