The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hartmut Pohl: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hartmut Pohl
    Civil War in Cyberspace. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:469-475 [Conf]
  2. Hartmut Pohl
    Einige Bemerkungen zu Anforderungen, Nutzen und staatlicher Regulierung beim Einsatz von Verschlüsselungsverfahren. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:69-0 [Conf]
  3. Hartmut Pohl, Dietrich Cerny
    Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1999, v:22, n:2, pp:110-121 [Journal]
  4. Richard Stevens, Hartmut Pohl
    Honeypots und Honeynets. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2004, v:27, n:3, pp:260-264 [Journal]
  5. Dietrich Cerny, Hartmut Pohl
    Trusted Third Parties und Sicherungsinfrastrukturen. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1997, v:39, n:6, pp:616-622 [Journal]
  6. Hartmut Pohl
    EU-Datenschutzrichtlinie. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1996, v:38, n:5, pp:531-534 [Journal]
  7. Hartmut Pohl, Dietrich Cerny
    Unternehmensinterne Schlüssel-Archive (Key Recovery Center). [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1998, v:40, n:5, pp:443-446 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002