The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carsten Rudolph: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carsten Rudolph
    A Formal Model for Systematic Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:332-343 [Conf]
  2. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:473-482 [Conf]
  3. Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas
    A business process-driven approach to security engineering. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:477-481 [Conf]
  4. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Abstractions Preserving Parameter Confidentiality. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:418-437 [Conf]
  5. Sigrid Gürgens, Carsten Rudolph
    Security Analysis of (Un-) Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:97-114 [Conf]
  6. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Parameter-Confidentiality. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:383-394 [Conf]
  7. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Authenticity and Provability - A Formal Framework. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:227-245 [Conf]
  8. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
    On the Security of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:193-207 [Conf]
  9. Carsten Rudolph, Antonio Mana
    Specification and automated processing of security requirements (SAPS'05). [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:460- [Conf]
  10. Sigrid Gürgens, Carsten Rudolph
    Security analysis of efficient (Un-)fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:3, pp:260-276 [Journal]
  11. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
    On the security of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:253-262 [Journal]
  12. Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz
    Facilitating the Use of TPM Technologies through S&D Patterns. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:765-769 [Conf]
  13. Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
    Security Evaluation of Scenarios Based on the TCG's TPM Specification. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:438-453 [Conf]

  14. Towards a Generic Process for Security Pattern Integration. [Citation Graph (, )][DBLP]


  15. Covert Identity Information in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]


  16. On the Security Validation of Integrated Security Solutions. [Citation Graph (, )][DBLP]


  17. Trust in Peer-to-Peer Content Distribution Protocols. [Citation Graph (, )][DBLP]


  18. Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. [Citation Graph (, )][DBLP]


  19. Trust in Business Processes. [Citation Graph (, )][DBLP]


  20. Secure Web Service Workflow Execution. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002