The SCEAS System
Navigation Menu

Search the dblp DataBase


Jan Steffan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lars Brückner, Jan Steffan, Wesley Terpstra, Uwe G. Wilhelm
    Active Data Protection with Data Journals. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:269-280 [Conf]
  2. Jan Steffan, Marco Voss
    Security Mechanisms for Multi-Purpose Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2005, pp:158-160 [Conf]
  3. Jan Steffan, Ludger Fiege, Mariano Cilia, Alejandro P. Buchmann
    Towards Multi-Purpose Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICW/ICHSN/ICMCS/SENET, 2005, pp:336-341 [Conf]
  4. Jan Steffan, Ludger Fiege, Mariano Cilia, Alejandro P. Buchmann
    Scoping in wireless sensor networks: a position paper. [Citation Graph (0, 0)][DBLP]
    Middleware for Pervasive and Ad-hoc Computing, 2004, pp:167-171 [Conf]
  5. Jan Steffan, Markus Schumacher
    Collaborative attack modeling. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:253-259 [Conf]
  6. Hans-Christoph Wirth, Jan Steffan
    On Minimum Diameter Spanning Trees under Reload Costs. [Citation Graph (0, 0)][DBLP]
    WG, 1999, pp:78-88 [Conf]
  7. Hans-Christoph Wirth, Jan Steffan
    Reload cost problems: minimum diameter spanning tree. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2001, v:113, n:1, pp:73-85 [Journal]

  8. Attacking the BitLocker Boot Process. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002