The SCEAS System
Navigation Menu

Search the dblp DataBase


Alf Zugenmaier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Uwe Jendricke, Alf Zugenmaier
    Architekturen für mehrseitige sichere Telekommunikationsnetze. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1999, pp:190-198 [Conf]
  2. Moritz Strasser, Alf Zugenmaier
    Personalization through Mask Marketing. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:219- [Conf]
  3. Matthias Kabatnik, Alf Zugenmaier
    Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:20-30 [Conf]
  4. Alf Zugenmaier, Michael Kreuzer, Günter Müller
    The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge, 2003, pp:131-141 [Conf]
  5. Alf Zugenmaier
    FLASCHE - A Mechanism Providing Anonymity for Mobile Users. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:121-141 [Conf]
  6. Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
    Shield: vulnerability-driven network filters for preventing known vulnerability exploits. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:193-204 [Conf]
  7. Adolf Hohl, Lutz Lowis, Alf Zugenmaier
    Look Who's Talking - Authenticating Service Access Points. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:151-162 [Conf]
  8. Tuomas Aura, Alf Zugenmaier
    Privacy, Control and Internet Mobility. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:133-145 [Conf]

  9. Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. [Citation Graph (, )][DBLP]

  10. Travelling without Moving: 802.11 Access Points backed by Secure NETLMM. [Citation Graph (, )][DBLP]

  11. Safeguarding Personal Data using Rights Management in Distributed Applications. [Citation Graph (, )][DBLP]

  12. Countering Automated Exploits with System Security CAPTCHAS. [Citation Graph (, )][DBLP]

  13. Countering Automated Exploits with System Security CAPTCHAS. [Citation Graph (, )][DBLP]

  14. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. [Citation Graph (, )][DBLP]

  15. Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings. [Citation Graph (, )][DBLP]

  16. Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks. [Citation Graph (, )][DBLP]

  17. Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing. [Citation Graph (, )][DBLP]

Search in 0.248secs, Finished in 0.249secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002